• Available Formats
    • Availability
    • Priced From ( in USD )
    • Secure PDF

      Secure PDF Files

      Secure PDF files include digital rights management (DRM) software. DRM is included at the request of the publisher, as it helps them protect their copyright by restricting file sharing. In order to read a Secure PDF, you will need to install the FileOpen Plug-In on your computer. The FileOpen Plug-In works with Adobe Reader and other viewers. Visit FileOpen to see the full list.

        What you can do with a Secure PDF:
      • Print
      • Search
      • Highlight
      • Bookmark
      Please note that some publishers - including BOMA, IADC and ICML - do not allow printing of their documents.

    • Immediate download
    • $90.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $90.00
    • Add to Cart

Customers Who Bought This Also Bought


About This Item


Full Description


Scope and Field of Application

This International Standard specifies

(a) procedures for a single protocol for the transfer of data and control information from one session entity to a peer session entity;

(b) the means of selecting the functional units to be used by the session entities;

(c) the structure and encoding of the session protocol data units used for the transfer of data and control information.

The procedures are defined in terms of

(a) the interactions between peer session entities through the exchange of session protocol data units;

(b) the interactions between a session entity and the session service user in the same system through the exchange of session service primitives;

(c) the interactions between a session entity and the transport service provider through the exchange of transport service primitives.

These procedures are applicable to instances of communication between systems which support the Session Layer of the OSI Reference Model and which wish to interconnect in an open systems environment.

This International Standard also specifies conformance requirements fo r systems implementing these procedures. It does not contain tests which can be used to demonstrate this conformance.