You are watching: What layer in the osi model is responsible for logging on and off?
This question does not accomplish Stack Overflow guidelines. That is not at this time accepting answers.
Want to enhance this question? upgrade the concern so it's on-topic because that Stack Overflow.
Closed 3 years ago.
I\"m unsure if so is the best place for this question, but here goes:
Are login & logout procedures part of the session layer or the applications Layer the the OSI model?
The conference Layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e. A semi-permanent dialogue. Communication sessions consist of requests and responses the occur in between applications.
I\"m no clear around whether a session incorporates the complete login/logout procedure (for eg., as soon as I access my email account).
As much as I regulated to grok the definition of these 2 layers in the context of mine question,I think the applications layer is responsible for regulating the authentication & authorization the forms component of login procedures.
Please confirm my suspicions or repudiate with suitable reasons.
networking login osi
improve this inquiry
asked Feb 25 \"11 in ~ 8:19
add a comment |
3 answers 3
energetic earliest Votes
The OSI design is a theoretical reference model (aka no the actual thing)
When to compare the TCP/IP stack against the OSI model, girlfriend will watch that the OSI conference layer is reduced in half, half goes come the TCP and also the other half gos come the application.
Conclusion because that the OSI design login is component of the session layer, but for TCP/IP, login goes come the applications layer.
See wikipedia on the differences in between OSI and also TCP/IP.
enhance this prize
answer Feb 25 \"11 at 8:47
1,4411010 silver badges2020 bronze title
include a comment |
Yes, I believe you room correct. The is, in the OSI model, ns agree that the concept of \"login/logout\" might be considered component of the conference layer. It definitely doesn\"t it seems to be ~ to fall into presentation, and application is far too high-level. Application would certainly be came to with regulating the login/logout actions (such together prompting the user for the login, saving credentials/cookies, etc.) and it absolutely doesn\"t autumn into L4; a TCP connection is one L4 concept, and also a login/logout \"session\" can expectancy multiple TCP sessions.
For what it\"s worth, those of united state who have operated on networking devices (unless you\"re working on one application-aware proxy server/WAN optimizer or similar) often tend to only think in regards to layers 1-4. (maybe part of L5 if you room working on TCP) The rest of the OSI layers tend to blend together, which is why the TCP/IP model collapses them right into one. Those class are an ext in the domain of applications developers than network engineers.
improve this price
answer Feb 25 \"11 at 9:13
12.8k77 yellow badges5555 silver badges8989 bronze title
include a comment |
The semantic definition of what is intended by the ax logon and also logoff might determine the class involved.
It is feasible to take \"logon\" to typical \"connect\" without consisting of authentication or encryption. Literally -\"logon\", i connected...\"logoff\", i disconnected.
So while authentication happens within the application layer (e.g. HTTP name and also password) and also then the presentation layer takes the name and password and also encrypts lock to store them secret, the session layer is whereby the an initial literal logon - a.k.a. Link - (and prior to authentication take away place) happens.
So \"logon\" in this example means \"connect\" and should no be confused with \"website login\" or \"windows logon\", for which these latter two would involve authentication (at application layer) and - sensibly - encryption (at the presentation layer).
See more: How To Say Pen In Japanese ? Do You Know How To Say Pen In Japanese
However, to take it a genuine life example, TLS incorporates modern technologies that would be supposed from presentation and also application layers and also uses them come fashion an encrypted link that would generally exist at the conference layer. That is a pseudo conference layer protocol. Together such, ns would usage TLS as an example of exactly how the OSI version is a theorectical guide and frequently can not be applied to real world scenarios.