Sigh. Newtonian physics works to several 9's of accuracy, and is good enough for almost everything that humans encounter. That's a whole different beast than the OSI stack, where, unless I'm thoroughly confused, the only thing that's even close to widely used that somewhat follows that model is X.400.
Tell me - when was the last time in your memory where you thought something like "Oh, this is operating at layer 5 instead of layer 6 or layer 4"? Kurt On Sun, May 30, 2010 at 23:14, Ken Schaefer <[email protected]> wrote: > Well, if that's your only argument, then no one should be using Newtonian > physics, because it's "not scientific", it's a flawed model, and it fools us > into thinking something that isn't so... But last time I checked, Newtown's > laws of motion were good enough to put man on the moon. And it still gets > taught in science classes all around the world. > > Cheers > Ken > > -----Original Message----- > From: Kurt Buff [mailto:[email protected]] > Sent: Monday, 31 May 2010 1:46 PM > To: NT System Admin Issues > Subject: Re: Applicability of the OSI model (was: Big Changes) > > On Sun, May 30, 2010 at 13:06, Ben Scott <[email protected]> wrote: >> On Sat, May 29, 2010 at 4:05 PM, Kurt Buff <[email protected]> wrote: >>> The 4-layer TCP/IP model makes a better model, because it's closer to >>> what's actually used. >> >> Way to not respond to anything I or anyone else wrote. >> >> It appears your entire argument is "OSI isn't TCP/IP". I could >> reiterate my entire post, and also touch on what some other people >> wrote, but if seems like you're not listening and won't respond, so I >> don't see the point. > > Well then, to expand upon my thoughts: > > Using a model that bears little relationship to reality is a faux pas, and > likely to lead you to bad conclusions. There are also dangers involved in > adding layers to a conceptual model of networking, as described in RFC3439 > (https://tools.ietf.org/html/rfc3439). > > It ain't scientific. > > I believe it's better to acknowledge that everything above layer 3 is a bunch > of different protocols, some of which stand alone and some of which are > encapsulated in other protocols, than to use a flawed model and fool > ourselves into thinking something that isn't so. > > Kurt > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
