wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Sessions In OS.

profile
Shubham Yadav
Sep 11, 2024
0 Likes
0 Discussions
135 Reads

In an operating system (OS), a **session** generally refers to the period of time when a user or a process is actively using the system. Sessions are essential for managing user interactions, processes, and resources efficiently. Below are a few different types of sessions and their significance:


### 1. **User Sessions**

- A user session begins when a user logs into the system and ends when they log out. During this session, the OS maintains all processes, user files, and settings related to the user’s activity.

- Each user session typically has its own environment, including file permissions, access rights, and running applications.


### 2. **Terminal/Console Sessions**

- In systems like Linux or Unix, terminal sessions are created when a user opens a terminal or console. Each terminal session can run commands independently, with its own process ID (PID).

- **TTY (Teletype Terminal)** sessions: Text-based input/output streams, often seen in Unix-like operating systems.

- **PTY (Pseudo Terminal)** sessions: Used for creating terminal emulation, often by software like SSH.


### 3. **Network Sessions**

- Network sessions manage connections between a client and a server. These sessions are crucial in handling data transmission, ensuring proper communication between systems.



### 4. **Session Management in Windowing Systems**

- In graphical desktop environments (like GNOME, KDE), a session includes not only the user’s login state but also all open windows, running applications, and system preferences.

- These sessions may allow users to restore the desktop environment to the previous state upon re-login.


### 5. **Session Management in Web/Network Applications**

- Web applications create **sessions** to manage user state over stateless HTTP. A session in web terms might involve tracking user activities, login status, preferences, and shopping cart items.

- Sessions are managed using cookies or session tokens, which allow web servers to recognize consecutive requests from the same user.


### 6. **Process Sessions**

- In Unix-like operating systems, a session is a collection of one or more processes created by a single login.

- Processes in the same session share the same session ID (SID). A session leader (usually a shell) can create new processes within the session.

- Sessions are typically grouped into **process groups** and can be controlled by job control signals such as `SIGTERM` (terminate), `SIGHUP` (hang up), etc.


### 7. **Session Management in Virtualization/Containers**

- In environments like Docker or virtual machines, sessions refer to the time period when a user or process interacts with a virtual instance or container. Each container or VM operates within its own session and namespace, isolated from others.


### Commands to Manage Sessions:

- **`who`**: Shows users currently logged in.

- **`w`**: Displays active user sessions along with what they are doing.

- **`ps`**: Displays process information, including sessions and groups.

- **`loginctl`** (Linux): Manages and inspects user sessions.

- **`kill`**: Used to terminate a session by killing processes related to it.


Comments ()


Sign in

Read Next

ADD A SPICE TO YOUR LIFE.

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Hash password! Is it really secured?

Blog banner

Brain wash of social media

Blog banner

Data Mining

Blog banner

Evolution of Operating Systems

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

GraphX:- A graph processing tool

Blog banner

Software

Blog banner

Buffering

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Hosting basics

Blog banner

Blog on health and fitness

Blog banner

SQL Injection practice on DVWA

Blog banner

computer security

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

E-mail security

Blog banner

bulk email software

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Memory Management in Operating System

Blog banner

Data Warehouse Bus Matrix

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Deadlock in operating system

Blog banner

Service transistion under difficult conditions

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Steganography and Steganalysis

Blog banner

Hacking of web server and application

Blog banner

Direct Memory Access

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Clarizen

Blog banner

geographic information system (GIS)

Blog banner

LISP - Library Management System

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Development Of Modern Operating System

Blog banner

Why we fail after giving 100% ?

Blog banner

Marvel Cinematic Universe

Blog banner

memory cache

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

S-Tool : Steganography

Blog banner