Information technology – Open Systems Interconnection – Systems Management: Software management function |
 |
Operations Systems (OS) Network Elements (NE) and other systems will occasionally be subject to software changes. These changes may include program code, such as a new version of some call processing related programme or revised routeing tables. The need within a network is to be able to manage software that can be changed or modified by some remote OS. In this context management can include: control over the downloading process for transfer of a software product from an OS to another system such as an OS or NE; control of installing downloaded software into the suite existing at the system; and the ability to check the version of software installed in a system. This Recommendation | International Standard provides a standard X.700 message based means to mange this software process to meet these needs. The method of software transfer between an OS and another system is not specified or constrained in any way by this Recommendation | International Standard but practically could include file transfer, electronic mail or postal services with floppy disks. The role of this Recommendation | International Standard in this transfer is to mange the start of delivery to another system by maintaining information about the start of a software delivery and relating this to actual receipt, resulting from a notification by the receiving system of successful delivery. |
|
Citation: |
https://handle.itu.int/11.1002/1000/3896 |
Series title: |
X series: Data networks, open system communications and security X.700-X.799: OSI management X.730-X.799: Management functions and ODMA functions |
Approval date: |
1996-10-18 |
Identical standard: | ISO/IEC 10164-18:1997 (Common) |
Approval process: | WTSA |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 2 |
Further details: |
Patent statement(s)
|
|
|
X.744 (1996-10)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|