Solved

Session Layer

Posted on 1999-01-08
1
273 Views
Last Modified: 2013-12-23
Dear all,
    I have a very confusing question to ask... about the session layer of the OSI model.
    if I run ls& on unix, will it go thru telnet (the application layer), the presentation layer and the session layer to the transport layer? If I run another ls program on the same machine, will another seperated session layer be created?.. or both ls will run under one 'session' mechanism.

Thanks

The confused
Jacky
0
Comment
Question by:whluk
1 Comment
 
LVL 7

Accepted Solution

by:
yoren earned 50 total points
ID: 1582868
Jacky,

The OSI model refers not so much to the specifics of an implementation as to the concept of how two computers communicate. There's no specific "OSI session" mechanism. When you run 2 "ls&" commands, UNIX creates 2 processes. That has nothing to do with OSI. The OSI model can, however, be used to describe what happens when you type "ls".

Application: You type "ls" into your telnet program
Presentation: Your message is interpreted using the ASCII character set.
Session: Send this message to TCP/IP port 23, since that is the port for Telnet
Transport: TCP (part of TCP/IP): make sure the message gets there
Network: IP: route the message across the Internet to the UNIX box
Link: Use Ethernet
Physical: the actual wire it goes across
Link: Use Ethernet
Network: IP: receive the message
Transport: TCP: let your computer know the message arrived
Session: Receive the message from port 23 (not exactly accurate, but conceptually right)
Application: Your UNIX shell receives the command "ls"

Yuval
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question