Howard,
             Is this from your upcoming book for ISPs?  Can you provide a
name/title and when we can expect to see it on shelves.

TIA
Nigel .

----- Original Message -----
From: "Howard C. Berkowitz" 
To: 
Sent: Thursday, September 27, 2001 12:16 AM
Subject: RE: which layer BGP,RIP ,OSPF work on [7:21226]


> >My intention of creating this thread again was just to clarify things as
> >some of us concluded that BGP,RIP,OSPF are at network layer.
> >Why I quoted the stuff in capital and if it hurt some of the members ,I
am
> >sorry but it was just to highlight that this is given in Cisco Press book
> >and whose author is CCIE and ofcourse reviewed by Imran Qureshi Program
> >Manager from Cisco on CCIE series of books.
> >
> >So again is it right that
> >
> >1)RIP,BGP are at application
> >2)OSPF is at Transport layer
> >
>
> If Jeff said this, it is wrong. Simple as that.
>
> Even if the logic were that anything that runs over layer (N) must be
> layer (N+1), that would put RIP and BGP at Session, and ISIS at
> Network.
>
> The original OSI model defined in ISO 7498 was published in 1984 and
> did not contain routing protocols at all, nor did it contain
> connectionless communications.
>
> But if you really want a model:
>
>
> The Seven Deadly Layers
>
> By Howard C. Berkowitz
>
> Among the most frequent questions I'm asked in OSI teaching
> is, "Do I need to know what all the layers do?" This is especially
> true of management
> audiences, who "need to know" the power centers. (They may not know what a
> layer is, but they know there are seven of them and they don't want a
> single one to go unsupervised.)
>
> Over the years, I have found a useful analogy. Educational
> theory suggests we should start with something that the student knows
> and build from there.  Therefore, I ask management audiences to
> reflect not on theoretical network architecture, but on sin.
> Specifically, I ask them to consider the Seven
> Deadly Sins (Note 0).
>
> These sins have definite relevance to the OSI Reference Model. The "most
> popular" deadly sins are analogies for the layers most important for
> non-developers to know about. Audiences think of sins in a fairly
consistent
> way.
>
> Approximately 75 percent immediately think of Lust. Lust, clearly,
> relates directlyto the Physical Layer. It is essential to be aware of
> the function of the Lust Layer, for that defines how to "plug in."
> (Note 1)
>
> Most of the remaining audience split between Avarice and Gluttony. These
> also are important in OSI. Avarice, or Greed, is often realized
> as the Bottom Line  in business. One is closer to understanding the
> Tao of OSI when one realizes that it  places the Bottom Line (i.e.
> what OSI does for real user applications programs) on Top. The top of
> the Avarice Layer is the Service Access Point to the Application, or
> Avarice, Layer. ([Note 2)
>
> Those members of the audience who thought first of Gluttony also have some
> understanding of OSI. Gluttony deals with establishing a relationship
> between a mouth entity and a food entity. Network deals with the next
> course while Transport deals with the end goal of dessert. Users
> really need to  know the functions of Application, Transport/Network
> (as the distinction blurs here),  and Physical. They often also need
> to know the characteristics of the data link layer.
> Since Data Link has to deal with collisions, master/slave
> relationships, etc., it may  correspond to the sin of Anger.  I tend
> to associate the sin of Pride with the  Presentation Layer, on the
> grounds that Presentation is rather prideful to think that  it
> justifies its own layer.
>
> There is always one in the audience, however, who thinks of Sloth. Sloth
is a
> difficult sin. How does one confess it? "Bless me, I have slothed?"
> "Forgive me for committing sloth?" How can I commit not doing
> something? Since Sloth is a sin we really have trouble talking
> about,and involves not doing useful things, it is a relevant analogy
> to the Session Layer.
>
> Both Sloth and Session are needed for theological completeness, but
> their relevance to the ordinary sinner or the OSI user is fairly
> limited. [Note 4]
>
> If we were to redesign the OSI Reference Model today, its exact number
> of layers would be controversial, but it would almost certaily not be
> seven.  The flight from sevenness is seen in Internet usage and in
> the more obscure (but useful) ISO Technical Report 10000 taxonomy for
> defining
> protocol stacks (i.e., International Standardized Protocols).  Internet
> practice does use layered protocol stacks, but these rarely have seven
> layers (Network File System is an exception).  Typically, an application
> service such as File Transfer Protocol (FTP) includes the functions of
> the top three OSI layers, and in turn layers on top of TCP, a Transport
> layer protocol.  TCP, in turn, layers on top of IP, a network layer
> protocol.   IP runs over a generic Interface or Hardware layer that
> include   Data Link and Physical layers.
>
> In like manner, OSI stack specifications have a top A- or B-specification
> that defines a particular set of Application, Presentation, and Session
> protocols and their options.  The A- or B-profile runs over a lower layer
> stack definition, the first letters of which identify the transport and
> network protocols in use, followed by numbers referring to the data
> link and physical layers.  While little known outside OSI circles,
> this ISO 10000 methodology is useful as a notation for many multilayerd
> protocol stacks. (Note
> 3) Research funding is being sought to evaluate the possible
> relevance  of the Seven
> Dwarves to OSI.
>
>          (Note 0) Just as there are many theological interpretations in
> religion, this is not the only interpretation of "sevenness" and OSI
> layering.  David Piscitello independently presented a different mapping
> of sins to layers in the early 1980s.  A Mark Russell presentation gave
> the author insight on the meaning of confessing sloth.
>
> (Note 1) When presenting these analogies at an IEEE conference in New
> York, a woman's clear voice rang out from the back of the room.
> "Well,  I'm glad SOME
> standards body is defining how to plug in things correctly.  God
> knows most male engineers don't understand that at all."
>
> (Note 2) This part of the analogy can continue into Application
> ServiceElements: ACSE (the Avarice Control Service Element), ROSE (the
Remote
> Organization Submission Element), etc.
>
> (Note 3) After their first reading of Presentation Context Negotiation and
> ASN.1 Basic Encoding Rules, some nominate the sin of Pride as the proper
> analogy for the Presentation Layer.
>
> (Note 4) Session actually does useful things. The widely used Remote
> Procedure Call (RPC) protocol, which underlies NFS, is a pure session
> layer protocol.  NetBIOS, as distinct from NetBEUI, also essentially
> is a session layer protocol.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=21250&t=21226
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to