ISO/IEC 30100-2:2016
Current
The latest, up-to-date edition.
Information technology Home network resource management Part 2: Architecture
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
14-04-2016
ISO/IEC 30100-2:2016(E) specifies the general information model and architecture for managing the resources in a home network. Home network resources are managed objects that provide home network services. Essential home resources include device, network and service resources.
DocumentType |
Standard
|
Pages |
193
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
CAN/CSA-ISO/IEC 30100-2:18 | Identical |
13/30258457 DC : 0 | BS ISO/IEC 30100-1 - INFORMATION TECHNOLOGY - HOME NETWORK RESOURCE MANAGEMENT - PART 1: REQUIREMENTS |
ISO/IEC 30100-1:2016 | Information technology Home network resource management Part 1: Requirements |
BS ISO/IEC 30100-3:2016 | Information technology. Home network resource management Management application |
ISO/IEC 30100-3:2016 | Information technology Home network resource management Part 3: Management application |
CAN/CSA-ISO/IEC 30100-3:18 | Information technology — Home network resource management — Part 3: Management application (Adopted ISO/IEC 30100-3:2016, first edition, 2016-04) |
CAN/CSA-ISO/IEC 30100-1:18 | Information technology — Home network resource management — Part 1: Requirements (Adopted ISO/IEC 30100-1:2016, first edition, 2016-04) |
ATIS T1.413 : 98 SUPP A 2001 | NETWORK TO CUSTOMER INSTALLATION INTERFACES - ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL) METALLIC INTERFACE |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 7498-1:1994 | Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model |
ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
ISO 16739:2013 | Industry Foundation Classes (IFC) for data sharing in the construction and facility management industries |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
ISO/IEC 29145-2:2014 | Information Technology - Wireless Beacon-enabled Energy Efficient Mesh network (WiBEEM) for wireless home network services Part 2: MAC Layer |
ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 15944-8:2012 | Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 14543-2-1:2006 | Information technology - Home electronic systems (HES) architecture Part 2-1: Introduction and device modularity |
ISO/IEC 27010:2015 | Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
ISO/IEC 18012-1:2004 | Information technology Home Electronic System Guidelines for product interoperability Part 1: Introduction |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
IEEE 802.16-2012 | IEEE Standard for Air Interface for Broadband Wireless Access Systems |
ISO/IEC TR 27008:2011 | Information technology Security techniques Guidelines for auditors on information security controls |
ISO/IEC 27007:2017 | Information technology Security techniques Guidelines for information security management systems auditing |
IEEE 1901-2010 | IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications |
ISO/IEC 30100-1:2016 | Information technology Home network resource management Part 1: Requirements |
ISO/IEC/IEEE 8802-3:2017 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 3: Standard for Ethernet |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 18012-2:2012 | Information technology Home Electronic System Guidelines for product interoperability Part 2: Taxonomy and application interoperability model |
ISO/IEC 27009:2016 | Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.