What Is Data Link Switching (DLSw)?

TechDogs Avatar

Data Link Switching (DLSw) is the way to go when you want to take your non-IP traffic with you on the road. DLSw stands for data link switching, and it's a tunneling protocol that lets you direct unroutable non-IP protocols across IP networks. Certain legacy IBM Systems Network Architecture (SNA) or NetBIOS Frames (NBF) protocols are inaccessible and non-IP-based. DLSw carries SNA and NetBIOS traffic over IP networks instead of source-route bridging. Source-route bridging is used for packaging local area network data for transmission over a wide area network, where it is initially encapsulated in TCP packets. DLSw was first published to the public in 1993 as IETF RFC 1434. It was later enhanced and republished in 1995 as IETF RFC 1795. The joint development of DLSw was accomplished by the Data-Link Switching Related Interest Group and the Advanced Peer-to-Peer Networking Implementors Workshop. DLSw is an implementation of X.25 for TCP/IP networks, allowing users to use X.25 services transparently over a TCP/IP network. It uses sockets to provide connectionless datagram service over an IP network, which offers low overhead and efficient support for real-time traffic such as video or voice. DLSw is sold commercially by many vendors, including Cisco Systems Inc., which acquired the technology from Digital Equipment Corporation in 1997. Two peers are like two peas in a pod. They're so close they can't see each other, but they're also completely different. Peers are an essential part of a DLSw network. Without them, you'd have no connection, making them so unique! A peer is like your friend who always has your back. It connects to other peers and updates them about its capabilities, but it only connects to some. It only connects with people it knows—other peers! Peers can be classified into three types, namely, the active peer, the passive peer, and the promiscuous peer. The active peer establishes connections with other peers that are already known. The passive peer accepts connections from other available peers. The promiscuous peer accepts any connection from any peer, whether known or not.

TechDogs Logo

Related Terms by Networking Solutions

New Enterprise Operating Model (NeoM)

The term New Enterprise Operating Model (NeoM) is a mouthful. To get forward in business IT, you need to know what it means—and why it matters. NeoM stands for "new enterprise operating model." It's a term that refers to the fundamental adaptation of companies to new IT realities. Aspects of NeoM involve reimagining the business platform, breaking down silos and diversifying services for business process automation and more. In other words, this is where your company goes from being able to do one thing (like make widgets) well to doing a whole bunch of things (like making widgets and also making waffles) well. It's important because it means you can offer more value to your customers—which will always be a good thing! It's not just enough to change the ways that businesses build platforms. A NeoM involves more. You need to use software like customer relationship management (CRM) systems and enterprise resource planning tools—not just any old CRM or ERP system, but ones designed for the modern age. It would be best to have more targeted analytics operations to support your business as you move forward. In short, NeoM isn't just about changing how you build platforms; it's about ensuring your entire business is built for today's world. NeoM is not new. It's an old idea that has existed for a long time but never really caught on. Now, NeoM is coming back in a big way and here's why: Experts talking about NeoM often talk about changing our ideas about a business platform. The idea is that traditional API-based structures are not the end solution and that other technologies can be added to provide a much more productive result. What does this mean? It means you can use NeoM to create your proprietary technology or modify existing technologies to get them working better for you!

...See More

Non-Fungible Token (NFT)

You are interested in non-fungible tokens (often abbreviated as NFTs). NFTs are an absolute blast! Do you know that conventional currency, such as a dollar note, is fungible, meaning it may be exchanged for another of the same denomination while retaining its original value? NFTs, on the other hand, are the complete antithesis of this. They are one-of-a-kind digital assets that cannot be copied or replaced. They are the equivalent of one-of-a-kind snowflakes in the digital realm. Non-fungible tokens (NFTs) are tokens kept on a blockchain analogous to a digital ledger that records and verifies all transactions. They can identify ownership and validity via intelligent contracts and may be used to represent everything from artwork to objects in video games to tweets. It's like having a rare collector card or a pair of sneakers from a limited edition, except it takes place in the digital world instead of the physical one. In addition to this, because they are one of a kind, collectors and investors may place a high value on them. Some NFTs have been sold for millions of dollars, which seems off. However, the amusement does not end there. The way we conceive of ownership and authenticity in the digital age may also be subject to a paradigm shift due to the possibilities of NFTs. Imagine being able to provide evidence that you are the rightful owner of a digital asset, such as a piece of artwork or a portion of the property that exists only in the virtual world. That is now possible, thanks to NFTs! To sum up, non-fungible tokens are one-of-a-kind digital assets that can neither be reproduced nor replaced. Due to this, they are in a class all by themselves and have the potential to be quite valuable. They are kept on a distributed ledger called a blockchain, and smart contracts are used to verify their ownership and legitimacy. Who knows, one day, we'll all be able to own a small piece of digital history in the shape of an NFT. One day we'll all be able to hold an NFT. Being alive right now could not be more thrilling!

...See More

NIST Cloud Computing Program

So, you're curious about the NIST Cloud Computing Program? Well, it's an excellent program about helping people use the cloud safely and securely. First, NIST stands for the National Institute of Standards and Technology. These guys are like the tech wizards who develop guidelines and standards to help people use technology better. Now, when we talk about the cloud, we're talking about all fancy computer servers on the internet somewhere. When you store data or run programs in the cloud, you use those servers instead of your computer. It's like renting a storage unit for your stuff instead of keeping it all in your house. So, what does the NIST Cloud Computing Program do? Well, it's all about ensuring people can use the cloud safely and securely. See, the cloud is that it's like a big party to which everyone is invited. People are there, and you only sometimes know whom you deal with. That's why security is super important when it comes to the cloud. The NIST Cloud Computing Program has many guidelines and best practices to help you use the cloud safely. They cover all kinds of stuff, like how to make sure your data is encrypted (that means it's scrambled up so no one can read it), how to make sure your cloud provider is trustworthy, and how to make sure your data is backed up (that means you have copies of it in case something wrong happens). One of the cool things about the NIST Cloud Computing Program is that it's not just for big companies or tech wizards. Anyone can use it! If you're a small business owner who wants to use the cloud to store your data, the NIST Cloud Computing Program can help you do it safely. If you're a regular person who wants to keep their photos in the cloud, the NIST Cloud Computing Program can help you do it safely too! Now, there are some technical terms you should know if you want to get into the nitty-gritty of the NIST Cloud Computing Program. For example, there's something called "multi-tenancy," meaning that many people use the same servers in the cloud. There are also "service-level agreements," which are like contracts between you and your cloud provider that outline what kind of service they will give you. "cloud migration" moves your data and programs from your computer to the cloud. So, that's the NIST Cloud Computing Program in a nutshell! It's all about helping people use the cloud safely and securely, and it's not just for big companies or tech wizards. It includes technical terms like multi-tenancy, service-level agreements, and cloud migration. If you're interested in using the cloud but want to ensure you're doing it right, the NIST Cloud Computing Program is worth checking out!

...See More

Join Our Newsletter

Get weekly news, engaging articles, and career tips-all free!

By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.

  • Dark
  • Light