Explain session layer in osi model, Computer Networking

Assignment Help:

Q. Explain Session Layer in osi model?

- The session layer defines how to control, start and end conversations (called sessions) between applications.

- This includes the control as well as management of multiple bi-directional messages using dialogue control.

- It as well synchronizes dialogue between two hosts' presentation layers and manages their data exchange.

- The session layer proffers provisions for efficient data transfer.

- Examples: - SQL and ASP (AppleTalk Session Protocol).


Related Discussions:- Explain session layer in osi model

Dns in the internet, DNS in the Internet -Domain name space is split i...

DNS in the Internet -Domain name space is split into three sections: country, generic and inverse -Generic domains define hosts by generic behavior -Country domains are

Ip address, how can u identify the ip class of given ip address

how can u identify the ip class of given ip address

Computer nework critira, what is compurter network and types, topology, com...

what is compurter network and types, topology, communication media

Distributed systems, There are two dominant forms of building distributed s...

There are two dominant forms of building distributed systems: client-server systems, i.e. systems in which one machine acts as a server and act as clients; and peer-to-peer systems

Explain imap, Short for Internet Message Access Protocol. This is another m...

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Single mode for transmitting optical signals, Q. Single Mode for transmitti...

Q. Single Mode for transmitting optical signals? - Merely one beam from a light source is transmitted using a smaller range of angles - Smaller diameter as well as lower de

Nics and network hardware, NICs AND NETWORK HARDWARE:  NIC is create f...

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd