Chapter 4.4 Application Layers
Chapter 4.4 Application Layers
Part V
(SE 3051)
Session Layer
The lowest four layers of the OSI model (Physical, Data link,
Network, and Transport) provide the means for the reliable
exchange of data and provide a fast data service.
For example, a remote terminal access application might require
a half-duplex dialogue.
A transaction-processing application might require checkpoints
in the data-transfer stream to permit backup and recovery.
A message processing application might require the ability to
interrupt a dialogue in order to prepare a new portion of a
message and later to resume the dialogue where it was left off.
2
Contd.
All these capabilities could be embedded in specific applications
at layer 7.
However, because these types of dialogue-structuring tools have
widespread applicability, it makes sense to organize them into a
separate layer: the session layer.
The session layer provides the mechanism for controlling the
dialogue between applications in end systems.
In many cases, there will be little or no need for session-layer
services, but for some applications, such services are used.
3
Contd.
4
The key services provided by the session layer include
The primary job of session layer protocols is to provide the means
necessary to set up, manage, and end sessions
1. Dialogue discipline. This can be two-way simultaneous (full duplex)
or two way alternate (half duplex) communication between
processes.
2. Grouping. The flow of data can be marked to define groups of data.
For example, if a retail store is transmitting sales data to a
regional office, the data can be marked to indicate the end of the
sales data for each department; this would signal the host
computer to finalize running totals for that department and start
new running counts for the next department. 5
Contd.
3. Recovery. The session layer can provide a check pointing
mechanism, so that if a failure of some sort occurs between
checkpoints, the session entity can retransmit all data since the
last checkpoint, as in the example shown below:
For example, if a system is sending a file of 2000 pages, it is
advisable to insert checkpoints after every 100 pages to ensure that
each 100-page unit is received and acknowledged independently.
In this case, if a crash happens during the transmission of page 523,
the only pages that need to be resent after system recovery are
pages 501 to 523. Pages previous to 501 need not be resent.
6
Presentation Layer
7
Specific responsibilities of the presentation layer :
1. Translation:- The processes (running programs) in two systems are
usually exchanging information in the form of character strings,
numbers, and so on.
The information must be changed to bit streams before being
transmitted. Because different computers use different encoding
systems, the presentation layer is responsible for interoperability
between these different encoding methods.
The presentation layer at the sender changes the information from
its sender-dependent format into a common format.
The presentation layer at the receiving machine changes the
common format into its receiver-dependent format.
8
Contd.
2. Encryption. To carry sensitive information, a system must be able to
ensure privacy.
Encryption means that the sender transforms the original information to
another form and sends the resulting message out over the network.
Decryption reverses the original process to transform the message back to
its original form.
9
Application Layer
The application layer enables the user, whether human or
software, to access the network.
It provides user interfaces and support for services such as
electronic mail, remote file access and transfer, shared database
management, and other types of distributed information services.
Application layer is where users actually communicate to the
computer.
Take the case of Internet Explorer (IE).
It is also responsible for identifying and establishing the
availability of the intended communication partner 10
Contd.
• Typical application layer protocols
Domain Name System (DNS)
Hyper Text Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
E-mail (SMTP,POP,IMAP)
17
TCP/IP Layers- What does each layer do?
Network access layer is the combination of
Application
data link and physical layers and it deals with
pure hardware issues (wires, satellite links,
network interface cards, etc.)
Transport
Access methods such as CSMA/CD (carrier
sensed multiple access with collision
Internet
detection)
Ethernet exists at the network access layer - its
Network hardware operates at the physical layer and its
access
medium access control method (CSMA/CD)
18
TCP/IP Layers- What does each layer do?
Network
access
21
Thank you!
Q?
22