This figure consists of following elements:
A computer acting as SSH Client.
Another computer acting as SSH Server.
Following three arrows between SSH Client and SSH Server.
Authentication
Encryption
Integrity