What are various design issues of session layer?
Design Issues of Session Layer:-
The session layer is level five of the seven level OSI model. It responds to service requests from the presentation layer and issues service requests
to the transport
layer.
The session layer provides the
mechanism for opening, closing and managing a session between end-user
application processes, i.e. a semi-permanent dialogue. Communication sessions
consist of requests and responses that occur between applications.
Session layers are commonly
used in application environments that make use of remote procedure calls
(RPCs).
An example of a session layer
protocol X.225 or ISO 8327.
In case of a connection loss
this protocol may try to recover the connection. If a connection is not used
for a long period, the session layer protocol may close it and re-open it.
It provides for either full
duplex or half-duplex operation and provides synchronization points in the
stream of exchanged messages.
.
List of Session layer services
- Authentication
- Permissions
- Session restoration (checkpointng and recovery)
Authentication:
Authentication is the act of establishing or
confirming something (or someone) as authentic, that is, that claims
made by or about the thing are true. This might involve confirming the identity
of a person, the origins of an artifact, or assuring that a computer program is
a trusted one.
Permissions or Access control
One familiar use of authentication and
authorization is access control. A computer system supposed to be used only by
those authorized must attempt to detect and exclude the unauthorized. Access to
it is therefore usually controlled by insisting on an authentication procedure
to establish with some established degree of confidence the identity of the
user, thence granting those privileges as may be authorized to that identity.
In some cases, ease of access is balanced against
the strictness of access checks. For example, the credit card network does not
require a personal identification number, and small transactions usually do not
even require a signature. The security of the system is maintained by limiting
distribution of credit card numbers, and by the threat of punishment for fraud.
Checkpoints
Session layer is responsible for
creating several checkpoints, checkpoints are also treated as recovery points
i.e. in case of failure the system rollback to its previous checkpoint
configuration or action.
0 comments:
Feel free to contact the admin for any suggestions and help.