0% found this document useful (0 votes)
206 views

Design Issues of Session and Presentation Layer

Computer Networks OSI model notes

Uploaded by

neetuanand
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views

Design Issues of Session and Presentation Layer

Computer Networks OSI model notes

Uploaded by

neetuanand
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

Upper

OSI
Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Session layer
Receive
Sender
r

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


The session layer is responsible for dialog
control and synchronization.

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


LAYER 5: SESSION
• The session layer defines how to start, control and end
conversations (called sessions) between applications.
• This includes the control and management of multiple bi-
directional messages using dialogue control.
• It also synchronizes dialogue between two hosts and
manages their data exchange.
• The session layer offers provisions for efficient data transfer.
• Coordinate who send when.
• It handles the problem such as in adequate disk space or
lack of paper for the printer .

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Basic Functions for the Session Layer
Protocols
• Creating a connection – Communication session between an
APPLICATION in one computer and another APPLICATION in
another computer
– THREE-WAY-HANDSHAKE: a method widely used to establish and
end connection
• Sender sends SYN message to request a session to the receiver
• Receiver replies by sending ACK message to acknowledge the
SYN message sent by the sender, and SYN message to request
a session to the sender
• Sender replies by sending ACK message to acknowledge the
SYN message sent by the receiver

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Basic Functions for the Session Layer

Protocols
Managing multiple sessions
– A computer can establish multiple sessions with several other
computers
• e.g., session 1: exchanging information over the World Wide Web
with www.yahoo.com
• session 2: exchanging information over the World Wide Web with
www.google.com
• session 3: exchanging information over the World Wide Web with
www.espn.com
– Two computers can also establish multiple sessions,
• e.g., function 1: exchanging information over the World Wide Web;
• function 2: exchanging information over the FTP;
• function 3: exchanging information over the email

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Basic Functions for the Session Layer
Protocols
• Ending a session
– THREE-WAY-HANDSHAKE: a method widely used to establish and
end connection
• Sender sends FIN message to close a session to the receiver
• Receiver replies by sending ACK message to acknowledge the
FIN message sent by the sender, and FIN message to close a
session to the sender
• Sender replies by sending ACK message to acknowledge the
FIN message sent by the receiver

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-2

Session-to-Transport Layer Communication

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-2

Session-to-Transport Layer Communication


1:1 –there is one session layer connection for each transport
layer connection.
M:1-Multiple session layer connection share the service of
one transport layer connection
1:M-one session layer connection needs many transport layer
connection to handle the task

Behavior difference b/w transport and session layer

The transport layer can make an abrupt connection .The session


cannot disconnect until the session can be brought to a graceful
conclusion.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-3

Synchronization Points

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-3

Synchronization Points
Session layer introduced the reference points into the
data: major and minor
Major :-It divides an exchange into series of dialogs ,each
major points must be acknowledged before the session
can continue. If error occurs data can be recovered only
up to the last major point.

Minor-Inserted in the middle of the dialogues and does


not require the confirmation .They are the security
blankets .If the error occurs the control go back on or
more syn points and recover data.

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-4

SPDU

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-5

Presentation Layer Functions

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-6

Direct and Indirect Methods of Translation

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-7

Concept of Encryption and Decryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-8

Encryption/Decryption Methods

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-9

Monoalphabetic Substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-10

Polyalphabetic Substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-11

Transpositional Encryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-12

Encoding/Decoding

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-13

Permutation

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-14
Substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-15
Product

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-16
Exclusive OR

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001


Figure 23-17

Rotation

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

You might also like