ssh protocol implementation
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Jan 2010
04-01-2010, 12:05 AM

hai, can any body guide me in my project and implimentation "high speed bulk data transfer using ssh protocol"
Active In SP

Posts: 247
Joined: Jan 2010
05-01-2010, 05:46 PM

SSH is a highly successful multipurpose protocol used for both
interactive shells and transport layer mechanisms. Tatu Ylönen of Helsinki University of Technology developed SSH. But most implementations of SSH reduces its
functionality as bulk data transport tool in high performance
network environments.adoption of strong, cryptographically
secure authentication methods for accessing remote systems and
resources came because of the weak security of FTP and telnet. SSH is widely available as both an open source and
commercial product for almost every combination of operating
system and hardware platform in use.The main disadvantage is that transfer
speeds over wide area networks is painstakingly slow.

Window size and performance:
Consider Two identical connections exist between Hosts X and Y.
an undersized window allows only a
small portion of the available network capacity to be
utilized. Whereas window size that
matches the BDP of the p
ath permits full utilization.many users
blame the performance problem on either a failing network or the
overhead imposed by encryption. expect transfers would be slow regardless of this distance between hosts if the processing for encryption was the culprit. But this is not the case.

1. Redefining the Window Size:
This was to redefine
SSH receive window size to some appropriately large value at
compile time.But reasons like filled buffers on intervening routers, overly rapid
saturation of the path causing excessive loss and a return to slow
start before congestion control mechanisms can take effect, cause negative effect.

2.Autotuning Kernels
problem arises if the underlying operating system is using
dynamically sized receive windows, better known as an
autotuning kernel.

3.Layer 4 Awareness

SSH aware of the transport protocol layer (OSI Layer 4).we remove the bottleneck without
necessitating the use of statically defined overly large buffers.

4.Encryption Overhead
Cryptographic methods require more computation. SSH uses two distinct
cryptographic methods, encryption for privacy and message
authentication for integrity.on distributed
computing networks, users may end up competing for scarce
processor resources if users run concurrent instances of HPNSSH. The performance will be variable in a span of a single transfer which wil be mistaken by users as low performance

provides another possible avenue to enhance throughput

Full seminar and presentation report is available in this link: and implimentations/hpn-ssh/papers/a14-rapier.pdf
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  verilog code for implementation of 16 bit spanning tree carry look ahead adder Guest 1 45 31-10-2016, 01:06 PM
Last Post: amrutha735
  matlab codes for dsdv routing protocol Guest 1 50 31-10-2016, 11:26 AM
Last Post: amrutha735
  implementation of time division multiplexing system Guest 1 56 31-10-2016, 10:04 AM
Last Post: jaseela123
  implementation of on rail passenger information system using vhdl pdf Guest 1 55 31-10-2016, 10:02 AM
Last Post: anusree
  meaning of procedural implementation ppt Guest 1 51 11-10-2016, 02:33 PM
Last Post: amrutha735
  code protocol gaf in matlab Guest 1 61 20-05-2016, 11:05 AM
Last Post: Dhanabhagya
  interview questions and answers on spi protocol Guest 1 59 19-03-2016, 02:33 PM
Last Post: mkaasees
  implementation of message digest Guest 1 43 18-03-2016, 02:48 PM
Last Post: mkaasees
  implementation of electronic voting machine using verilog pdf Guest 0 79 23-01-2016, 08:08 AM
Last Post: Guest
  matlab code for heed protocol in wsn Guest 0 62 11-01-2016, 10:46 AM
Last Post: Guest