Created by Network ServicesLast Modified 11/8/2004 by Jeff Knuckle
- 2 -
THE LOGICAL MODEL.
Computer Systems can be mapped to a three layer logical model, the layers of the modelconsist of the APPLICATION Layer, NETWORK Layer and PHYSICAL Layer.APPLICATION LayerNETWORK LayerPHYSICAL LayerThe
layer corresponds to the applications running on the Server anduser’s computer, e.g. Microsoft Exchange on the server and Microsoft Outlook on theuser’s computer.The
layer corresponds to the devices that provide the transports for thevarious applications, e.g. Cisco Routers and Switches.The
layer corresponds to the physical cables that interconnect the varioussystems, e.g. the cat 5 cable that connects the user’s computer to the jack in the wall.(Network)
TROUBLESHOOTING WITH THE LOGICAL MODEL.
Using the logical model, Computer Systems problems generally falls in one of the three(3) logical layers. During stage 2 (Isolate the Problem stage) of the generaltroubleshooting process, verifying that each logical layer is functional will quickly helpto isolate the problem.Note: Each layer (except Physical layer) depends on the layer below it, therefore aproblem in the Physical Layer will result in a problem in the Application and Network layer, and a problem in the Network layer will affect the application layer but not thePhysical layer.
Verifying the Application Layer.
Verifying the application layer is straightforward, simply open any application on the endsystem or user’s computer and verify functionality, e.g., open Microsoft Outlook andensure that the application can view, send and receive e-mail.
Verifying the Network Layers.
Tools such as ping, ipconfig and tracert can be used to verify that there is end-to-endnetwork communication. Ping can also be used to verify that an End System is online.