ImageVerifierCode 换一换
格式:PDF , 页数:11 ,大小:640.46KB ,
资源ID:802589      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-802589.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T Q 940-1988 ISDN User-Network Interface Protocol for Management - General Aspects - Digital Subscriber Signalling System No 1 (DSS 1) Network Layer User-Network Management (St.pdf)为本站会员(周芸)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T Q 940-1988 ISDN User-Network Interface Protocol for Management - General Aspects - Digital Subscriber Signalling System No 1 (DSS 1) Network Layer User-Network Management (St.pdf

1、CCITT FASCICLE VI.33 88 4862573 0507084 b SECTION 2 USER-NETWORK MANAGEMENT Recommendation Q.940 ISDN USER-NETWORK INTERFACE PROTOCOL FOR MANAGEMENT - GENERAL ASPECTS 1 General This Recommendation is one of a proposed series of Recommendations describing the management model, service elements and pr

2、otocol to be provided at the ISDN user-network interface. These Recommendations also specify the management functions required to support the ISDN subscriber installation. This Recommendation describes the Management Architecture and provides a general overview of the management services and functio

3、ns. Other Recommendations in this series will specify the System Management Service Elements and Protocol and the procedures associated with management functions. The management functions provided at the user-network interface have, as an objective, full alignment with the network management functio

4、ns being addressed by the Telecommunications Management Network (TMN) and the Management Framework for Open System Interconnection (OSI). While the TMN defines management functions from a network perspective, this Recommendation describes the management functions from the subscriber perspective and

5、provides for remote user management functions. 1.1 Scope This series of Recommendations will provide for a common approach for management communications to support procedures used by a remote maintenance centre, internal or external to the network and those initiated locally. These Recommendations d

6、eal with the specification of the following items: a) b) c) d) e) f) the specification of a Management Architecture and identification of communications paths; the specification of management functionality to be provided at the ISDN user-network interface; the specification of an information exchang

7、e protocol for the exchange of management information between two peer system management application entities (SMAE); the specification of primitives between the Management Application process (user) and the SMAE (Le., the primitives at the systems management service interface (SMSI); the specificat

8、ion of service primitives between the SMAE service element and the next lower layer service elements (Le., primitives at the presentation layer service access point (PSAP); the specification of a convergence function that may be required to permit the direct access of the SMAE service elements to se

9、rvices provided by layer 3 e., the primitives at the network layer service access point (NSAP). 1.2 Field of application The protocols and procedures described in these Recommendations provide the means to support management functions at the ISDN user-network interface. Management activities that ma

10、nage network services, operations such as network resource configuration, routing information and maintenance activities shall be 425 Fascicle VI.11 - Rec. Q.940 Y 7 - - Previous page is blank CCITT FASCICLE VI.33 88 m 4862593 0507085 8 m! supported by the functions and protocols defined in these Re

11、commendations. In particular these management functions should be able to support specific requirements such as those defined in the 1.60-Series of Recommenda- tions (Subscriber Access and Installation Maintenance). These protocols make it possible to control loopbacks and diagnostic tests, initiate

12、 and terminate event reporting and to exchange management information across the ISDN user-network interface, i.e., between equipment connected to the S/T reference points. The physical layer signals in the digital transmission section which are used to control maintenance functions are outside the

13、scope of this Recommendation. The protocols can be used on the D Channel of both the basic and primary rate interface structures and across both reference points S and T. The higher layer protocols can also be used on other ISDN channels and services. The protocols and procedures described in these

14、Recommendations take into account that interactions with the TMN will occur. It is, therefore, desirable that the services and protocols to be used to support access management are aligned, wherever possible, with those to be defined for the TMN and OS1 management. 2 Categories of management informa

15、tion exchange Management information exchanges may be categorized into the following three categories: a) b) Event notification: information transfer initiated by one system reporting instantaneously the occur- rence of an event (e.g., a fault occurrence) to another system. Data transfer: informatio

16、n exchange initiated by one system in order to get management-related information from another system. These exchanges follow the “request followed by response” paradigm. Control information: information exchanges which are of an executive nature, where one system requests that an action be performe

17、d by another system (e.g., for test access and downloading of parameters). c) 3 Management functions Management functions may be classified in accordance with fields of application. The following major functions have been identified: a) Fault management - Maintenance functions - Fault tracing - Spon

18、taneous error reporting - Error threshold alarm reporting - Continuous monitoring - Diagnostic testing - Resource (re)initialization - Confidence testing - Resource identification - Trouble isolation. b) Configuration management - Routing changes - Data base changes - Equipment identification - Netw

19、ork/equipment reconfiguration. - Reporting of billing data. c) Accounting management d) Performance management - - Performance monitoring - Applying controls. Collecting and reporting of traffic data e) Security management. f - 426 Fascicle VI.ll - Rec. 4.940 *-I _? CCITT FASCICLE VI-LL 88 48b259L 0

20、50708b T = 4 Management reference models 4.1 Communications path model Figure /Q.940 shows the entities which may contain System Management Entities (SME) which may require capability to communicate. System Management Entities may be located in, the local exchanges, subscriber installations, remote

21、management centres or network management centres. The management functions supported by the various systems may differ depending on system requirements and may vary between different networks. However, the communications facilities provided by the systems management entities should be as common as p

22、ossible. The scope of this Recommendation covers those functions and protocols that have immediate impact on the user-network interface. The system management entities may be in a TE, NT2 or management service provider. Although communication between any two management entities may be possible in th

23、e model, it does not imply that information held at a particular management entity is available to all other management entities. Security mechanisms may be used to restrict access to the information. . - Optional communication paths in the network FIGURE 1/Q.940 Management communication model Fasci

24、cle VI.ll - Rec. 4.940 ri - -, 427 CCITT FASCICLE VI.33 88 4862573 0507087 3 D Figure 1/Q.940 shows that three types of management communications can be accommodated: a) TE (or Remote Management Centre) - TE (1 -2); b) TE - Network Management Function (1 - 3); c) TE - Network Management Function - T

25、E (1 - 3 -2): Types a) and b) are direct peer communication. In type c), the TE requests the Network Management Entity to act as an agent which then, on behalf of the requesting TE, communicates with another TE. 4.1.1 Secure access to management and maintenance functions To facilitate maintenance pr

26、ocedures and fault sectionalization, maintenance entities located in different management domains may communicate. However, since management and maintenance information is of critical importance to system integrity, access to management functions and information is subject to prior authorization and

27、 security restrictions upon access. The security restrictions are normally enforced by the recipient of the management information but may be enforced by the originator independently of any security imposed by the recipient. The security measures may include requirements for peer-entity authenticati

28、on. The use of adequate security mechanisms is especially important in the case of a network since many users may be affected by unauthorized access. Whenever system management communication crosses an S or T reference point, the requirement for access authorization must be presumed. Note - This doe

29、s not preclude implicit actions on layer management parameters as specified within the relevant signalling protocols, e.g., Recommendations 4.921 and 4.93 1. These actions are, however, beyond the scope of this Recommendation. 4.2 System management entity Figure 2/Q.940 shows the internal structure

30、of the SME. 4.2.1 System management application entity (SMAE) The SMAE is an application layer entity that supports system management functions. The SMAE is responsible for communication with peer systems. The function of the SMAE is to provide the communications necessary to make a system managemen

31、t accessible to another SMAP. It is not necessary for the SMAE to be provided if only local system management is required. 4.2.2 system management application process (SMAP) An SMAP is an application process of a system performing management functions. The SMAP controls the SMAE, and includes the Ma

32、nagement Information Base (MIB) and may include one or more managers providing various functionalities. 4.2.3 management information base (MIB) The MIB is the repository of all information relevant to the operation of a system. Both the SMAP and Layer Management Entities (LME) have access to the MIB

33、. 4.2.4 layer management entity (LME) The LME is that part of a Layer Entity which manages resources and parameters residing in its layer protocol entity. 4.2.5 protocol entity (PE) The PE is that part of a layer entity which is dedicated to peer-to-peer communications. A layer PE provides services

34、to the next upper layer and uses services of the next lower layer. 428 Fascicle VI.11 - Rec. 4.940 - - 7 CCITT FASCICLE VI-LL 88 986259L 0507088 3 m System Management Application Process (SMAPI Management Information Base (MIB) System management service interface (SMSI) -.-.-.-.-.-.-.-.-.-.- -.-.-.-

35、.-. T“ M-type primitive System management MIP LM E application entity (SMAE) ii ii ii i 4 II il II ii ii * 4b LME L6 PE -4; LM E L5 PE +-i-, LME L4 PE II 4 ii II ii i LM E L3 PE i 4.- i +:- LM E L2 PE Il 4; LME LI PE II P-type primitive Note - See 8 4.2.5. N-type primitive Layer management Tl107451-

36、88 service interface (LMSII LI Layer 1, etc. MIP Management information protocol LME Layer management entity PE Protocol entity FIGURE 2/Q.940 System management entity model It should be noted that this model presently permits communication between peer management processes either by attaching to a

37、Presentation Layer Access Point (PSAP) or by attaching directly to the Network Layer Service Access Point (NSAP). A convergence function may be provided as an alternative to the full seven layer OS1 Reference Model (as specified in Recommendation X.200) to accommodate simple terminals that may be us

38、ed in the ISDN environment. If provided, the functions will be kept to a minimum, i.e., the OS1 layer services lost by elimination of layers 4-6 will not be recovered by the convergence function. Therefore, the use of all seven layers is to be preferred. This has the consequence that “convergence fu

39、nctions“ may need to be specified. Fascicle VI.ll - Rec. 4.940 429 , CCITT FASCICLE VI.33 88 m 4862593 0507089 5 m 4.2.6 Management information protocol (MIP) The Management Information Protocol provides the support for information exchange between peer SMAEs. 4.3 Managed objects: a hierarchical obj

40、ect model 4.3.1 Definitions 4.3.1.1 managed object A managed object is a collection of data objects and telecommunications or information processing resources that may be managed by means of the management protocol specified in this Recommendation. 4.3.1.2 A data object is an object that is the dire

41、ct recipient of an action or generator of an event report. 4.3.2 Hierarchical object model The maintenance functions are described as asymmetric functions using symmetrical communications paths. A maintenance activity is always started by an Invoker who is asking an Executor to manipulate event repo

42、rts or data objects. These can be classified as belonging to individual managed objects. Each elementary operation that will have to access or refer to data objects will identify these by specifying first the managed object to which they belong and then identifying them within the managed object. A

43、hierarchical object model is defined that allows access to any individual data object in a simple way. When a given managed object may be duplicated, an instance identifier will help to resolve the ambiguity. As an example, the model for user-network ISDN access interface is represented by the hiera

44、rchical tree of Figure 3/Q.940. /.C.-.- /? ?. 1 ISDN interface . -. 7? . .i ( . Bn D Signalling circuit mode packet mode packet mode (packet mode) LI L2 L3 LI L2 L3 LI L2 L3 LI T1108820-87 FIGURE 3/Q.940 Example hierarchical object tree The parameters and event reports pertaining to a particular man

45、aged object can then be defined implicitly within the managed object. Some managed objects may be empty when no data object is identified within them. In this case they are only present as an indication of a hierarchical level. It has to be noted that the ISDN user-network access interface model onl

46、y contains managed objects that belong to the network access functions, i.e., that are involved in the provision of the required bearer service (signalling and lower layer protocols on the bearer channels). The protocols that are not involved in the provision of the bearer service are excluded from

47、this model as they belong to the application part. Note - The identity of an object at the executing end may not be known to the Invoker when it requests a maintenance action at the remote end of a connection. In this case the Executor will be able to identify the object by the context of the connec

48、tion path used to convey the maintenance request. Fascicle VI.ll - Rec. 4.940 - 430 - r- 7 CCITT FASCICLE VI-II 88 m 4862593 0507090 I m As an example, remote maintenance may be required on an existing B Channel connection. The channel identity is only locally significant at each end. The maintenanc

49、e request must be transmitted over the signalling connection that is used to control the B Channel associated with the existing call. The identity of the B Channel will be implied by the signalling connection used to convey the maintenance request. 5 Management structure and activities This section considers the specific structure and activities of management in terms of system management, layer management and protocol processing for management purposes. 5.1 System management This section introduces the concept of system management, its boundaries and other structures an

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1