skip to main content
10.1145/1341811.1341824acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesmardi-grasConference Proceedingsconference-collections
research-article

High speed bulk data transfer using the SSH protocol

Published: 29 January 2008 Publication History

Abstract

SSH is a highly successful multipurpose protocol used for both interactive shells and transport layer mechanisms. However, a design choice in most implementations of SSH reduces its functionality as bulk data transport tool in high performance network environments. This paper will discuss the nature of this limitation, the functional barriers it imposes, a method by which it can be remedied, and introduces a high performance implementation based on the industry standard, OpenSSH. Additionally, the authors will introduce a method by which performance on multi-core systems is improved through the use of cipher multi-threading.

References

[1]
Allcock, W., Bester, J., et al., "Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing," Proceedings of the IEEE Mass Storage Conference, pp. 13--28 April 2001.
[2]
Bellare, M., Kohno, T., Namprempre, C., The Secure Shell (SSH) Transport Layer Encryption Modes. IETF RFC 4344. Internet Engineering Task Force
[3]
Galbraith, J., Ylonen, T., Lehtinen, S., SSH File Transfer Protocol. IETF Internet Draft draft-ietf.secsh-filexfer-04. Internet Engineering Task Force (Web site: www.ietf.org)
[4]
Jaconson, V., Braden, R., Borman D., TCP Extension for High Performance. IETF RFC 1323. Internet Engineering Task Force (Web site: www.ietf.org)
[5]
Kohl, J., Neuman C., The kerberos network authentication service (V5). Request for Comments (Proposed Standard) RFC 1510, Internet Engineering Task Force, (Web site: www.ietf.org)
[6]
National Institute of Standards and Technology, "Advanced Encryption Standard (AES)", Federal Information Processing Standards Publication 197, November 2001
[7]
OpenSSH 3.8p1 Source Code (channels.c)
[8]
Rosmanith, H., Kranzlmuller, D., "glogin - A Multifunctional, Interactive Tunnel into the Grid," grid, pp. 266--272, Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04), 2004
[9]
Semke, J., Mahdavi, J., Mathis, M., "Automatic TCP Buffer Tuning". Proceedings of SIGCOMM '98 Conference, Vol. 28, No. 4, pp. 315--323, August 1998
[10]
Stevens, W. R., TCP/IP Illustrated Volume 1: The Protocols, Reading, MA, Addison Weseley Longman Inc. 1994, pp. 289--291
[11]
Ubik, S., Cimbal, P., "Achieving Reliable High Performance in LFNs", TNC 2003. Zagreb, Croatia, May 19--23, 2003.

Cited By

View all
  • (2023)Multi-threaded scp: Easy and Fast File Transfer over SSHPractice and Experience in Advanced Research Computing 2023: Computing for the Common Good10.1145/3569951.3597582(320-323)Online publication date: 23-Jul-2023
  • (2022)Evaluating Methods of Transferring Large DatasetsSupercomputing Frontiers10.1007/978-3-031-10419-0_7(102-120)Online publication date: 1-Jul-2022
  • (2020)Exposing cache timing side-channel leaks through out-of-order symbolic executionProceedings of the ACM on Programming Languages10.1145/34282154:OOPSLA(1-32)Online publication date: 13-Nov-2020
  • Show More Cited By

Index Terms

  1. High speed bulk data transfer using the SSH protocol

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MG '08: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities
    January 2008
    178 pages
    ISBN:9781595938350
    DOI:10.1145/1341811
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • National e-Science Institute (Edinburgh, UK)
    • Louisiana State University (USA)

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 January 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. HPN
    2. HPN-SSH
    3. SSH
    4. auto-tuning
    5. bottlenecks
    6. buffers
    7. cryptography
    8. high performance networks
    9. performance
    10. security

    Qualifiers

    • Research-article

    Conference

    Mardi Gras'08
    Sponsor:
    Mardi Gras'08: 15th Mardi Gras Conference on Distributed Applications
    January 29 - February 3, 2008
    Louisiana, Baton Rouge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Multi-threaded scp: Easy and Fast File Transfer over SSHPractice and Experience in Advanced Research Computing 2023: Computing for the Common Good10.1145/3569951.3597582(320-323)Online publication date: 23-Jul-2023
    • (2022)Evaluating Methods of Transferring Large DatasetsSupercomputing Frontiers10.1007/978-3-031-10419-0_7(102-120)Online publication date: 1-Jul-2022
    • (2020)Exposing cache timing side-channel leaks through out-of-order symbolic executionProceedings of the ACM on Programming Languages10.1145/34282154:OOPSLA(1-32)Online publication date: 13-Nov-2020
    • (2020)OAuth SSH with Globus AuthPractice and Experience in Advanced Research Computing 2020: Catch the Wave10.1145/3311790.3396658(34-40)Online publication date: 26-Jul-2020
    • (2019)Performance of User Data Collections Uploads to HPCaaS InfrastructureComputer Information Systems and Industrial Management10.1007/978-3-030-28957-7_30(359-369)Online publication date: 11-Aug-2019
    • (2018)Evaluation and Modelling of Secured Protocols’ Spent Transmission Time2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)10.1109/ICONIC.2018.8601263(1-5)Online publication date: Dec-2018
    • (2016)Performance Evaluation of Protocols for Big Data TransfersBig Data10.1201/b19694-5(43-95)Online publication date: 28-Apr-2016
    • (2015)A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack DetectionIEICE Transactions on Information and Systems10.1587/transinf.2014ICP0005E98.D:4(760-768)Online publication date: 2015
    • (2015)Automatically encapsulating HPC best practices into data transfersProceedings of the Second International Workshop on HPC User Support Tools10.1145/2834996.2834997(1-12)Online publication date: 15-Nov-2015
    • (2015)Inside the Virtual Robotics Challenge: Simulating Real-Time Robotic Disaster ResponseIEEE Transactions on Automation Science and Engineering10.1109/TASE.2014.236899712:2(494-506)Online publication date: Apr-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media