I can honestly say I've never run into that, in over 20 years of being a sysadmin. Once I got past layer 3, the use of system logs and testing with appropriate tools has always solved the problem.
Of course, I have rarely worked with developers as intensely as you seemed to have done. That's changing a great deal, as I now serve as an internal consultant to our software engineers, and I am seeing lots of ignorance of both software design from a sysadmin's perspective and network mechanics. Kurt On Mon, May 31, 2010 at 06:36, Erik Goldoff <[email protected]> wrote: > " Tell me - when was the last time in your memory where you thought > something like "Oh, this is operating at layer 5 instead of layer 6 or > layer 4"?" > > Frequently when dealing with some application 'developers' when > troubleshooting connectivity or performance issues. Many don't seem to > understand that Mapped drives via NET USE and other RPC/IPC type connections > are NOT at the NETWORK Layer 3 level, and figure if PING works then > everything they build for the data transport should too... had this argument > a few times in the past regarding DCOM and dcomcnfg used on heterogenous > networks ( VSAT, Frame-Relay, & Dial-ISP VPN all at once ) > > Outlining the FUNDAMENTALS of the OSI model HELPED the developers reference > what was taking place and why, and where things could go wrong, even if it > was not 100% accurate as a strict guideline. > > YMMV > > > Erik Goldoff > IT Consultant > Systems, Networks, & Security > > ' Security is an ongoing process, not a one time event ! ' > > > > -----Original Message----- > From: Kurt Buff [mailto:[email protected]] > Sent: Monday, May 31, 2010 2:23 AM > To: NT System Admin Issues > Subject: Re: Applicability of the OSI model (was: Big Changes) > > Sigh. > > Newtonian physics works to several 9's of accuracy, and is good enough > for almost everything that humans encounter. That's a whole different > beast than the OSI stack, where, unless I'm thoroughly confused, the > only thing that's even close to widely used that somewhat follows that > model is X.400. > > Tell me - when was the last time in your memory where you thought > something like "Oh, this is operating at layer 5 instead of layer 6 or > layer 4"? > > Kurt > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
