0% found this document useful (0 votes)
25 views4 pages

Session Layer in OSI Model

Session layer in network

Uploaded by

tyagirakesh897
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

Session Layer in OSI Model

Session layer in network

Uploaded by

tyagirakesh897
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Session Layer in OSI model

Introduction :
The Session Layer is the 5th layer in the Open System Interconnection (OSI)
model. This layer allows users on different machines to establish active
communications sessions between them. It is responsible for establishing,
maintaining, synchronizing, terminating sessions between end-user applications.
In Session Layer, streams of data are received and further marked, which is then
resynchronized properly, so that the ends of the messages are not cut initially
and further data loss is avoided. This layer basically establishes a connection
between the session entities.

Functions of Session Layer :


The session layer being the fifth layer in the OSI model performs several
different as well as important functions which are needed for establishing as
well as maintaining a safe and secure connection.
Data from Presentation Layer <=> Session layer <=> Data from
Transport Layer

Following are some of the functions which are performed by Session Layer –

● Session Layer works as a dialog controller through which it allows

systems to communicate in either half-duplex mode or full duplex

mode of communication.

● This layer is also responsible for token management, through which it

prevents two users from simultaneously accessing or attempting the

same critical operation.


● This layer allows synchronization by allowing the process of adding

checkpoints, which are considered as synchronization points to the

streams of data.

● This layer is also responsible for session checkpointing and recovery.

● This layer basically provides a mechanism of opening, closing and

managing a session between the end-user application processes.

● The services offered by Session Layer are generally implemented in

application environments using remote procedure calls (RPCs).

● The Session Layer is also responsible for synchronizing information

from different sources.

● This layer also controls single or multiple connections for each-end

user application and directly communicates with both Presentation and

transport layers.

● Session Layer creates procedures for checkpointing followed by

adjournment, restart and termination.

● Session Layer uses checkpoints to enable communication sessions

which are to be resumed from that particular checkpoint at which

communication failure has occurred.

● The session Layer is responsible for fetching or receiving data

information from its previous layer (transport layer) and further sends

data to the layer after it (presentation layer).


Session Layer Protocols :
Session Layer uses some protocols which are required for safe, secure and
accurate communication which exists between two-ender user applications.
Following are some of the protocols provided or used by the Session Layer –

● Appletalk Data Stream Protocol: ADSP is that type of protocol which

was developed by Apple Inc. and it includes a number of features that

allow local area networks to be connected with no prior setup. This

protocol was released in 1985.

This protocol rigorously followed the OSI model of protocol layering.

ADSP itself has two protocols named: AppleTalk Address Resolution

Protocol (AARP) and Name Binding Protocol (NBP), both aimed at

making the system self-configuring.

● Real Time Transport Control Protocol:- RTCP is a protocol which

provides out-of-band statistics and control information for an RTP

(Real-time Transport Protocol) session. RTCP’s primary function is to

provide feedback on the quality of service (QoS) in media distribution

by periodically sending statistical information such as transmitted octet

and packet counts or packet loss to the participants in the streaming

multimedia session.

● Point-to-Point Tunneling Protocol:- PPTP is a protocol which

provides a method for implementing virtual private networks. PPTP

uses a TCP control channel and a Generic Routing Encapsulation

tunnel to encapsulate PPP (Point-to-Point Protocol) packets This


protocol provides security levels and remote access levels comparable

with typical VPN (Virtual Private Network) products.

● Password Authentication Protocol:- Password Authentication

Protocol is a password-based authentication protocol used by Point to

Point Protocol (PPP) to validate users. Almost all network operating

systems, remote servers support PAP. PAP authentication is done at

the time of the initial link establishment and verifies the identity of the

client using a two-way handshake (Client-sends data and server in

return sends Authentication-ACK (Acknowledgement) after the data

sent by client is verified completely).

● Remote Procedure Call Protocol:- Remote Procedure Call Protocol

(RPCP) is a protocol that is used when a computer program causes a

procedure (or a subroutine) to execute in a different address space

without the programmer explicitly coding the details for the remote

interaction. This is basically the form of client-server interaction,

typically implemented via a request-response message-passing

system.

● Sockets Direct Protocol (SDP): Sockets Direct Protocol (SDP) is a

protocol that supports streams of sockets over Remote Direct Memory

Access (RDMA) network fabrics.

The purpose of SDP is to provide an RDMA-accelerated alternative to

the TCP protocol. The primary goal is to perform one particular thing in

such a manner which is transparent to the application.

You might also like