Sigh.

Newtonian physics works to several 9's of accuracy, and is good enough
for almost everything that humans encounter. That's a whole different
beast than the OSI stack, where, unless I'm thoroughly confused, the
only thing that's even close to widely used that somewhat follows that
model is X.400.

Tell me - when was the last time in your memory where you thought
something like "Oh, this is operating at layer 5 instead of layer 6 or
layer 4"?

Kurt

On Sun, May 30, 2010 at 23:14, Ken Schaefer <[email protected]> wrote:
> Well, if that's your only argument, then no one should be using Newtonian 
> physics, because it's "not scientific", it's a flawed model, and it fools us 
> into thinking something that isn't so... But last time I checked, Newtown's 
> laws of motion were good enough to put man on the moon. And it still gets 
> taught in science classes all around the world.
>
> Cheers
> Ken
>
> -----Original Message-----
> From: Kurt Buff [mailto:[email protected]]
> Sent: Monday, 31 May 2010 1:46 PM
> To: NT System Admin Issues
> Subject: Re: Applicability of the OSI model (was: Big Changes)
>
> On Sun, May 30, 2010 at 13:06, Ben Scott <[email protected]> wrote:
>> On Sat, May 29, 2010 at 4:05 PM, Kurt Buff <[email protected]> wrote:
>>> The 4-layer TCP/IP model makes a better model, because it's closer to
>>> what's actually used.
>>
>>  Way to not respond to anything I or anyone else wrote.
>>
>>  It appears your entire argument is "OSI isn't TCP/IP".  I could
>> reiterate my entire post, and also touch on what some other people
>> wrote, but if seems like you're not listening and won't respond, so I
>> don't see the point.
>
> Well then, to expand upon my thoughts:
>
> Using a model that bears little relationship to reality is a faux pas, and 
> likely to lead you to bad conclusions. There are also dangers involved in 
> adding layers to a conceptual model of networking, as described in RFC3439 
> (https://tools.ietf.org/html/rfc3439).
>
> It ain't scientific.
>
> I believe it's better to acknowledge that everything above layer 3 is a bunch 
> of different protocols, some of which stand alone and some of which are 
> encapsulated in other protocols, than to use a flawed model and fool 
> ourselves into thinking something that isn't so.
>
> Kurt
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to