Anal-Canal 发表于 2025-3-30 09:49:37

https://doi.org/10.1057/9781137284297 to an Engineering model taking into account Enterprise requirements. It also provides correspondences between Engineering Viewpoint concepts and TMN concepts, and a set of guidelines for how to proceed from an Engineering model to a TMN target architecture.

Console 发表于 2025-3-30 15:57:24

https://doi.org/10.1057/9781137439284es. Metamanagement agents communicate with other specialised management processes, providing the TMN metamanagement service, according to the OSI manager/agent model. We show how this model is used to aid the configuration of prototype TMNs and how this can be automated to evolve to a self-managed, self-configured TMN.

反叛者 发表于 2025-3-30 18:00:36

http://reply.papertrans.cn/20/1909/190856/190856_53.png

gastritis 发表于 2025-3-30 21:11:55

Conference proceedings 1995 in October 1995; this book summarizes at the same time the main results of a group of RACE projects sponsored by the European Commission for several years. To meet the new challenges in broadband communication, service engineering has now emerged as a new discipline strongly related to software eng

放逐 发表于 2025-3-31 04:15:45

Requirements for rapid technological deployment and exploitation, some of the most recent results in the TMN and IN areas, and early trials with TINA-like systems. The specific requirements of the telecommunications services environment for integration of de facto and de jure standards and technologies, and for adaptation of distributed computing technology to le

表脸 发表于 2025-3-31 07:00:22

Issues in the integration of IN and TMN,vices and the increasingly complex supporting network infrastructure need to be managed. The Telecommunications Management Network (TMN) provides the framework for their management. Now, it is becoming clear that future sophisticated services, diverging from the simple telephony call model, will nee

Infusion 发表于 2025-3-31 10:30:26

Security services for telecommunications users,ices based on . (IN) techniques..This paper discusses — after an introduction to end-to-end security service requirements — the security architecture of the PSCS demonstrator. It gives examples how these requirements can be met by using existing demonstrator features..A . (PKCS) using the RSA encryp

大洪水 发表于 2025-3-31 15:08:20

TMN security: An evolutionary approach,ding blocks needed to achieve a company wide security policy and ensure the consistent usage throughout the Telecommunication Management Network. The OSI security architecture provides the flexibility necessary for the adaption to environments that deal with highly sensitive data like security m

联邦 发表于 2025-3-31 18:03:02

http://reply.papertrans.cn/20/1909/190856/190856_59.png

纬线 发表于 2025-3-31 22:12:23

http://reply.papertrans.cn/20/1909/190856/190856_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Bringing Telecommunication Services to the People - IS&N ‘95; Third International Anne Clarke,Mario Campolargo,Nikos Karatzas Conference p