Information technology – Open Systems Interconnection – Systems Management: Management knowledge management function |
 |
An Operations Systems (OS) can only interwork with another OS or Network Element (NE) if it has knowledge about the precise management information and management message types the other OS or NE is capable of supporting for management interactions. There are many ways this knowledge can be obtained and inserted into an OS or NE product's software. This Recommendation provides the means to specify knowledge management information and messages, that allow for the "on line" transfer from one system to another the specific details of this information. The administration of a management network will be made more efficient by the use of systems that have this management knowledge capability because for example: transfer of this knowledge is provided using standard X.700 knowledge management messages thus precluding the need for vendors, who require their products to interwork, to come to some local agreement for OSI systems management based messages, during operational service checks can be made about the capability of an OS or NE; and there is a standard way to augment the management information and messages that an OS or NE; and there is a standard way to augment the management information and messages that an OS or NE can support. An alternative to the use of X.700 messages is the use of X.500 Directory services and in support of this, this Recommendation | International Standard defines Directory entries to hold this information. |
|
Citation: |
https://handle.itu.int/11.1002/1000/3095 |
Series title: |
X series: Data networks, open system communications and security X.700-X.799: OSI management X.730-X.799: Management functions and ODMA functions |
Approval date: |
1996-10-05 |
Identical standard: | ISO/IEC 10164-16:1997 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 2 |
Further details: |
Patent statement(s)
|
|
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|