Information technology – Open Systems Interconnection – Systems Management: Management domain and management policy management function |
|
Effective management of a network requires network partitioning that reflects both organizational and functional groupings. An example of organizational grouping is the partitioning of managed objects into groups that follow some logical, or convenient, rationale (e.g. geographical, et al.). An example of functional grouping is the partitioning of managed objects by management activity or functional areas of responsibility (e.g. fault, configuration, accounting, performance, and security).In practice, both aspects are related and the need to flexibly control creation, modification and their relationships over time is needed. Additional mechanisms are required that enable the application and management of policies to these groupings. An example of a policy in this context is: for a group of managed systems to send fault reports to Managing system "x" between 08:00 and 18:00 hours and at other times send to Managing system "y".Recommendations X.701 and X.749 provide an X.700 based method for satisfying this need by defining partitions of managed objects as management domains, policies as management policy objects, and the intersection between the two as a management juridiction.Management information and messages are defined to control creation of domains and, any, later changes as necessary to that domain using X.700 based messages. |
|
Citation: |
https://handle.itu.int/11.1002/1000/3092 |
Series title: |
X series: Data networks, open system communications and security X.700-X.799: OSI management X.730-X.799: Management functions and ODMA functions |
Approval date: |
1997-08-09 |
Identical standard: | ISO/IEC 10164-19:1998 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 2 |
Further details: |
Patent statement(s)
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.749 (08/1997)
|
In force
|
here
|
here
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|