Chapter Nine The Session Layer. Objectives We’ll see how a new session is created, maintained, and dismantled. The process of logon authentication will.

Slides:



Advertisements
Similar presentations
Exercises and Solutions Lecture 1
Advertisements

CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol (TCP)
Chapter 7: Transport Layer
OSI Model OSI MODEL.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
OSI Model OSI LAYER / MODEL.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
OSI Model.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Top Three Layers Session Layer Presentation Layer Application Layer.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Gursharan Singh Tatla Transport Layer 16-May
OIS Model TCP/IP Model.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Process-to-Process Delivery:
Characteristics of Communication Systems
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
The OSI Model.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
University of the Western Cape Chapter 12: The Transport Layer.
Transmission Control Protocol TCP. Transport layer function.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Networking Basics CCNA 1 Chapter 11.
Process Architecture Process Architecture - A portion of a program that can run independently of and concurrently with other portions of the program. Some.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
University of the Western Cape Chapter 13: - The Session Layer The session layer (Layer 5) establishes, manages, and terminates sessions between applications.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Chapter 13 Session Layer. OSI Application Presentation Session Transport Network Data Link Physical Functions of Session Layer Interhost Communication.
Network Models.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Network Architecture Protocol hierarchies Design Issues for the layers
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
© 2002, Cisco Systems, Inc. All rights reserved..
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
Chapter 7: Transport Layer
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
THE OSI MODEL By: Omari Dasent.
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
Chapter 3: Open Systems Interconnection (OSI) Model
Process-to-Process Delivery:
OSI Model OSI MODEL.
Chapter 2. Protocols and Architecture
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Chapter Nine The Session Layer

Objectives We’ll see how a new session is created, maintained, and dismantled. The process of logon authentication will be revisited. Dialogue control will be examined.

Why we need session layer? Before the network starts to transfer data, it needs to make sure that the user has all the necessary rights and privileges. – User credentials are verified. The processes or applications at the source and destination need to figure out how to talk to one another, such as service, protocol, speed, duration, etc. – Establish a connection ID number – Agree upon which services are required and for what duration – Determine which device begins the conversation – Coordinate the Acknowledgement numbering and retransmission rules.

Session Layer Responsibilities The responsibilities of session layer are: – Establish a connection – Provide dialogue management and synchronization – Release the connection

Establishing a Connection In order for two devices to communicate, they must first establish a session. – A session can also defined as a virtual connection between two devices for the purpose of transferring data. – Many times, data is transferred over a series of session in order to keep network congestion at a minimum. – Any time multiple sessions are used by devices, it is considered to be a dialogue.

Initiating a Link When a client application or process decides that it requires a service that exists on a remote device, it is up to Session layer to establish a link with that remote device. The Session layer will rely heavily upon the service provided by the lower lays in the OSI model – To create a new session, the Session layer entity issues a T-connect request to the Transport Layer. – Transport layer will identify the services for the particular session and the protocol that will be used. The Transport layer issue a N-connect request to the Network Layer and wait for confirmation. – The confirmation will be handed back to the Session layer and used for all subsequent processes.

Initiating a Link

Logon Authentication In any connection-oriented protocol, logon authentication is required before any session can be built – At a minimum, the logon authentication requires User ID and password. The credentials are sent to the target device and compared against the security database. – If the user is authenticated, the session is created. – If not, the session is immediately aborted.

Logon Authentication Once users log on to the network, their credentials stay in cache. The system makes use of this credential every time they attempt to access any network resource – Once the client host has located the resource, if the resource has password restriction, the device housing that resource will forward the logon authentication to the server. – The security database will be checked, and if all information is correct, the user will be allowed to access the resource.

Logon Authentication Example

The Connection ID Everything has to have a name. On any given host, it is high likely that there are multiple session open simultaneously – The connection ID keeps multiple sessions from getting confused. For each session, the network will create a source connection ID and destination connection ID. This number will be given to the lower layer in order to make sure this information is added to the appropriate fields. TCP/IP makes very little use of connection IDs. TCP/IP uses sequence number to keep packets from different session.

Duration of the Connection An estimated duration is negotiated between entities. In the event that one of the device drops the connection for any reason, the other device will not just leave the virtual link hanging open. When the time to live expires, the still-connected device can either reestablish the connection or close it.

Service Required The device also negotiates what services are being requested and those that will be required. The services provided by the Session Layer include:

The Final Steps of Initializing a Session The last two steps of initializing a session are: – Determine which entity begins the conversation – Coordinate the acknowledgement numbering and retransmission procedure. Deciding who talks first is simply a matter of what type of service is being provided. – The client may be requesting access to the resource on the server – The server may be synchronizing data on the client.

The Final Steps of Initializing a Session Connection-oriented protocol require that acknowledgements be sent for each packet received. It is the Session layer to negotiate the method of acknowledgement – Sliding window – Stop and wait – etc

Dialogue Management Duplex or half-duplex operation is selected. – If the full duplex is selected, either device can send data any time it is required – If half-duplex (Simplex) is selected, the process of communication is controlled by a token. Data Token – permit the transmission of data Synchronize minor token – A fine-tuning of the session’s flow is required, or a checkpoint is being issued. Major activity token – The entire is out of synch and needs to be realigned and reset Release token – All finished. Let’s go home Disconnect token – The data transfer is complete and the session can be broken down. Abort token – Some catastrophic failure has occurred and the session is to be ended immediately.

Dialogue Management During the transmission, the Session layer periodically places Checkpoints in the data steam. In the event of a session failure, certain protocols can reestablish a connection and pick up where they left off. A synchronization minor token is used so that the receiving device will not confuse the checkpoint with actual data

Dialogue Synchronization Broken down into four types – Initial synchronization Starts the conversation – Major synchronization Starts the conversation over again, if need be – Minor synchronization Fine-tunes data exchange as needed – Resynchronization Either restarts or completely aborts the session. It can take advantage of checkpoint to resume the transmission. A set command can be used to return to a specific checkpoint.

Releasing the Connection The final responsibility of the Session layer is to disconnect a communication link and remove the temporary files that have been created during the session. Disconnection fall under two categories, the expected and the unexpected – Expected disconnections occur because either the duration of the session has expired or the transfer of data is complete. – Unexpected disconnection occurs because of an unrecoverable error

Releasing the Connection – An expected disconnect results in a finish Protocol Data Unit being issued. The session is broken down and all TEMP files cleaned up. – An unexpected disconnection results in a not-finished PDU. TEMP files remain intact. Once the reconnection has been made, the checkpoint procedure will be used to resume the transfer where it left off.

Summary The Session layer (Layer 5) of the OSI model performs the following tasks: – Starts and ends sessions on the Presentation layer’s request and passes connection information to the Transport layer – Maintain the dialogue. – Performs authentication, verifies permissions, and session recovery and checkpoint