I can honestly say I've never run into that, in over 20 years of being
a sysadmin. Once I got past layer 3, the use of system logs and
testing with appropriate tools has always solved the problem.

Of course, I have rarely worked with developers as intensely as you
seemed to have done. That's changing a great deal, as I now serve as
an internal consultant to our software engineers, and I am seeing lots
of ignorance of both software design from a sysadmin's perspective and
network mechanics.

Kurt

On Mon, May 31, 2010 at 06:36, Erik Goldoff <[email protected]> wrote:
> " Tell me - when was the last time in your memory where you thought
> something like "Oh, this is operating at layer 5 instead of layer 6 or
> layer 4"?"
>
> Frequently when dealing with some application 'developers' when 
> troubleshooting connectivity or performance issues.  Many don't seem to 
> understand that Mapped drives via NET USE and other RPC/IPC type connections 
> are NOT at the NETWORK Layer 3 level, and figure if PING works then 
> everything they build for the data transport should too... had this argument 
> a few times in the past regarding DCOM and dcomcnfg used on heterogenous 
> networks ( VSAT, Frame-Relay, & Dial-ISP VPN all at once )
>
> Outlining the FUNDAMENTALS of the OSI model HELPED the developers reference 
> what was taking place and why, and where things could go wrong, even if it 
> was not 100% accurate as a strict guideline.
>
> YMMV
>
>
> Erik Goldoff
> IT  Consultant
> Systems, Networks, & Security
>
> '  Security is an ongoing process, not a one time event ! '
>
>
>
> -----Original Message-----
> From: Kurt Buff [mailto:[email protected]]
> Sent: Monday, May 31, 2010 2:23 AM
> To: NT System Admin Issues
> Subject: Re: Applicability of the OSI model (was: Big Changes)
>
> Sigh.
>
> Newtonian physics works to several 9's of accuracy, and is good enough
> for almost everything that humans encounter. That's a whole different
> beast than the OSI stack, where, unless I'm thoroughly confused, the
> only thing that's even close to widely used that somewhat follows that
> model is X.400.
>
> Tell me - when was the last time in your memory where you thought
> something like "Oh, this is operating at layer 5 instead of layer 6 or
> layer 4"?
>
> Kurt
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to