Session Layer

Session Layer

The Session Layer is level five of the seven level OSI model. It responds to service requests from the Presentation Layer and issues service requests to the Transport Layer.

The Session Layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e. a semi-permanent dialogue. Communication sessions consist of requests and responses that occur between applications. Session Layers are commonly used in application environments that make use of remote procedure calls (RPCs).

An example of a Session Layer protocol is the OSI protocol suite Session Layer Protocol, also known as X.225 or ISO 8327. In case of a connection loss this protocol may try to recover the connection. If a connection is not used for a long period, the Session Layer protocol may close it and re-open it. It provides for either full duplex or half-duplex operation and provides synchronization points in the stream of exchanged messages. [ [http://www.itu.int/rec/T-REC-X.225/en/ ITU-T Recommendation X.225] ]

Other examples of session-layer implementations include Zone Information Protocol (ZIP) – the AppleTalk protocol that coordinates the name binding process; and Session Control Protocol (SCP) – the DECnet Phase IV Session Layer protocol.

In brief: the Session Layer establishes, manages and terminates connections (sessions) among cooperating applications. It also adds traffic flow information.

ession Layer services

*Authentication
*Permissions
*Session restoration (checkpointing and recovery)

ession Layer support in the Internet

The Session Layer does not exist as a separate protocol layer or process in the TCP/IP model, but its functionality is partly provided by the TCP/IP model Transport Layer, and partly by some TCP/IP model Application Layer protocols.

The OSI model made the Session Layer responsible for "graceful close" of sessions, which is a property of the TCP protocol, provided by the four-way SYN handshake process.

The OSI model also made the Session Layer responsible for session checkpointing and recovery, which is not usually used in the Internet protocols suite. However, there are a few applications layer protocols where the concept is useful. The idea is to allow information on different streams, perhaps originating from different sources, to be properly combined. In particular, it deals with synchronization issues, and ensuring nobody ever sees inconsistent versions of data, and similar things.

One application which is intuitively fairly clear is web conferencing. Here, we want to make sure that the streams of audio and video match up - or in other words, that we do not have lip synch problems. We may also want to do floor control - ensuring that the person displayed on screen and whose words are relayed is the one selected by the speaker, or by some other criteria.

Another application is in live TV programs, where streams of audio and video need to be seamlessly merged from one to the other so that we do not have half a second of blank airtime, or half a second when we transmit two pictures simultaneously.

Session Layer Protocols


*ADSP, AppleTalk Data Stream Protocol
*ASP, AppleTalk Session Protocol
*H.245, Call Control Protocol for Multimedia Communication
*ISO-SP, OSI Session Layer Protocol (X.225, ISO 8327)
*iSNS, Internet Storage Name Service
*L2F, Layer 2 Forwarding Protocol
*L2TP, Layer 2 Tunneling Protocol
*NetBIOS, Network Basic Input Output System
*PAP, Password Authentication Protocol
*PPTP, Point-to-Point Tunneling Protocol
*RPC, Remote Procedure Call Protocol
*RTCP, Real-time Transport Control Protocol
*SMPP, Short Message Peer-to-Peer
*SCP, Secure Copy Protocol
*SIP, Session Initiation Protocol
*SSH, Secure Shell
*ZIP, Zone Information Protocol
*SDP, Sockets Direct Protocol

ee also

* Session (computer science)

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Session layer — Layer 5 redirects here. For the political layer sometimes included in the TCP/IP model, see Layer 8. The OSI model 7 Application layer 6 Presentation layer 5 Session layer 4 Transport layer …   Wikipedia

  • Session Layer —   [dt. »Sitzungsschicht«], die Kommunikationssteuerschicht im OSI Schichtenmodell …   Universal-Lexikon

  • session layer —    The fifth of seven layers of the OSI Reference Model for computer tocomputer communications.    The session layer coordinates communications and maintains the session for as long as it is needed, performing security, logging, and… …   Dictionary of networking

  • session layer — seansų lygmuo statusas T sritis informatika apibrėžtis Penktasis atvirųjų sistemų ryšio ↑lygmeninio tinklų modelio lygmuo, kuriame pateikiamos dialogo priemonės tarp dviejų duomenų perdavimo punktų. Pradedamas, koordinuojamas ir baigiamas… …   Enciklopedinis kompiuterijos žodynas

  • Session Layer —    The layer in the Seven Level OSI Reference Model that is responsible for adding control mechanisms to the data exchange …   IT glossary of terms, acronyms and abbreviations

  • Session Layer — Sitzungsschicht, erledigt die Organisierung und Synchronisierung des Dialogs zwischen den Anwenderprozessen, beschrieben u.a. in ISO8326 (Prozess zu Prozess Verbindung) …   Acronyms

  • Session Layer — Sitzungsschicht, erledigt die Organisierung und Synchronisierung des Dialogs zwischen den Anwenderprozessen, beschrieben u.a. in ISO8326 (Prozess zu Prozess Verbindung) …   Acronyms von A bis Z

  • Session — may refer to:Bureaucracy*Executive session, a portion of the United States Senate s daily session *Judicial session *Legislative session *Session (parliamentary procedure) *Presbyterian polity *Court of Session, the supreme civil court of… …   Wikipedia

  • Secure Session Layer — Pile de protocoles 7.  Application 6.  Présentation 5.  Session 4.  T …   Wikipédia en Français

  • Layer 2 Tunneling Protocol — In computer networking, the Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). History and future Published in 1999 as proposed standard RFC 2661, L2TP has its origins primarily in two older …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”