Information technology – Open Systems Interconnection – Systems Management: Confidence and diagnostic test categories |
|
This Recommendation | International Standard specifies a number of generally useful "test categories" such as "connection request", loop back test and data integrity test. For each of these, a standard approach is used in terms of the components of the test category such as the purpose of the test, the resources, as defined in Recommendation X.745, test environment and content of result report, etc. The "inheritance" relationship among test object classes (representing test categories) is defined and the specifications of these as managed objects, included. This Recommendation | International Standard provides a means for other, notably TMN related groups, to use the same method for test category specification. This Recommendation | International Standard should be considered with the Test Management Function in Recommendation X.745. |
|
Citation: |
https://handle.itu.int/11.1002/1000/3079 |
Series title: |
X series: Data networks, open system communications and security X.700-X.799: OSI management X.730-X.799: Management functions and ODMA functions |
Approval date: |
1995-11-21 |
Identical standard: | ISO/IEC 10164-14:1996 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 2 |
Further details: |
Patent statement(s)
|
|
|
X.737 (1995-11)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|