Preview

OSI Protocol Hierarchy

Better Essays
Open Document
Open Document
533 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
OSI Protocol Hierarchy
OSI Protocol Hierarchy
Session Layer

The session layer is the fifth among the seven layers of the Open System Interconnections (OSI) model. It resides above the transport layer and below the presentation layer, and provides “value added" services to the underlying transport layer services. The session layer (along with the presentation layer) add services to the transport layer that are likely to be of use to applications, so that each application doesn 't have to provide its own implementation.

The session layer the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed.

The services provided by the first three layers (physical, data link, and network) are not sufficient for some processes. The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction among communicating systems.

The session layer is responsible for dialog control and synchronization.

Dialog control. Decide whose turn it is to talk. The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place in either simplex (one way only), half-duplex (one way at a time) or full-duplex (two ways at a time) mode.
Synchronization. Move the two session entities into a known state. The session layer allows a process to add checkpoints, or synchronization points, to a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent.

Basic Functions for the Session Layer Protocols
Creating a connection – session/communication session between an APPLICATION in one computer and



References: [1] Ampoloquio, Jason M., Self-Sufficient Guide to Electronics Engineering, Manila, Philippines, 2005. [2] Blake, Roy, Electronic Communication Systems, 2nd ed., Delmar, Singapore, 2002. [3] Forouzan Behrouz A., Data Communications and Networking, 4th ed., Mc Graw Hill, New York, 2007. [4] Tomasi, Wanye, Electronic Communications System; Fundamentals through Advance, 4th ed., Prentice Hall, New Jersey, 2001

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Among them the first approach was proposed in 1984 by Chandy and Lamport, to build a possible global state of a distributed system [20]. The goal ofthis protocol is to build a consistent distributed snapshot of the distributed system. A distributed snapshot is a collection of process checkpoints (one per process), and a collection of in-flight messages (an ordered list of messages for each point to point channel). The protocol assumes ordered loss-less communication channel; for a given application, messages can be sent or received after or before a process took its checkpoint. A message from process p to process q that is sent by the application after the checkpoint of process p but received before process q checkpointed is said to be an orphan message. Orphan messages must be avoided by the protocol, because they are going to be re-generated by the application, if it were to restart in that snapshot. Similarly, a message from process p to process q that is sent by the application before the checkpoint of process p but received after the checkpoint of process q is said to be missing. That message must belong to the list of messages in channel p to q, or the snapshot is inconsistent. A snapshot that includes no orphan message, and for which all the saved channel messages are missing messages is consistent, since the application can be started from that state and pursue its computation…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The point when individuals discuss about OSI, they are typically alluding to what is formally known as the Basic Reference Model (BRM) for Open Systems Interconnection (OSI). The BRM…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    4. Name a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?65, 69…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    5. What are the seven layers of the OSI model (in order)? What is the role of each layer?…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    I. (This layer is used to process requests from hosts and to make sure a connection is made to an appropriate port.)…

    • 890 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The New England and the Chesapeake Colonies were two very distinct colonies. The colonist came to the Americas in order to escape religious toleration and economic prosperity. As time passed the colonist were changed by their different surroundings. Although the New England and Chesapeake colonies both had English immigrants, they differentiated due to economic, social, and religious causes. In contrast the colonies were very different societies.…

    • 634 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3350 Unit 4

    • 572 Words
    • 3 Pages

    * Discuss the inter-dependence of workstation hardware(network card, cabling; permissions; system bus; local-system architecture eg memory, processor, I/O devices) with network components.(P6,M3)…

    • 572 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Session is one of the EJBs and it represents a single client inside the Application Server.…

    • 1721 Words
    • 7 Pages
    Powerful Essays

Related Topics