summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8969.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc8969.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc8969.txt')
-rw-r--r--doc/rfc/rfc8969.txt2176
1 files changed, 2176 insertions, 0 deletions
diff --git a/doc/rfc/rfc8969.txt b/doc/rfc/rfc8969.txt
new file mode 100644
index 0000000..6d8805a
--- /dev/null
+++ b/doc/rfc/rfc8969.txt
@@ -0,0 +1,2176 @@
+
+
+
+
+Internet Engineering Task Force (IETF) Q. Wu, Ed.
+Request for Comments: 8969 Huawei
+Category: Informational M. Boucadair, Ed.
+ISSN: 2070-1721 Orange
+ D. Lopez
+ Telefonica I+D
+ C. Xie
+ China Telecom
+ L. Geng
+ China Mobile
+ January 2021
+
+
+ A Framework for Automating Service and Network Management with YANG
+
+Abstract
+
+ Data models provide a programmatic approach to represent services and
+ networks. Concretely, they can be used to derive configuration
+ information for network and service components, and state information
+ that will be monitored and tracked. Data models can be used during
+ the service and network management life cycle (e.g., service
+ instantiation, service provisioning, service optimization, service
+ monitoring, service diagnosing, and service assurance). Data models
+ are also instrumental in the automation of network management, and
+ they can provide closed-loop control for adaptive and deterministic
+ service creation, delivery, and maintenance.
+
+ This document describes a framework for service and network
+ management automation that takes advantage of YANG modeling
+ technologies. This framework is drawn from a network operator
+ perspective irrespective of the origin of a data model; thus, it can
+ accommodate YANG modules that are developed outside the IETF.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc8969.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Terminology and Abbreviations
+ 2.1. Terminology
+ 2.2. Abbreviations
+ 3. Architectural Concepts and Goals
+ 3.1. Data Models: Layering and Representation
+ 3.2. Automation of Service Delivery Procedures
+ 3.3. Service Fulfillment Automation
+ 3.4. YANG Module Integration
+ 4. Functional Blocks and Interactions
+ 4.1. Service Life-Cycle Management Procedure
+ 4.1.1. Service Exposure
+ 4.1.2. Service Creation/Modification
+ 4.1.3. Service Assurance
+ 4.1.4. Service Optimization
+ 4.1.5. Service Diagnosis
+ 4.1.6. Service Decommission
+ 4.2. Service Fulfillment Management Procedure
+ 4.2.1. Intended Configuration Provision
+ 4.2.2. Configuration Validation
+ 4.2.3. Performance Monitoring
+ 4.2.4. Fault Diagnostic
+ 4.3. Multi-layer/Multi-domain Service Mapping
+ 4.4. Service Decomposition
+ 5. YANG Data Model Integration Examples
+ 5.1. L2VPN/L3VPN Service Delivery
+ 5.2. VN Life-Cycle Management
+ 5.3. Event-Based Telemetry in the Device Self Management
+ 6. Security Considerations
+ 6.1. Service Level
+ 6.2. Network Level
+ 6.3. Device Level
+ 7. IANA Considerations
+ 8. References
+ 8.1. Normative References
+ 8.2. Informative References
+ Appendix A. Layered YANG Module Examples Overview
+ A.1. Service Models: Definition and Samples
+ A.2. Schema Mount
+ A.3. Network Models: Samples
+ A.4. Device Models: Samples
+ A.4.1. Model Composition
+ A.4.2. Device Management
+ A.4.3. Interface Management
+ A.4.4. Some Device Model Examples
+ Acknowledgements
+ Contributors
+ Authors' Addresses
+
+1. Introduction
+
+ Service management systems usually comprise service activation/
+ provision and service operation. Current service delivery
+ procedures, from the processing of customer requirements and orders
+ to service delivery and operation, typically assume the manipulation
+ of data sequentially into multiple Operations Support System (OSS) or
+ Business Support System (BSS) applications that may be managed by
+ different departments within the service provider's organization
+ (e.g., billing factory, design factory, network operation center).
+ Many of these applications have been developed in house over the
+ years and operate in a silo mode. As a result:
+
+ * The lack of standard data input/output (i.e., data model) raises
+ many challenges in system integration and often results in manual
+ configuration tasks.
+
+ * Service fulfillment systems might have a limited visibility on the
+ network state and may therefore have a slow response to network
+ changes.
+
+ Software-Defined Networking (SDN) becomes crucial to address these
+ challenges. SDN techniques are meant to automate the overall service
+ delivery procedures and typically rely upon standard data models.
+ These models are used not only to reflect service providers' savoir
+ faire, but also to dynamically instantiate and enforce a set of
+ service-inferred policies that best accommodate what has been defined
+ and possibly negotiated with the customer. [RFC7149] provides a
+ first tentative attempt to rationalize that service provider's view
+ on the SDN space by identifying concrete technical domains that need
+ to be considered and for which solutions can be provided. These
+ include:
+
+ * Techniques for the dynamic discovery of topology, devices, and
+ capabilities, along with relevant information and data models that
+ are meant to precisely document such topology, devices, and their
+ capabilities.
+
+ * Techniques for exposing network services [RFC8309] and their
+ characteristics.
+
+ * Techniques used by service-derived dynamic resource allocation and
+ policy enforcement schemes, so that networks can be programmed
+ accordingly.
+
+ * Dynamic feedback mechanisms that are meant to assess how
+ efficiently a given policy (or a set thereof) is enforced from a
+ service fulfillment and assurance perspective.
+
+ Models are key for each of the four technical items above. Service
+ and network management automation is an important step to improve the
+ agility of network operations. Models are also important to ease
+ integrating multi-vendor solutions.
+
+ YANG module [RFC7950] developers have taken both top-down and bottom-
+ up approaches to develop modules [RFC8199] and to establish a mapping
+ between a network technology and customer requirements at the top or
+ abstracting common constructs from various network technologies at
+ the bottom. At the time of writing this document (2020), there are
+ many YANG data models, including configuration and service models,
+ that have been specified or are being specified by the IETF. They
+ cover many of the networking protocols and techniques. However, how
+ these models work together to configure a function, manage a set of
+ devices involved in a service, or provide a service is something that
+ is not currently documented either within the IETF or other Standards
+ Development Organizations (SDOs).
+
+ Many of the YANG modules listed in this document are used to exchange
+ data between NETCONF/RESTCONF clients and servers [RFC6241][RFC8040].
+ Nevertheless, YANG is a transport-independent data modeling language.
+ It can thus be used independently of NETCONF/RESTCONF. For example,
+ YANG can be used to define abstract data structures [RFC8791] that
+ can be manipulated by other protocols (e.g., [DOTS-DDOS]).
+
+ This document describes an architectural framework for service and
+ network management automation (Section 3) that takes advantage of
+ YANG modeling technologies and investigates how YANG data models at
+ different layers interact with each other (e.g., Service Mapping,
+ model composition) in the context of service delivery and fulfillment
+ (Section 4). Concretely, the following benefits can be provided:
+
+ * Vendor-agnostic interfaces managing a service and the underlying
+ network are allowed.
+
+ * Movement from deployment schemes where vendor-specific network
+ managers are required to a scheme where the entities that are
+ responsible for orchestrating and controlling services and network
+ resources provided by multi-vendor devices are unified is allowed.
+
+ * Data inheritance and reusability among the various architecture
+ layers thus promoting a network-wise provisioning instead of
+ device-specific configuration is eased.
+
+ * Dynamically feeding a decision-making process (e.g., Controllers,
+ Orchestrators) with notifications that will trigger appropriate
+ actions, allowing that decision-making process to continuously
+ adjust a network (and thus the involved resources) to deliver the
+ service that conforms to the intended parameters (service
+ objectives) is allowed.
+
+ This framework is drawn from a network operator perspective
+ irrespective of the origin of a data model; it can also accommodate
+ YANG modules that are developed outside the IETF. The document
+ covers service models that are used by an operator to expose its
+ services and capture service requirements from the customers
+ (including other operators). Nevertheless, the document does not
+ elaborate on the communication protocol(s) that makes use of these
+ service models in order to request and deliver a service. Such
+ considerations are out of scope.
+
+ The document identifies a list of use cases to exemplify the proposed
+ approach (Section 5), but it does not claim nor aim to be exhaustive.
+ Appendix A lists some examples to illustrate the layered YANG modules
+ view.
+
+2. Terminology and Abbreviations
+
+
+2.1. Terminology
+
+ The following terms are defined in [RFC8309] and [RFC8199] and are
+ not redefined here:
+
+ * Network Operator
+
+ * Customer
+
+ * Service
+
+ * Data Model
+
+ * Service Model
+
+ * Network Element Model
+
+ In addition, the document makes use of the following terms:
+
+ Network Model:
+ Describes a network-level abstraction (or a subset of aspects of a
+ network infrastructure), including devices and their subsystems,
+ and relevant protocols operating at the link and network layers
+ across multiple devices. This model corresponds to the network
+ configuration model discussed in [RFC8309].
+
+ It can be used by a network operator to allocate resources (e.g.,
+ tunnel resource, topology resource) for the service or schedule
+ resources to meet the service requirements defined in a service
+ model.
+
+ Network Domain:
+ Refers to a network partitioning that is usually followed by
+ network operators to delimit parts of their network. "access
+ network" and "core network" are examples of network domains.
+
+ Device Model:
+ Refers to the Network Element YANG data model described in
+ [RFC8199] or the device configuration model discussed in
+ [RFC8309].
+
+ Device models are also used to refer to model a function embedded
+ in a device (e.g., Network Address Translation (NAT) [RFC8512],
+ Access Control Lists (ACLs) [RFC8519]).
+
+ Pipe:
+ Refers to a communication scope where only one-to-one (1:1)
+ communications are allowed. The scope can be identified between
+ ingress and egress nodes, two service sites, etc.
+
+ Hose:
+ Refers to a communication scope where one-to-many (1:N)
+ communications are allowed (e.g., one site to multiple sites).
+
+ Funnel:
+ Refers to a communication scope where many-to-one (N:1)
+ communications are allowed.
+
+2.2. Abbreviations
+
+ The following abbreviations are used in the document:
+
+ ACL Access Control List
+ AS Autonomous System
+ AP Access Point
+ CE Customer Edge
+ DBE Data Border Element
+ E2E End-to-End
+ ECA Event Condition Action
+ L2VPN Layer 2 Virtual Private Network
+ L3VPN Layer 3 Virtual Private Network
+ L3SM L3VPN Service Model
+ L3NM L3VPN Network Model
+ NAT Network Address Translation
+ OAM Operations, Administration, and Maintenance
+ OWD One-Way Delay
+ PE Provider Edge
+ PM Performance Monitoring
+ QoS Quality of Service
+ RD Route Distinguisher
+ RT Route Target
+ SBE Session Border Element
+ SDN Software-Defined Networking
+ SP Service Provider
+ TE Traffic Engineering
+ VN Virtual Network
+ VPN Virtual Private Network
+ VRF Virtual Routing and Forwarding
+
+
+3. Architectural Concepts and Goals
+
+3.1. Data Models: Layering and Representation
+
+ As described in Section 2 of [RFC8199], layering of modules allows
+ for better reusability of lower-layer modules by higher-level modules
+ while limiting duplication of features across layers.
+
+ Data models in the context of network management can be classified
+ into service, network, and device models. Different service models
+ may rely on the same set of network and/or device models.
+
+ Service models traditionally follow a top-down approach and are
+ mostly customer-facing YANG modules providing a common model
+ construct for higher-level network services (e.g., Layer 3 Virtual
+ Private Network (L3VPN)). Such modules can be mapped to network
+ technology-specific modules at lower layers (e.g., tunnel, routing,
+ Quality of Service (QoS), security). For example, service models can
+ be used to characterize the network service(s) to be ensured between
+ service nodes (ingress/egress) such as:
+
+ * the communication scope (pipe, hose, funnel, etc.),
+ * the directionality (inbound/outbound),
+ * the traffic performance guarantees expressed using metrics such as
+ One-Way Delay (OWD) [RFC7679] or One-Way Loss [RFC7680]; a summary
+ of performance metrics maintained by IANA can be found in [IPPM],
+ * link capacity [RFC5136] [METRIC-METHOD],
+ * etc.
+
+ Figure 1 depicts the example of a Voice over IP (VoIP) service that
+ relies upon connectivity services offered by a network operator. In
+ this example, the VoIP service is offered to the network operator's
+ customers by Service Provider 1 (SP1). In order to provide global
+ VoIP reachability, SP1 Service Site interconnects with other Service
+ Providers service sites typically by interconnecting Session Border
+ Elements (SBEs) and Data Border Elements (DBEs) [RFC5486][RFC6406].
+ For other VoIP destinations, sessions are forwarded over the
+ Internet. These connectivity services can be captured in a YANG
+ service model that reflects the service attributes that are shown in
+ Figure 2. This example follows the IP Connectivity Provisioning
+ Profile template defined in [RFC7297].
+
+ ,--,--,--. ,--,--,--.
+ ,-' SP1 `-. ,-' SP2 `-.
+ ( Service Site ) ( Service Site )
+ `-. ,-' `-. ,-'
+ `--'--'--' `--'--'--'
+ x | o * * |
+ (2)x | o * * |
+ ,x-,--o-*-. (1) ,--,*-,--.
+ ,-' x o * * * * * * * * * `-.
+ ( x o +----( Internet )
+ User---(x x x o o o o o o o o o o o o o o o o o o
+ `-. ,-' `-. ,-' (3)
+ `--'--'--' `--'--'--'
+ Network Operator
+
+ **** (1) Inter-SP connectivity
+ xxxx (2) Customer-to-SP connectivity
+ oooo (3) SP to any destination connectivity
+
+ Figure 1: An Example of Service Connectivity Components
+
+ In reference to Figure 2, "Full traffic performance guarantees class"
+ refers to a service class where all traffic performance metrics
+ included in the service model (OWD, loss, delay variation) are
+ guaranteed, while "Delay traffic performance guarantees class" refers
+ to a service class where only OWD is guaranteed.
+
+ Connectivity: Scope and Guarantees
+ (1) Inter-SP connectivity
+ - Pipe scope from the local to the remote SBE/DBE
+ - Full traffic performance guarantees class
+ (2) Customer-to-SP connectivity
+ - Hose/Funnel scope connecting the local SBE/DBE
+ to the customer access points
+ - Full traffic performance guarantees class
+ (3) SP to any destination connectivity
+ - Hose/Funnel scope from the local SBE/DBE to the
+ Internet gateway
+ - Delay traffic performance guarantees class
+ Flow Identification
+ * Destination IP address (SBE, DBE)
+ * DSCP marking
+ Traffic Isolation
+ * VPN
+ Routing & Forwarding
+ * Routing rule to exclude some ASes from the inter-domain
+ paths
+ Notifications (including feedback)
+ * Statistics on aggregate traffic to adjust capacity
+ * Failures
+ * Planned maintenance operations
+ * Triggered by thresholds
+
+ Figure 2: Sample Attributes Captured in a Service Model
+
+ Network models are mainly network-resource-facing modules; they
+ describe various aspects of a network infrastructure, including
+ devices and their subsystems, and relevant protocols operating at the
+ link and network layers across multiple devices (e.g., network
+ topology and traffic-engineering tunnel modules).
+
+ Device (and function) models usually follow a bottom-up approach and
+ are mostly technology-specific modules used to realize a service
+ (e.g., BGP, ACL).
+
+ Each level maintains a view of the supported YANG modules provided by
+ lower levels (see for example, Appendix A). Mechanisms such as the
+ YANG library [RFC8525] can be used to expose which YANG modules are
+ supported by nodes in lower levels.
+
+ Figure 3 illustrates the overall layering model. The reader may
+ refer to Section 4 of [RFC8309] for an overview of "Orchestrator" and
+ "Controller" elements. All these elements (i.e., Orchestrator(s),
+ Controller(s), device(s)) are under the responsibility of the same
+ operator.
+
+
+ +-----------------------------------------------------------------+
+ | Hierarchy Abstraction |
+ | |
+ | +-----------------------+ Service Model |
+ | | Orchestrator | (Customer Oriented) |
+ | |+---------------------+| Scope: "1:1" Pipe model |
+ | || Service Modeling || |
+ | |+---------------------+| |
+ | | | Bidirectional |
+ | |+---------------------+| +-+ Capacity, OWD +-+ |
+ | ||Service Orchestration|| | +----------------+ | |
+ | |+---------------------+| +-+ +-+ |
+ | +-----------------------+ Ingress Egress |
+ | |
+ | |
+ | +-----------------------+ Network Model |
+ | | Controller | (Operator Oriented) |
+ | |+---------------------+| +-+ +--+ +---+ +-+ |
+ | || Network Modeling || | | | | | | | | |
+ | |+---------------------+| | o----o--o----o---o---o | |
+ | | | +-+ +--+ +---+ +-+ |
+ | |+---------------------+| src dst |
+ | ||Network Orchestration|| L3VPN over TE |
+ | |+---------------------+| Instance Name/Access Interface |
+ | +-----------------------+ Protocol Type/Capacity/RD/RT/... |
+ | |
+ | |
+ | +-----------------------+ Device Model |
+ | | Device | |
+ | |+--------------------+ | |
+ | || Device Modeling | | Interface add, BGP Peer, |
+ | |+--------------------+ | Tunnel ID, QoS/TE, ... |
+ | +-----------------------+ |
+ +-----------------------------------------------------------------+
+
+ Figure 3: Layering and Representation within a Network Operator
+
+
+ A composite service offered by a network operator may rely on
+ services from other operators. In such a case, the network operator
+ acts as a customer to request services from other networks. The
+ operators providing these services will then follow the layering
+ depicted in Figure 3. The mapping between a composite service and a
+ third-party service is maintained at the orchestration level. From a
+ data-plane perspective, appropriate traffic steering policies (e.g.,
+ Service Function Chaining [RFC7665]) are managed by the network
+ controllers to guide how/when a third-party service is invoked for
+ flows bound to a composite service.
+
+ The layering model depicted in Figure 3 does not make any assumption
+ about the location of the various entities (e.g., Controller,
+ Orchestrator) within the network. As such, the architecture does not
+ preclude deployments where, for example, the Controller is embedded
+ on a device that hosts other functions that are controlled via YANG
+ modules.
+
+ In order to ease the mapping between layers and data reuse, this
+ document focuses on service models that are modeled using YANG.
+ Nevertheless, fully compliant with Section 3 of [RFC8309], Figure 3
+ does not preclude service models to be modeled using data modeling
+ languages other than YANG.
+
+3.2. Automation of Service Delivery Procedures
+
+ Service models can be used by a network operator to expose its
+ services to its customers. Exposing such models allows automation of
+ the activation of service orders and thus the service delivery. One
+ or more monolithic service models can be used in the context of a
+ composite service activation request (e.g., delivery of a caching
+ infrastructure over a VPN). Such models are used to feed a decision-
+ making intelligence to adequately accommodate customer needs.
+
+ Also, such models may be used jointly with services that require
+ dynamic invocation. An example is provided by the service modules
+ defined by the DOTS WG to dynamically trigger requests to handle
+ Distributed Denial-of-Service (DDoS) attacks [RFC8783]. The service
+ filtering request modeled using [RFC8783] will be translated into
+ device-specific filtering (e.g., ACLs defined in [RFC8519]) that
+ fulfills the service request.
+
+ Network models can be derived from service models and used to
+ provision, monitor, and instantiate the service. Also, they are used
+ to provide life-cycle management of network resources. Doing so is
+ meant to:
+
+ * expose network resources to customers (including other network
+ operators) to provide service fulfillment and assurance.
+
+ * allow customers (or network operators) to dynamically adjust the
+ network resources based on service requirements as described in
+ service models (e.g., Figure 2) and the current network
+ performance information described in the telemetry modules.
+
+ Note that it is out of the scope of this document to elaborate on the
+ communication protocols that are used to implement the interface
+ between the service ordering (customer) and service order handling
+ (provider).
+
+3.3. Service Fulfillment Automation
+
+ To operate a service, the settings of the parameters in the device
+ models are derived from service models and/or network models and are
+ used to:
+
+ * Provision each involved network function/device with the proper
+ configuration information.
+
+ * Operate the network based on service requirements as described in
+ the service model(s) and local operational guidelines.
+
+ In addition, the operational state including configuration that is in
+ effect together with statistics should be exposed to upper layers to
+ provide better network visibility and assess to what extent the
+ derived low-level modules are consistent with the upper-level inputs.
+
+ Filters are enforced on the notifications that are communicated to
+ Service layers. The type and frequency of notifications may be
+ agreed upon in the service model.
+
+ Note that it is important to correlate telemetry data with
+ configuration data to be used for closed loops at the different
+ stages of service delivery, from resource allocation to service
+ operation, in particular.
+
+3.4. YANG Module Integration
+
+ To support top-down service delivery, YANG modules at different
+ levels or at the same level need to be integrated for proper service
+ delivery (including proper network setup). For example, the service
+ parameters captured in service models need to be decomposed into a
+ set of configuration/notification parameters that may be specific to
+ one or more technologies; these technology-specific parameters are
+ grouped together to define technology-specific device-level models or
+ network-level models.
+
+ In addition, these technology-specific device or network models can
+ be further integrated with each other using the schema mount
+ mechanism [RFC8528] to provision each involved network function/
+ device or each involved network domain to support newly added modules
+ or features. A collection of integrated device models can be loaded
+ and validated during implementation.
+
+ High-level policies can be defined at service or network models
+ (e.g., "Autonomous System Number (ASN) Exclude" in the example
+ depicted in Figure 2). Device models will be tweaked accordingly to
+ provide policy-based management. Policies can also be used for
+ telemetry automation, e.g., policies that contain conditions to
+ trigger the generation and pushing of new telemetry data.
+
+4. Functional Blocks and Interactions
+
+ The architectural considerations described in Section 3 lead to the
+ life-cycle management architecture illustrated in Figure 4 and
+ described in the following subsections.
+
+ +------------------+
+ ............... | |
+ Service level | |
+ V |
+ E2E E2E E2E E2E
+ Service --> Service ---------> Service ------------> Service
+ Exposure Creation ^ Optimization ^ Diagnosis
+ /Modification | | |
+ ^ | |Diff | |
+ E2E | | | E2E | |
+ Service ----+ | | Service | |
+ Decommission | +------ Assurance --+ |
+ | ^ |
+ Multi-layer | | |
+ Multi-domain | | |
+ Service Mapping| | |
+ ............... |<-----------------+ | |
+ Network level | | +-------+ v
+ V | | Specific
+ Specific Specific | Service
+ Service --------> Service <--+ | Diagnosis
+ Creation ^ Optimization | | |
+ /Modification | | | |
+ | |Diff | | |
+ | | Specific --+ | |
+ Service | | Service | |
+ Decomposition | +----- Assurance ----+ |
+ | ^ |
+ ............... | | Aggregation |
+ Device level | +------------+ |
+ V | |
+ Service Intent | v
+ Fulfillment Config ----> Config ----> Performance ----> Fault
+ Provision Validation Monitoring Diagnostic
+
+ Figure 4: Service and Network Life-Cycle Management
+
+4.1. Service Life-Cycle Management Procedure
+
+ Service life-cycle management includes end-to-end service life-cycle
+ management at the service level and technology-specific network life-
+ cycle management at the network level.
+
+ The end-to-end service life-cycle management is technology-
+ independent service management and spans across multiple network
+ domains and/or multiple layers while technology-specific service
+ life-cycle management is technology domain-specific or layer-specific
+ service life-cycle management.
+
+4.1.1. Service Exposure
+
+ A service in the context of this document (sometimes called "Network
+ Service") is some form of connectivity between customer sites and the
+ Internet or between customer sites across the operator's network and
+ across the Internet.
+
+ Service exposure is used to capture services offered to customers
+ (ordering and order handling). One example is that a customer can
+ use an L3VPN Service Model (L3SM) to request L3VPN service by
+ providing the abstract technical characterization of the intended
+ service between customer sites.
+
+ Service model catalogs can be created to expose the various services
+ and the information needed to invoke/order a given service.
+
+4.1.2. Service Creation/Modification
+
+ A customer is usually unaware of the technology that the network
+ operator has available to deliver the service, so the customer does
+ not make requests specific to the underlying technology but is
+ limited to making requests specific to the service that is to be
+ delivered. This service request can be filled using a service model.
+
+ Upon receiving a service request, and assuming that appropriate
+ authentication and authorization checks have been made with success,
+ the service Orchestrator/management system should verify whether the
+ service requirements in the service request can be met (i.e., whether
+ there are sufficient resources that can be allocated with the
+ requested guarantees).
+
+ If the request is accepted, the service Orchestrator/management
+ system maps such a service request to its view. This view can be
+ described as a technology-specific network model or a set of
+ technology-specific device models, and this mapping may include a
+ choice of which networks and technologies to use depending on which
+ service features have been requested.
+
+ In addition, a customer may require a change in the underlying
+ network infrastructure to adapt to new customers' needs and service
+ requirements (e.g., service a new customer site, add a new access
+ link, or provide disjoint paths). This service modification can be
+ issued following the same service model used by the service request.
+
+ Withdrawing a service is discussed in Section 4.1.6.
+
+4.1.3. Service Assurance
+
+ The performance measurement telemetry (Section 4.2.3) can be used to
+ provide service assurance at service and/or network levels. The
+ performance measurement telemetry model can tie with service or
+ network models to monitor network performance or Service Level
+ Agreements.
+
+4.1.4. Service Optimization
+
+ Service optimization is a technique that gets the configuration of
+ the network updated due to network changes, incident mitigation, or
+ new service requirements. One example is once a tunnel or a VPN is
+ set up, performance monitoring information or telemetry information
+ per tunnel (or per VPN) can be collected and fed into the management
+ system. If the network performance doesn't meet the service
+ requirements, the management system can create new VPN policies
+ capturing network service requirements and populate them into the
+ network.
+
+ Both network performance information and policies can be modeled
+ using YANG. With Policy-based management, self-configuration and
+ self-optimization behavior can be specified and implemented.
+
+ The overall service optimization is managed at the service level,
+ while the network level is responsible for the optimization of the
+ specific network services it provides.
+
+4.1.5. Service Diagnosis
+
+ Operations, Administration, and Maintenance (OAM) are important
+ networking functions for service diagnosis that allow network
+ operators to:
+
+ * monitor network communications (i.e., reachability verification
+ and Continuity Check)
+
+ * troubleshoot failures (i.e., fault verification and localization)
+
+ * monitor service level agreements and performance (i.e.,
+ performance management)
+
+ When the network is down, service diagnosis should be in place to
+ pinpoint the problem and provide recommendations (or instructions)
+ for network recovery.
+
+ The service diagnosis information can be modeled as technology-
+ independent Remote Procedure Call (RPC) operations for OAM protocols
+ and technology-independent abstraction of key OAM constructs for OAM
+ protocols [RFC8531][RFC8533]. These models can be used to provide
+ consistent configuration, reporting, and presentation for the OAM
+ mechanisms used to manage the network.
+
+ Refer to Section 4.2.4 for the device-specific side.
+
+4.1.6. Service Decommission
+
+ Service decommission allows a customer to stop the service by
+ removing the service from active status, thus releasing the network
+ resources that were allocated to the service. Customers can also use
+ the service model to withdraw the subscription to a service.
+
+4.2. Service Fulfillment Management Procedure
+
+4.2.1. Intended Configuration Provision
+
+ Intended configuration at the device level is derived from network
+ models at the network level or service models at the service level
+ and represents the configuration that the system attempts to apply.
+ Take L3SM as a service model example to deliver an L3VPN service;
+ there is a need to map the L3VPN service view defined in the service
+ model into a detailed intended configuration view defined by specific
+ configuration models for network elements. The configuration
+ information includes:
+
+ * Virtual Routing and Forwarding (VRF) definition, including VPN
+ policy expression
+
+ * Physical Interface(s)
+
+ * IP layer (IPv4, IPv6)
+
+ * QoS features such as classification, profiles, etc.
+
+ * Routing protocols: support of configuration of all protocols
+ listed in a service request, as well as routing policies
+ associated with those protocols
+
+ * Multicast support
+
+ * Address sharing
+
+ * Security (e.g., access control, authentication, encryption)
+
+ These specific configuration models can be used to configure Provider
+ Edge (PE) and Customer Edge (CE) devices within a site, e.g., a BGP
+ policy model can be used to establish VPN membership between sites
+ and VPN service topology.
+
+ Note that in networks with legacy devices (that support proprietary
+ modules or do not support YANG at all), an adaptation layer is likely
+ to be required at the network level so that these devices can be
+ involved in the delivery of the network services.
+
+ This interface is also used to handle service withdrawal
+ (Section 4.1.6).
+
+4.2.2. Configuration Validation
+
+ Configuration validation is used to validate intended configuration
+ and ensure the configuration takes effect.
+
+ For example, if a customer creates an interface "eth-0/0/0" but the
+ interface does not physically exist at this point, then configuration
+ data appears in the <intended> status but does not appear in the
+ <operational> datastore. More details about <intended> and
+ <operational> datastores can be found in Section 5.1 of [RFC8342].
+
+4.2.3. Performance Monitoring
+
+ When a configuration is in effect in a device, the <operational>
+ datastore holds the complete operational state of the device,
+ including learned, system, default configuration, and system state.
+ However, the configurations and state of a particular device do not
+ have visibility on the whole network, nor can they show how packets
+ are going to be forwarded through the entire network. Therefore, it
+ becomes more difficult to operate the entire network without
+ understanding the current status of the network.
+
+ The management system should subscribe to updates of a YANG datastore
+ in all the network devices for performance monitoring purposes and
+ build a full topological visibility of the network by aggregating
+ (and filtering) these operational states from different sources.
+
+4.2.4. Fault Diagnostic
+
+ When configuration is in effect in a device, some devices may be
+ misconfigured (e.g., device links are not consistent in both sides of
+ the network connection) or network resources might be misallocated.
+ Therefore, services may be negatively affected without knowing the
+ root cause in the network.
+
+ Technology-dependent nodes and RPC commands are defined in
+ technology-specific YANG data models, which can use and extend the
+ base model described in Section 4.1.5 to deal with these issues.
+
+ These RPC commands received in the technology-dependent node can be
+ used to trigger technology-specific OAM message exchanges for fault
+ verification and fault isolation. For example, Transparent
+ Interconnection of Lots of Links (TRILL) Multi-destination Tree
+ Verification (MTV) RPC command [TRILL-YANG-OAM] can be used to
+ trigger Multi-Destination Tree Verification Messages (MTVMs) defined
+ in [RFC7455] to verify TRILL distribution tree integrity.
+
+4.3. Multi-layer/Multi-domain Service Mapping
+
+ Multi-layer/Multi-domain Service Mapping allows the mapping of an
+ end-to-end abstract view of the service segmented at different layers
+ and/or different network domains into domain-specific views.
+
+ One example is to map service parameters in the L3SM into
+ configuration parameters such as Route Distinguisher (RD), Route
+ Target (RT), and VRF in the L3VPN Network Model (L3NM).
+
+ Another example is to map service parameters in the L3SM into Traffic
+ Engineered (TE) tunnel parameters (e.g., Tunnel ID) in TE model and
+ Virtual Network (VN) parameters (e.g., Access Point (AP) list and VN
+ members) in the YANG data model for VN operation [ACTN-VN-YANG].
+
+4.4. Service Decomposition
+
+ Service Decomposition allows to decompose service models at the
+ service level or network models at the network level into a set of
+ device models at the device level. These device models may be tied
+ to specific device types or classified into a collection of related
+ YANG modules based on service types and features offered, and they
+ may load at the implementation time before configuration is loaded
+ and validated.
+
+5. YANG Data Model Integration Examples
+
+ The following subsections provide some YANG data model integration
+ examples.
+
+5.1. L2VPN/L3VPN Service Delivery
+
+ In reference to Figure 5, the following steps are performed to
+ deliver the L3VPN service within the network management automation
+ architecture defined in Section 4:
+
+ 1. The Customer requests to create two sites (as per Service
+ Creation in Section 4.1.2) relying upon L3SM with each site
+ having one network access connectivity, for example:
+
+ * Site A: network-access A, link-capacity = 20 Mbps, class
+ "foo", guaranteed-capacity-percent = 10, average-one-way-delay
+ = 70 ms.
+
+ * Site B: network-access B, link-capacity = 30 Mbps, class
+ "foo1", guaranteed-capacity-percent = 15, average-one-way-
+ delay = 60 ms.
+
+ 2. The Orchestrator extracts the service parameters from the L3SM.
+ Then, it uses them as input to the Service Mapping in Section 4.3
+ to translate them into orchestrated configuration parameters
+ (e.g., RD, RT, and VRF) that are part of the L3NM specified in
+ [OPSAWG-L3SM-L3NM].
+
+ 3. The Controller takes the orchestrated configuration parameters in
+ the L3NM and translates them into an orchestrated (Service
+ Decomposition in Section 4.4) configuration of network elements
+ that are part of, e.g., BGP, QoS, Network Instance, IP
+ management, and interface models.
+
+ [UNI-TOPOLOGY] can be used for representing, managing, and
+ controlling the User Network Interface (UNI) topology.
+
+ L3SM |
+ Service |
+ Model |
+ +------------------------+------------------------+
+ | +--------V--------+ |
+ | | Service Mapping | |
+ | +--------+--------+ |
+ | Orchestrator | |
+ +------------------------+------------------------+
+ L3NM | ^ UNI Topology Model
+ Network | |
+ Model | |
+ +------------------------+------------------------+
+ | +-----------V-----------+ |
+ | | Service Decomposition | |
+ | +--++---------------++--+ |
+ | || || |
+ | Controller || || |
+ +---------------++---------------++---------------+
+ || ||
+ || BGP, ||
+ || QoS, ||
+ || Interface, ||
+ +------------+| NI, |+------------+
+ | | IP | |
+ +--+--+ +--+--+ +--+--+ +--+--+
+ | CE1 +-------+ PE1 | | PE2 +-------+ CE2 |
+ +-----+ +-----+ +-----+ +-----+
+
+ Figure 5: L3VPN Service Delivery Example (Current)
+
+ L3NM inherits some of the data elements from the L3SM. Nevertheless,
+ the L3NM as designed in [OPSAWG-L3SM-L3NM] does not expose some
+ information to the above layer such as the capabilities of an
+ underlying network (which can be used to drive service order
+ handling) or notifications (to notify subscribers about specific
+ events or degradations as per agreed SLAs). Some of this information
+ can be provided using, e.g., [OPSAWG-YANG-VPN]. A target overall
+ model is depicted in Figure 6.
+
+ L3SM | ^
+ Service | | Notifications
+ Model | |
+ +------------------------+------------------------+
+ | +--------V--------+ |
+ | | Service Mapping | |
+ | +--------+--------+ |
+ | Orchestrator | |
+ +------------------------+------------------------+
+ L3NM | ^ UNI Topology Model
+ Network| | L3NM Notifications
+ Model | | L3NM Capabilities
+ +------------------------+------------------------+
+ | +-----------V-----------+ |
+ | | Service Decomposition | |
+ | +--++---------------++--+ |
+ | || || |
+ | Controller || || |
+ +---------------++---------------++---------------+
+ || ||
+ || BGP, ||
+ || QoS, ||
+ || Interface, ||
+ +------------+| NI, |+------------+
+ | | IP | |
+ +--+--+ +--+--+ +--+--+ +--+--+
+ | CE1 +-------+ PE1 | | PE2 +-------+ CE2 |
+ +-----+ +-----+ +-----+ +-----+
+
+ Figure 6: L3VPN Service Delivery Example (Target)
+
+ Note that a similar analysis can be performed for Layer 2 VPNs
+ (L2VPNs). An L2VPN Service Model (L2SM) is defined in [RFC8466],
+ while the YANG L2VPN Network Model (L2NM) is specified in
+ [OPSAWG-L2NM].
+
+5.2. VN Life-Cycle Management
+
+ In reference to Figure 7, the following steps are performed to
+ deliver the VN service within the network management automation
+ architecture defined in Section 4:
+
+ 1. A customer makes a request (Service Exposure in Section 4.1.1) to
+ create a VN. The association between the VN, APs, and VN members
+ is defined in the VN YANG model [ACTN-VN-YANG].
+
+ 2. The Orchestrator creates the single abstract node topology based
+ on the information captured in the request.
+
+ 3. The customer exchanges with the Orchestrator the connectivity
+ matrix on the abstract node topology and explicit paths using the
+ TE topology model [RFC8795]. This information can be used to
+ instantiate the VN and set up tunnels between source and
+ destination endpoints (Service Creation in Section 4.1.2).
+
+ 4. In order to provide service assurance (Service Optimization in
+ Section 4.1.4), the telemetry model that augments the VN model
+ and corresponding TE tunnel model can be used by the Orchestrator
+ to subscribe to performance measurement data. The Controller
+ will then notify the Orchestrator with all the parameter changes
+ and network performance changes related to the VN topology and
+ the tunnels [TEAS-ACTN-PM].
+
+ |
+ VN |
+ Service |
+ Model |
+ +----------------------|--------------------------+
+ | Orchestrator | |
+ | +--------V--------+ |
+ | | Service Mapping | |
+ | +-----------------+ |
+ +----------------------+--------------------^-----+
+ TE | Telemetry |
+ Tunnel | Model |
+ Model | |
+ +----------------------V--------------------+-----+
+ | Controller |
+ | |
+ +-------------------------------------------------+
+
+ +-----+ +-----+ +-----+ +-----+
+ | CE1 +------+ PE1 | | PE2 +------+ CE2 |
+ +-----+ +-----+ +-----+ +-----+
+
+ Figure 7: A VN Service Delivery Example
+
+5.3. Event-Based Telemetry in the Device Self Management
+
+ In reference to Figure 8, the following steps are performed to
+ monitor state changes of managed resources in a network device and
+ provide device self management within the network management
+ automation architecture defined in Section 4:
+
+ 1. To control which state a network device should be in or is
+ allowed to be in at any given time, a set of conditions and
+ actions are defined and correlated with network events (e.g.,
+ allow the NETCONF server to send updates only when the value
+ exceeds a certain threshold for the first time, but not again
+ until the threshold is cleared), which constitute an Event
+ Condition Action (ECA) policy or an event-driven policy control
+ logic that can be executed on the device (e.g., [EVENT-YANG]).
+
+ 2. To provide a rapid autonomic response that can exhibit self-
+ management properties, the Controller pushes the ECA policy to
+ the network device and delegates the network control logic to the
+ network device.
+
+ 3. The network device uses the ECA model to subscribe to the event
+ source, e.g., an event stream or datastore state data conveyed to
+ the server via YANG-Push subscription [RFC8641], monitors state
+ parameters, and takes simple and instant actions when an
+ associated event condition on state parameters is met. ECA
+ notifications can be generated as the result of actions based on
+ event stream subscription or datastore subscription (model-driven
+ telemetry operation discussed in Section 4.2.3).
+
+ +----------------+
+ | <----+
+ | Controller | |
+ +-------+--------+ |
+ | |
+ | |
+ ECA | | ECA
+ Model | | Notification
+ | |
+ | |
+ +------------V-------------+-----+
+ |Device | |
+ | +-------+ +---------+ +--+---+ |
+ | | Event +-> Event +->Event | |
+ | | Source| |Condition| |Action| |
+ | +-------+ +---------+ +------+ |
+ +--------------------------------+
+
+ Figure 8: Event-Based Telemetry
+
+6. Security Considerations
+
+ Many of the YANG modules cited in this document define schema for
+ data that is designed to be accessed via network management protocols
+ such as NETCONF [RFC6241] or RESTCONF [RFC8040]. The lowest NETCONF
+ layer is the secure transport layer, and the mandatory-to-implement
+ secure transport is Secure Shell (SSH) [RFC6242]. The lowest
+ RESTCONF layer is HTTPS, and the mandatory-to-implement secure
+ transport is TLS [RFC8446].
+
+ The NETCONF access control model [RFC8341] provides the means to
+ restrict access for particular NETCONF or RESTCONF users to a
+ preconfigured subset of all available NETCONF or RESTCONF protocol
+ operations and content.
+
+ Security considerations specific to each of the technologies and
+ protocols listed in the document are discussed in the specification
+ documents of each of these protocols.
+
+ In order to prevent leaking sensitive information and the "confused
+ deputy" problem [Hardy] in general, special care should be considered
+ when translating between the various layers in Section 4 or when
+ aggregating data retrieved from various sources. Authorization and
+ authentication checks should be performed to ensure that data is
+ available to an authorized entity. The network operator must enforce
+ means to protect privacy-related information included in customer-
+ facing models.
+
+ To detect misalignment between layers that might be induced by
+ misbehaving nodes, upper layers should continuously monitor the
+ perceived service (Section 4.1.4) and should proceed with checks to
+ assess that the provided service complies with the expected service
+ and that the data reported by an underlying layer is matching the
+ perceived service by the above layer. Such checks are the
+ responsibility of the service diagnosis (Section 4.1.5).
+
+ When a YANG module includes security-related parameters, it is
+ recommended to include the relevant information as part of the
+ service assurance to track the correct functioning of the security
+ mechanisms.
+
+ Additional considerations are discussed in the following subsections.
+
+6.1. Service Level
+
+ A provider may rely on services offered by other providers to build
+ composite services. Appropriate mechanisms should be enabled by the
+ provider to monitor and detect a service disruption from these
+ providers. The characterization of a service disruption (including
+ mean time between failures and mean time to repair), the escalation
+ procedure, and penalties are usually documented in contractual
+ agreements (e.g., as described in Section 2.1 of [RFC4176]).
+ Misbehaving peer providers will thus be identified and appropriate
+ countermeasures will be applied.
+
+ The communication protocols that make use of a service model between
+ a customer and an operator are out of scope. Relevant security
+ considerations should be discussed in the specification documents of
+ these protocols.
+
+6.2. Network Level
+
+ Security considerations specific to the network level are listed
+ below:
+
+ * A controller may create forwarding loops by misconfiguring the
+ underlying network nodes. It is recommended to proceed with tests
+ to check the status of forwarding paths regularly or whenever
+ changes are made to routing or forwarding processes. Such checks
+ may be triggered from the service level owing to the means
+ discussed in Section 4.1.5.
+
+ * Some service models may include a traffic isolation clause that is
+ passed down to the network level so that appropriate technology-
+ specific actions must be enforced at the underlying network (and
+ thus involved network devices) to avoid that such traffic is
+ accessible to non-authorized parties. In particular, network
+ models may indicate whether encryption is enabled and, if so,
+ expose a list of supported encryption schemes and parameters.
+ Refer, for example, to the encryption feature defined in
+ [OPSAWG-VPN-COMMON] and its use in [OPSAWG-L3SM-L3NM].
+
+6.3. Device Level
+
+ Network operators should monitor and audit their networks to detect
+ misbehaving nodes and abnormal behaviors. For example, OAM, as
+ discussed in Section 4.1.5, can be used for that purpose.
+
+ Access to some data requires specific access privilege levels.
+ Devices must check that a required access privilege is provided
+ before granting access to specific data or performing specific
+ actions.
+
+7. IANA Considerations
+
+ This document has no IANA actions.
+
+8. References
+
+8.1. Normative References
+
+ [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
+ and A. Bierman, Ed., "Network Configuration Protocol
+ (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
+ <https://www.rfc-editor.org/info/rfc6241>.
+
+ [RFC6242] Wasserman, M., "Using the NETCONF Protocol over Secure
+ Shell (SSH)", RFC 6242, DOI 10.17487/RFC6242, June 2011,
+ <https://www.rfc-editor.org/info/rfc6242>.
+
+ [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language",
+ RFC 7950, DOI 10.17487/RFC7950, August 2016,
+ <https://www.rfc-editor.org/info/rfc7950>.
+
+ [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
+ Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017,
+ <https://www.rfc-editor.org/info/rfc8040>.
+
+ [RFC8341] Bierman, A. and M. Bjorklund, "Network Configuration
+ Access Control Model", STD 91, RFC 8341,
+ DOI 10.17487/RFC8341, March 2018,
+ <https://www.rfc-editor.org/info/rfc8341>.
+
+ [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol
+ Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
+ <https://www.rfc-editor.org/info/rfc8446>.
+
+8.2. Informative References
+
+ [ACTN-VN-YANG]
+ Lee, Y., Dhody, D., Ceccarelli, D., Bryskin, I., and B. Y.
+ Yoon, "A YANG Data Model for VN Operation", Work in
+ Progress, Internet-Draft, draft-ietf-teas-actn-vn-yang-10,
+ 2 November 2020, <https://tools.ietf.org/html/draft-ietf-
+ teas-actn-vn-yang-10>.
+
+ [BFD-YANG] Rahman, R., Zheng, L., Jethanandani, M., Pallagatti, S.,
+ and G. Mirsky, "YANG Data Model for Bidirectional
+ Forwarding Detection (BFD)", Work in Progress, Internet-
+ Draft, draft-ietf-bfd-yang-17, 2 August 2018,
+ <https://tools.ietf.org/html/draft-ietf-bfd-yang-17>.
+
+ [DOTS-DDOS]
+ Boucadair, M., Shallow, J., and T. Reddy.K, "Distributed
+ Denial-of-Service Open Threat Signaling (DOTS) Signal
+ Channel Specification", Work in Progress, Internet-Draft,
+ draft-ietf-dots-rfc8782-bis-04, 3 December 2020,
+ <https://tools.ietf.org/html/draft-ietf-dots-rfc8782-bis-
+ 04>.
+
+ [EVENT-YANG]
+ Wu, Q., Bryskin, I., Birkholz, H., Liu, X., and B. Claise,
+ "A YANG Data model for ECA Policy Management", Work in
+ Progress, Internet-Draft, draft-wwx-netmod-event-yang-10,
+ 1 November 2020, <https://tools.ietf.org/html/draft-wwx-
+ netmod-event-yang-10>.
+
+ [EVPN-YANG]
+ Brissette, P., Shah, H., Hussain, I., Tiruveedhula, K.,
+ and J. Rabadan, "Yang Data Model for EVPN", Work in
+ Progress, Internet-Draft, draft-ietf-bess-evpn-yang-07, 11
+ March 2019, <https://tools.ietf.org/html/draft-ietf-bess-
+ evpn-yang-07>.
+
+ [Hardy] Hardy, N., "The Confused Deputy: (or why capabilities
+ might have been invented)", DOI 10.1145/54289.871709,
+ October 1988,
+ <https://dl.acm.org/doi/10.1145/54289.871709>.
+
+ [IDR-BGP-MODEL]
+ Jethanandani, M., Patel, K., Hares, S., and J. Haas, "BGP
+ YANG Model for Service Provider Networks", Work in
+ Progress, Internet-Draft, draft-ietf-idr-bgp-model-10, 15
+ November 2020,
+ <https://tools.ietf.org/html/draft-ietf-idr-bgp-model-10>.
+
+ [IPPM] IANA, "Performance Metrics", March 2020,
+ <https://www.iana.org/assignments/performance-metrics/
+ performance-metrics.xhtml>.
+
+ [L2VPN-YANG]
+ Shah, H., Brissette, P., Chen, I., Hussain, I., Wen, B.,
+ and K. Tiruveedhula, "YANG Data Model for MPLS-based
+ L2VPN", Work in Progress, Internet-Draft, draft-ietf-bess-
+ l2vpn-yang-10, 2 July 2019, <https://tools.ietf.org/html/
+ draft-ietf-bess-l2vpn-yang-10>.
+
+ [L3VPN-YANG]
+ Jain, D., Patel, K., Brissette, P., Li, Z., Zhuang, S.,
+ Liu, X., Haas, J., Esale, S., and B. Wen, "Yang Data Model
+ for BGP/MPLS L3 VPNs", Work in Progress, Internet-Draft,
+ draft-ietf-bess-l3vpn-yang-04, 19 October 2018,
+ <https://tools.ietf.org/html/draft-ietf-bess-l3vpn-yang-
+ 04>.
+
+ [METRIC-METHOD]
+ Morton, A., Geib, R., and L. Ciavattone, "Metrics and
+ Methods for One-way IP Capacity", Work in Progress,
+ Internet-Draft, draft-ietf-ippm-capacity-metric-method-04,
+ 10 September 2020, <https://tools.ietf.org/html/draft-
+ ietf-ippm-capacity-metric-method-04>.
+
+ [MVPN-YANG]
+ Liu, Y., Guo, F., Litkowski, S., Liu, X., Kebler, R., and
+ M. Sivakumar, "Yang Data Model for Multicast in MPLS/BGP
+ IP VPNs", Work in Progress, Internet-Draft, draft-ietf-
+ bess-mvpn-yang-04, 30 June 2020,
+ <https://tools.ietf.org/html/draft-ietf-bess-mvpn-yang-
+ 04>.
+
+ [NETMOD-MODEL]
+ Clarke, J. and B. Claise, "YANG module for
+ yangcatalog.org", Work in Progress, Internet-Draft, draft-
+ clacla-netmod-model-catalog-03, 3 April 2018,
+ <https://tools.ietf.org/html/draft-clacla-netmod-model-
+ catalog-03>.
+
+ [OPSAWG-L2NM]
+ Barguil, S., Dios, O. G. D., Boucadair, M., Munoz, L. A.,
+ Jalil, L., and J. Ma, "A Layer 2 VPN Network YANG Model",
+ Work in Progress, Internet-Draft, draft-ietf-opsawg-l2nm-
+ 01, 2 November 2020,
+ <https://tools.ietf.org/html/draft-ietf-opsawg-l2nm-01>.
+
+ [OPSAWG-L3SM-L3NM]
+ Barguil, S., Dios, O. G. D., Boucadair, M., Munoz, L. A.,
+ and A. Aguado, "A Layer 3 VPN Network YANG Model", Work in
+ Progress, Internet-Draft, draft-ietf-opsawg-l3sm-l3nm-05,
+ 16 October 2020, <https://tools.ietf.org/html/draft-ietf-
+ opsawg-l3sm-l3nm-05>.
+
+ [OPSAWG-VPN-COMMON]
+ Barguil, S., Dios, O. G. D., Boucadair, M., and Q. Wu, "A
+ Layer 2/3 VPN Common YANG Model", Work in Progress,
+ Internet-Draft, draft-ietf-opsawg-vpn-common-03, 14
+ January 2021, <https://tools.ietf.org/html/draft-ietf-
+ opsawg-vpn-common-03>.
+
+ [OPSAWG-YANG-VPN]
+ Wu, B., Wu, Q., Boucadair, M., Dios, O. G. D., Wen, B.,
+ Liu, C., and H. Xu, "A YANG Model for Network and VPN
+ Service Performance Monitoring", Work in Progress,
+ Internet-Draft, draft-www-opsawg-yang-vpn-service-pm-03,
+ 21 January 2021, <https://tools.ietf.org/html/draft-www-
+ opsawg-yang-vpn-service-pm-03>.
+
+ [PIM-YANG] Liu, X., McAllister, P., Peter, A., Sivakumar, M., Liu,
+ Y., and F. Hu, "A YANG Data Model for Protocol Independent
+ Multicast (PIM)", Work in Progress, Internet-Draft, draft-
+ ietf-pim-yang-17, 19 May 2018,
+ <https://tools.ietf.org/html/draft-ietf-pim-yang-17>.
+
+ [QOS-MODEL]
+ Choudhary, A., Jethanandani, M., Strahle, N., Aries, E.,
+ and I. Chen, "YANG Model for QoS", Work in Progress,
+ Internet-Draft, draft-ietf-rtgwg-qos-model-02, 9 July
+ 2020, <https://tools.ietf.org/html/draft-ietf-rtgwg-qos-
+ model-02>.
+
+ [RFC4176] El Mghazli, Y., Ed., Nadeau, T., Boucadair, M., Chan, K.,
+ and A. Gonguet, "Framework for Layer 3 Virtual Private
+ Networks (L3VPN) Operations and Management", RFC 4176,
+ DOI 10.17487/RFC4176, October 2005,
+ <https://www.rfc-editor.org/info/rfc4176>.
+
+ [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
+ Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February
+ 2006, <https://www.rfc-editor.org/info/rfc4364>.
+
+ [RFC4664] Andersson, L., Ed. and E. Rosen, Ed., "Framework for Layer
+ 2 Virtual Private Networks (L2VPNs)", RFC 4664,
+ DOI 10.17487/RFC4664, September 2006,
+ <https://www.rfc-editor.org/info/rfc4664>.
+
+ [RFC4761] Kompella, K., Ed. and Y. Rekhter, Ed., "Virtual Private
+ LAN Service (VPLS) Using BGP for Auto-Discovery and
+ Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007,
+ <https://www.rfc-editor.org/info/rfc4761>.
+
+ [RFC4762] Lasserre, M., Ed. and V. Kompella, Ed., "Virtual Private
+ LAN Service (VPLS) Using Label Distribution Protocol (LDP)
+ Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007,
+ <https://www.rfc-editor.org/info/rfc4762>.
+
+ [RFC5136] Chimento, P. and J. Ishac, "Defining Network Capacity",
+ RFC 5136, DOI 10.17487/RFC5136, February 2008,
+ <https://www.rfc-editor.org/info/rfc5136>.
+
+ [RFC5486] Malas, D., Ed. and D. Meyer, Ed., "Session Peering for
+ Multimedia Interconnect (SPEERMINT) Terminology",
+ RFC 5486, DOI 10.17487/RFC5486, March 2009,
+ <https://www.rfc-editor.org/info/rfc5486>.
+
+ [RFC5880] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
+ (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010,
+ <https://www.rfc-editor.org/info/rfc5880>.
+
+ [RFC6406] Malas, D., Ed. and J. Livingood, Ed., "Session PEERing for
+ Multimedia INTerconnect (SPEERMINT) Architecture",
+ RFC 6406, DOI 10.17487/RFC6406, November 2011,
+ <https://www.rfc-editor.org/info/rfc6406>.
+
+ [RFC7149] Boucadair, M. and C. Jacquenet, "Software-Defined
+ Networking: A Perspective from within a Service Provider
+ Environment", RFC 7149, DOI 10.17487/RFC7149, March 2014,
+ <https://www.rfc-editor.org/info/rfc7149>.
+
+ [RFC7224] Bjorklund, M., "IANA Interface Type YANG Module",
+ RFC 7224, DOI 10.17487/RFC7224, May 2014,
+ <https://www.rfc-editor.org/info/rfc7224>.
+
+ [RFC7276] Mizrahi, T., Sprecher, N., Bellagamba, E., and Y.
+ Weingarten, "An Overview of Operations, Administration,
+ and Maintenance (OAM) Tools", RFC 7276,
+ DOI 10.17487/RFC7276, June 2014,
+ <https://www.rfc-editor.org/info/rfc7276>.
+
+ [RFC7297] Boucadair, M., Jacquenet, C., and N. Wang, "IP
+ Connectivity Provisioning Profile (CPP)", RFC 7297,
+ DOI 10.17487/RFC7297, July 2014,
+ <https://www.rfc-editor.org/info/rfc7297>.
+
+ [RFC7317] Bierman, A. and M. Bjorklund, "A YANG Data Model for
+ System Management", RFC 7317, DOI 10.17487/RFC7317, August
+ 2014, <https://www.rfc-editor.org/info/rfc7317>.
+
+ [RFC7455] Senevirathne, T., Finn, N., Salam, S., Kumar, D., Eastlake
+ 3rd, D., Aldrin, S., and Y. Li, "Transparent
+ Interconnection of Lots of Links (TRILL): Fault
+ Management", RFC 7455, DOI 10.17487/RFC7455, March 2015,
+ <https://www.rfc-editor.org/info/rfc7455>.
+
+ [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function
+ Chaining (SFC) Architecture", RFC 7665,
+ DOI 10.17487/RFC7665, October 2015,
+ <https://www.rfc-editor.org/info/rfc7665>.
+
+ [RFC7679] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton,
+ Ed., "A One-Way Delay Metric for IP Performance Metrics
+ (IPPM)", STD 81, RFC 7679, DOI 10.17487/RFC7679, January
+ 2016, <https://www.rfc-editor.org/info/rfc7679>.
+
+ [RFC7680] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton,
+ Ed., "A One-Way Loss Metric for IP Performance Metrics
+ (IPPM)", STD 82, RFC 7680, DOI 10.17487/RFC7680, January
+ 2016, <https://www.rfc-editor.org/info/rfc7680>.
+
+ [RFC8077] Martini, L., Ed. and G. Heron, Ed., "Pseudowire Setup and
+ Maintenance Using the Label Distribution Protocol (LDP)",
+ STD 84, RFC 8077, DOI 10.17487/RFC8077, February 2017,
+ <https://www.rfc-editor.org/info/rfc8077>.
+
+ [RFC8194] Schoenwaelder, J. and V. Bajpai, "A YANG Data Model for
+ LMAP Measurement Agents", RFC 8194, DOI 10.17487/RFC8194,
+ August 2017, <https://www.rfc-editor.org/info/rfc8194>.
+
+ [RFC8199] Bogdanovic, D., Claise, B., and C. Moberg, "YANG Module
+ Classification", RFC 8199, DOI 10.17487/RFC8199, July
+ 2017, <https://www.rfc-editor.org/info/rfc8199>.
+
+ [RFC8299] Wu, Q., Ed., Litkowski, S., Tomotaki, L., and K. Ogaki,
+ "YANG Data Model for L3VPN Service Delivery", RFC 8299,
+ DOI 10.17487/RFC8299, January 2018,
+ <https://www.rfc-editor.org/info/rfc8299>.
+
+ [RFC8309] Wu, Q., Liu, W., and A. Farrel, "Service Models
+ Explained", RFC 8309, DOI 10.17487/RFC8309, January 2018,
+ <https://www.rfc-editor.org/info/rfc8309>.
+
+ [RFC8342] Bjorklund, M., Schoenwaelder, J., Shafer, P., Watsen, K.,
+ and R. Wilton, "Network Management Datastore Architecture
+ (NMDA)", RFC 8342, DOI 10.17487/RFC8342, March 2018,
+ <https://www.rfc-editor.org/info/rfc8342>.
+
+ [RFC8343] Bjorklund, M., "A YANG Data Model for Interface
+ Management", RFC 8343, DOI 10.17487/RFC8343, March 2018,
+ <https://www.rfc-editor.org/info/rfc8343>.
+
+ [RFC8345] Clemm, A., Medved, J., Varga, R., Bahadur, N.,
+ Ananthakrishnan, H., and X. Liu, "A YANG Data Model for
+ Network Topologies", RFC 8345, DOI 10.17487/RFC8345, March
+ 2018, <https://www.rfc-editor.org/info/rfc8345>.
+
+ [RFC8346] Clemm, A., Medved, J., Varga, R., Liu, X.,
+ Ananthakrishnan, H., and N. Bahadur, "A YANG Data Model
+ for Layer 3 Topologies", RFC 8346, DOI 10.17487/RFC8346,
+ March 2018, <https://www.rfc-editor.org/info/rfc8346>.
+
+ [RFC8348] Bierman, A., Bjorklund, M., Dong, J., and D. Romascanu, "A
+ YANG Data Model for Hardware Management", RFC 8348,
+ DOI 10.17487/RFC8348, March 2018,
+ <https://www.rfc-editor.org/info/rfc8348>.
+
+ [RFC8349] Lhotka, L., Lindem, A., and Y. Qu, "A YANG Data Model for
+ Routing Management (NMDA Version)", RFC 8349,
+ DOI 10.17487/RFC8349, March 2018,
+ <https://www.rfc-editor.org/info/rfc8349>.
+
+ [RFC8466] Wen, B., Fioccola, G., Ed., Xie, C., and L. Jalil, "A YANG
+ Data Model for Layer 2 Virtual Private Network (L2VPN)
+ Service Delivery", RFC 8466, DOI 10.17487/RFC8466, October
+ 2018, <https://www.rfc-editor.org/info/rfc8466>.
+
+ [RFC8512] Boucadair, M., Ed., Sivakumar, S., Jacquenet, C.,
+ Vinapamula, S., and Q. Wu, "A YANG Module for Network
+ Address Translation (NAT) and Network Prefix Translation
+ (NPT)", RFC 8512, DOI 10.17487/RFC8512, January 2019,
+ <https://www.rfc-editor.org/info/rfc8512>.
+
+ [RFC8513] Boucadair, M., Jacquenet, C., and S. Sivakumar, "A YANG
+ Data Model for Dual-Stack Lite (DS-Lite)", RFC 8513,
+ DOI 10.17487/RFC8513, January 2019,
+ <https://www.rfc-editor.org/info/rfc8513>.
+
+ [RFC8519] Jethanandani, M., Agarwal, S., Huang, L., and D. Blair,
+ "YANG Data Model for Network Access Control Lists (ACLs)",
+ RFC 8519, DOI 10.17487/RFC8519, March 2019,
+ <https://www.rfc-editor.org/info/rfc8519>.
+
+ [RFC8525] Bierman, A., Bjorklund, M., Schoenwaelder, J., Watsen, K.,
+ and R. Wilton, "YANG Library", RFC 8525,
+ DOI 10.17487/RFC8525, March 2019,
+ <https://www.rfc-editor.org/info/rfc8525>.
+
+ [RFC8528] Bjorklund, M. and L. Lhotka, "YANG Schema Mount",
+ RFC 8528, DOI 10.17487/RFC8528, March 2019,
+ <https://www.rfc-editor.org/info/rfc8528>.
+
+ [RFC8529] Berger, L., Hopps, C., Lindem, A., Bogdanovic, D., and X.
+ Liu, "YANG Data Model for Network Instances", RFC 8529,
+ DOI 10.17487/RFC8529, March 2019,
+ <https://www.rfc-editor.org/info/rfc8529>.
+
+ [RFC8530] Berger, L., Hopps, C., Lindem, A., Bogdanovic, D., and X.
+ Liu, "YANG Model for Logical Network Elements", RFC 8530,
+ DOI 10.17487/RFC8530, March 2019,
+ <https://www.rfc-editor.org/info/rfc8530>.
+
+ [RFC8531] Kumar, D., Wu, Q., and Z. Wang, "Generic YANG Data Model
+ for Connection-Oriented Operations, Administration, and
+ Maintenance (OAM) Protocols", RFC 8531,
+ DOI 10.17487/RFC8531, April 2019,
+ <https://www.rfc-editor.org/info/rfc8531>.
+
+ [RFC8532] Kumar, D., Wang, Z., Wu, Q., Ed., Rahman, R., and S.
+ Raghavan, "Generic YANG Data Model for the Management of
+ Operations, Administration, and Maintenance (OAM)
+ Protocols That Use Connectionless Communications",
+ RFC 8532, DOI 10.17487/RFC8532, April 2019,
+ <https://www.rfc-editor.org/info/rfc8532>.
+
+ [RFC8533] Kumar, D., Wang, M., Wu, Q., Ed., Rahman, R., and S.
+ Raghavan, "A YANG Data Model for Retrieval Methods for the
+ Management of Operations, Administration, and Maintenance
+ (OAM) Protocols That Use Connectionless Communications",
+ RFC 8533, DOI 10.17487/RFC8533, April 2019,
+ <https://www.rfc-editor.org/info/rfc8533>.
+
+ [RFC8632] Vallin, S. and M. Bjorklund, "A YANG Data Model for Alarm
+ Management", RFC 8632, DOI 10.17487/RFC8632, September
+ 2019, <https://www.rfc-editor.org/info/rfc8632>.
+
+ [RFC8641] Clemm, A. and E. Voit, "Subscription to YANG Notifications
+ for Datastore Updates", RFC 8641, DOI 10.17487/RFC8641,
+ September 2019, <https://www.rfc-editor.org/info/rfc8641>.
+
+ [RFC8652] Liu, X., Guo, F., Sivakumar, M., McAllister, P., and A.
+ Peter, "A YANG Data Model for the Internet Group
+ Management Protocol (IGMP) and Multicast Listener
+ Discovery (MLD)", RFC 8652, DOI 10.17487/RFC8652, November
+ 2019, <https://www.rfc-editor.org/info/rfc8652>.
+
+ [RFC8675] Boucadair, M., Farrer, I., and R. Asati, "A YANG Data
+ Model for Tunnel Interface Types", RFC 8675,
+ DOI 10.17487/RFC8675, November 2019,
+ <https://www.rfc-editor.org/info/rfc8675>.
+
+ [RFC8676] Farrer, I., Ed. and M. Boucadair, Ed., "YANG Modules for
+ IPv4-in-IPv6 Address plus Port (A+P) Softwires", RFC 8676,
+ DOI 10.17487/RFC8676, November 2019,
+ <https://www.rfc-editor.org/info/rfc8676>.
+
+ [RFC8783] Boucadair, M., Ed. and T. Reddy.K, Ed., "Distributed
+ Denial-of-Service Open Threat Signaling (DOTS) Data
+ Channel Specification", RFC 8783, DOI 10.17487/RFC8783,
+ May 2020, <https://www.rfc-editor.org/info/rfc8783>.
+
+ [RFC8791] Bierman, A., Björklund, M., and K. Watsen, "YANG Data
+ Structure Extensions", RFC 8791, DOI 10.17487/RFC8791,
+ June 2020, <https://www.rfc-editor.org/info/rfc8791>.
+
+ [RFC8795] Liu, X., Bryskin, I., Beeram, V., Saad, T., Shah, H., and
+ O. Gonzalez de Dios, "YANG Data Model for Traffic
+ Engineering (TE) Topologies", RFC 8795,
+ DOI 10.17487/RFC8795, August 2020,
+ <https://www.rfc-editor.org/info/rfc8795>.
+
+ [RFC8819] Hopps, C., Berger, L., and D. Bogdanovic, "YANG Module
+ Tags", RFC 8819, DOI 10.17487/RFC8819, January 2021,
+ <https://www.rfc-editor.org/info/rfc8819>.
+
+ [RFC8944] Dong, J., Wei, X., Wu, Q., Boucadair, M., and A. Liu, "A
+ YANG Data Model for Layer 2 Network Topologies", RFC 8944,
+ DOI 10.17487/RFC8944, November 2020,
+ <https://www.rfc-editor.org/info/rfc8944>.
+
+ [RFC8960] Saad, T., Raza, K., Gandhi, R., Liu, X., and V. Beeram, "A
+ YANG Data Model for MPLS Base", RFC 8960,
+ DOI 10.17487/RFC8960, December 2020,
+ <https://www.rfc-editor.org/info/rfc8960>.
+
+ [RTGWG-POLICY]
+ Qu, Y., Tantsura, J., Lindem, A., and X. Liu, "A YANG Data
+ Model for Routing Policy", Work in Progress, Internet-
+ Draft, draft-ietf-rtgwg-policy-model-27, 10 January 2021,
+ <https://tools.ietf.org/html/draft-ietf-rtgwg-policy-
+ model-27>.
+
+ [SNOOPING-YANG]
+ Zhao, H., Liu, X., Liu, Y., Sivakumar, M., and A. Peter,
+ "A Yang Data Model for IGMP and MLD Snooping", Work in
+ Progress, Internet-Draft, draft-ietf-pim-igmp-mld-
+ snooping-yang-18, 14 August 2020,
+ <https://tools.ietf.org/html/draft-ietf-pim-igmp-mld-
+ snooping-yang-18>.
+
+ [SPRING-SR-YANG]
+ Litkowski, S., Qu, Y., Lindem, A., Sarkar, P., and J.
+ Tantsura, "YANG Data Model for Segment Routing", Work in
+ Progress, Internet-Draft, draft-ietf-spring-sr-yang-29, 8
+ December 2020, <https://tools.ietf.org/html/draft-ietf-
+ spring-sr-yang-29>.
+
+ [STAMP-YANG]
+ Mirsky, G., Min, X., and W. S. Luo, "Simple Two-way Active
+ Measurement Protocol (STAMP) Data Model", Work in
+ Progress, Internet-Draft, draft-ietf-ippm-stamp-yang-06, 7
+ October 2020, <https://tools.ietf.org/html/draft-ietf-
+ ippm-stamp-yang-06>.
+
+ [TEAS-ACTN-PM]
+ Lee, Y., Dhody, D., Karunanithi, S., Vilalta, R., King,
+ D., and D. Ceccarelli, "YANG models for VN/TE Performance
+ Monitoring Telemetry and Scaling Intent Autonomics", Work
+ in Progress, Internet-Draft, draft-ietf-teas-actn-pm-
+ telemetry-autonomics-04, 2 November 2020,
+ <https://tools.ietf.org/html/draft-ietf-teas-actn-pm-
+ telemetry-autonomics-04>.
+
+ [TEAS-YANG-PATH-COMP]
+ Busi, I., Belotti, S., Lopez, V., Sharma, A., and Y. Shi,
+ "Yang model for requesting Path Computation", Work in
+ Progress, Internet-Draft, draft-ietf-teas-yang-path-
+ computation-11, 16 November 2020,
+ <https://tools.ietf.org/html/draft-ietf-teas-yang-path-
+ computation-11>.
+
+ [TEAS-YANG-RSVP]
+ Beeram, V. P., Saad, T., Gandhi, R., Liu, X., Bryskin, I.,
+ and H. Shah, "A YANG Data Model for RSVP-TE Protocol",
+ Work in Progress, Internet-Draft, draft-ietf-teas-yang-
+ rsvp-te-08, 9 March 2020, <https://tools.ietf.org/html/
+ draft-ietf-teas-yang-rsvp-te-08>.
+
+ [TEAS-YANG-TE]
+ Saad, T., Gandhi, R., Liu, X., Beeram, V. P., and I.
+ Bryskin, "A YANG Data Model for Traffic Engineering
+ Tunnels, Label Switched Paths and Interfaces", Work in
+ Progress, Internet-Draft, draft-ietf-teas-yang-te-25, 27
+ July 2020,
+ <https://tools.ietf.org/html/draft-ietf-teas-yang-te-25>.
+
+ [TRILL-YANG-OAM]
+ Kumar, D., Senevirathne, T., Finn, N., Salam, S., Xia, L.,
+ and W. Hao, "YANG Data Model for TRILL Operations,
+ Administration, and Maintenance (OAM)", Work in Progress,
+ Internet-Draft, draft-ietf-trill-yang-oam-05, 31 March
+ 2017, <https://tools.ietf.org/html/draft-ietf-trill-yang-
+ oam-05>.
+
+ [TWAMP-DATA-MODEL]
+ Civil, R., Morton, A., Rahman, R., Jethanandani, M., and
+ K. Pentikousis, "Two-Way Active Measurement Protocol
+ (TWAMP) Data Model", Work in Progress, Internet-Draft,
+ draft-ietf-ippm-twamp-yang-13, 2 July 2018,
+ <https://tools.ietf.org/html/draft-ietf-ippm-twamp-yang-
+ 13>.
+
+ [UNI-TOPOLOGY]
+ Dios, O. G. D., Barguil, S., Wu, Q., and M. Boucadair, "A
+ YANG Model for User-Network Interface (UNI) Topologies",
+ Work in Progress, Internet-Draft, draft-ogondio-opsawg-
+ uni-topology-01, 2 April 2020,
+ <https://tools.ietf.org/html/draft-ogondio-opsawg-uni-
+ topology-01>.
+
+Appendix A. Layered YANG Module Examples Overview
+
+ This appendix lists a set of YANG data models that can be used for
+ the delivery of connectivity services. These models can be
+ classified as service, network, or device models.
+
+ It is not the intent of this appendix to provide an inventory of
+ tools and mechanisms used in specific network and service management
+ domains; such inventory can be found in documents such as [RFC7276].
+
+ The reader may refer to the YANG Catalog
+ (<https://www.yangcatalog.org>) or the public Github YANG repository
+ (<https://github.com/YangModels/yang>) to query existing YANG models.
+ The YANG Catalog includes some metadata to indicate the module type
+ ('module-classification') [NETMOD-MODEL]. Note that the mechanism
+ defined in [RFC8819] allows to associate tags with YANG modules in
+ order to help classifying the modules.
+
+A.1. Service Models: Definition and Samples
+
+ As described in [RFC8309], the service is "some form of connectivity
+ between customer sites and the Internet or between customer sites
+ across the network operator's network and across the Internet". More
+ concretely, an IP connectivity service can be defined as the IP
+ transfer capability characterized by a (Source Nets, Destination
+ Nets, Guarantees, Scope) tuple where "Source Nets" is a group of
+ unicast IP addresses, "Destination Nets" is a group of IP unicast
+ and/or multicast addresses, and "Guarantees" reflects the guarantees
+ (expressed, for example, in terms of QoS, performance, and
+ availability) to properly forward traffic to the said "Destination"
+ [RFC7297]. The "Scope" denotes the network perimeter (e.g., between
+ Provider Edge (PE) routers or Customer Nodes) where the said
+ guarantees need to be provided.
+
+ For example:
+
+ * The L3SM [RFC8299] defines the L3VPN service ordered by a customer
+ from a network operator.
+
+ * The L2SM [RFC8466] defines the L2VPN service ordered by a customer
+ from a network operator.
+
+ * The Virtual Network (VN) model [ACTN-VN-YANG] provides a YANG data
+ model applicable to any mode of VN operation.
+
+ L2SM and L3SM are customer service models as per [RFC8309].
+
+A.2. Schema Mount
+
+ Modularity and extensibility were among the leading design principles
+ of the YANG data modeling language. As a result, the same YANG
+ module can be combined with various sets of other modules and thus
+ form a data model that is tailored to meet the requirements of a
+ specific use case. [RFC8528] defines a mechanism, denoted "schema
+ mount", that allows for mounting one data model consisting of any
+ number of YANG modules at a specified location of another (parent)
+ schema.
+
+A.3. Network Models: Samples
+
+ L2NM [OPSAWG-L2NM] and L3NM [OPSAWG-L3SM-L3NM] are examples of YANG
+ network models.
+
+ Figure 9 depicts a set of additional network models such as topology
+ and tunnel models:
+
+ +-------------------------------+-------------------------------+
+ | Topology YANG modules | Tunnel YANG modules |
+ +-------------------------------+-------------------------------+
+ | +------------------+ | |
+ | |Network Topologies| | +------+ +-----------+ |
+ | | Model | | |Other | | TE Tunnel | |
+ | +--------+---------+ | |Tunnel| +----+------+ |
+ | | +---------+ | +------+ | |
+ | +---+Service | | +----------+---------+ |
+ | | |Topology | | | | | |
+ | | +---------+ | | | | |
+ | | +---------+ |+----+---+ +----+---+ +---+---+|
+ | +---+Layer 3 | ||MPLS-TE | |RSVP-TE | | SR-TE ||
+ | | |Topology | || Tunnel | | Tunnel | |Tunnel ||
+ | | +---------+ |+--------+ +--------+ +-------+|
+ | | +---------+ | |
+ | +---+TE | | |
+ | | |Topology | | |
+ | | +---------+ | |
+ | | +---------+ | |
+ | +---+Layer 3 | | |
+ | |Topology | | |
+ | +---------+ | |
+ +-------------------------------+-------------------------------+
+
+ Figure 9: Sample Resource-Facing Network Models
+
+
+ Examples of topology YANG modules are listed below:
+
+ Network Topologies Model:
+ [RFC8345] defines a base model for network topology and
+ inventories. Network topology data includes link, node, and
+ terminate-point resources.
+
+ TE Topology Model:
+ [RFC8795] defines a YANG data model for representing and
+ manipulating TE topologies.
+
+ This module is extended from the network topology model defined in
+ [RFC8345] and includes content related to TE topologies. This
+ model contains technology-agnostic TE topology building blocks
+ that can be augmented and used by other technology-specific TE
+ topology models.
+
+ Layer 3 Topology Model:
+ [RFC8346] defines a YANG data model for representing and
+ manipulating Layer 3 topologies. This model is extended from the
+ network topology model defined in [RFC8345] and includes content
+ related to Layer 3 topology specifics.
+
+ Layer 2 Topology Model:
+ [RFC8944] defines a YANG data model for representing and
+ manipulating Layer 2 topologies. This model is extended from the
+ network topology model defined in [RFC8345] and includes content
+ related to Layer 2 topology specifics.
+
+ Examples of tunnel YANG modules are provided below:
+
+ Tunnel Identities:
+ [RFC8675] defines a collection of YANG identities used as
+ interface types for tunnel interfaces.
+
+ TE Tunnel Model:
+ [TEAS-YANG-TE] defines a YANG module for the configuration and
+ management of TE interfaces, tunnels, and LSPs.
+
+ Segment Routing (SR) Traffic Engineering (TE) Tunnel Model:
+ [TEAS-YANG-TE] augments the TE generic and MPLS-TE model(s) and
+ defines a YANG module for SR-TE-specific data.
+
+ MPLS-TE Model:
+ [TEAS-YANG-TE] augments the TE generic and MPLS-TE model(s) and
+ defines a YANG module for MPLS-TE configurations, state, RPC, and
+ notifications.
+
+ RSVP-TE MPLS Model:
+ [TEAS-YANG-RSVP] augments the RSVP-TE generic module with
+ parameters to configure and manage signaling of MPLS RSVP-TE LSPs.
+
+ Other sample network models are listed hereafter:
+
+ Path Computation API Model:
+ [TEAS-YANG-PATH-COMP] defines a YANG module for a stateless RPC
+ that complements the stateful solution defined in [TEAS-YANG-TE].
+
+ OAM Models (including Fault Management (FM) and Performance
+ Monitoring):
+ [RFC8532] defines a base YANG module for the management of OAM
+ protocols that use Connectionless Communications. [RFC8533]
+ defines a retrieval method YANG module for connectionless OAM
+ protocols. [RFC8531] defines a base YANG module for connection-
+ oriented OAM protocols. These three models are intended to
+ provide consistent reporting, configuration, and representation
+ for connectionless OAM and connection-oriented OAM separately.
+
+ Alarm monitoring is a fundamental part of monitoring the network.
+ Raw alarms from devices do not always tell the status of the
+ network services or necessarily point to the root cause.
+ [RFC8632] defines a YANG module for alarm management.
+
+A.4. Device Models: Samples
+
+ Network Element models (listed in Figure 10) are used to describe how
+ a service can be implemented by activating and tweaking a set of
+ functions (enabled in one or multiple devices, or hosted in cloud
+ infrastructures) that are involved in the service delivery. For
+ example, the L3VPN service will involve many PEs and require
+ manipulating the following modules:
+
+ * Routing management [RFC8349]
+
+ * BGP [IDR-BGP-MODEL]
+
+ * PIM [PIM-YANG]
+
+ * NAT management [RFC8512]
+
+ * QoS management [QOS-MODEL]
+
+ * ACLs [RFC8519]
+
+ Figure 10 uses IETF-defined data models as an example.
+
+ +------------------------+
+ +-+ Device Model |
+ | +------------------------+
+ | +------------------------+
+ +---------------+ | | Logical Network |
+ | | +-+ Element Model |
+ | Architecture | | +------------------------+
+ | | | +------------------------+
+ +-------+-------+ +-+ Network Instance Model |
+ | | +------------------------+
+ | | +------------------------+
+ | +-+ Routing Type Model |
+ | +------------------------+
+ +-------+----------+----+------+------------+-----------+------+
+ | | | | | | |
+ +-+-+ +---+---+ +----+----+ +--+--+ +----+----+ +--+--+ |
+ |ACL| |Routing| |Transport| | OAM | |Multicast| | PM | Others
+ +---+ +-+-----+ +----+----+ +--+--+ +-----+---+ +--+--+
+ | +-------+ | +------+ | +--------+ | +-----+ | +-----+
+ +-+Core | +-+ MPLS | +-+ BFD | +-+IGMP | +-+TWAMP|
+ | |Routing| | | Base | | +--------+ | |/MLD | | +-----+
+ | +-------+ | +------+ | +--------+ | +-----+ | +-----+
+ | +-------+ | +------+ +-+LSP Ping| | +-----+ +-+OWAMP|
+ +-+ BGP | +-+ MPLS | | +--------+ +-+ PIM | | +-----+
+ | +-------+ | | LDP | | +--------+ | +-----+ | +-----+
+ | +-------+ | +------+ +-+MPLS-TP | | +-----+ +-+LMAP |
+ +-+ ISIS | | +------+ +--------+ +-+ MVPN| +-----+
+ | +-------+ +-+ MPLS | +-----+
+ | +-------+ |Static|
+ +-+ OSPF | +------+
+ | +-------+
+ | +-------+
+ +-+ RIP |
+ | +-------+
+ | +-------+
+ +-+ VRRP |
+ | +-------+
+ | +-------+
+ +-+SR/SRv6|
+ | +-------+
+ | +-------+
+ +-+ISIS-SR|
+ | +-------+
+ | +-------+
+ +-+OSPF-SR|
+ +-------+
+
+ Figure 10: Network Element Models Overview
+
+A.4.1. Model Composition
+
+ Logical Network Element Model:
+ [RFC8530] defines a logical network element model that can be used
+ to manage the logical resource partitioning that may be present on
+ a network device. Examples of common industry terms for logical
+ resource partitioning are Logical Systems or Logical Routers.
+
+ Network Instance Model:
+ [RFC8529] defines a network instance module. This module can be
+ used to manage the virtual resource partitioning that may be
+ present on a network device. Examples of common industry terms
+ for virtual resource partitioning are VRF instances and Virtual
+ Switch Instances (VSIs).
+
+A.4.2. Device Management
+
+ The following list enumerates some YANG modules that can be used for
+ device management:
+
+ * [RFC8348] defines a YANG module for the management of hardware.
+
+ * [RFC7317] defines the "ietf-system" YANG module that provides many
+ features such as the configuration and the monitoring of system or
+ system control operations (e.g., shutdown, restart, and setting
+ time) identification.
+
+ * [RFC8341] defines a network configuration access control YANG
+ module.
+
+A.4.3. Interface Management
+
+ The following provides some YANG modules that can be used for
+ interface management:
+
+ * [RFC7224] defines a YANG module for interface type definitions.
+
+ * [RFC8343] defines a YANG module for the management of network
+ interfaces.
+
+A.4.4. Some Device Model Examples
+
+ The following provides an overview of some device models that can be
+ used within a network. This list is not comprehensive.
+
+ L2VPN:
+ [L2VPN-YANG] defines a YANG module for MPLS-based Layer 2 VPN
+ services (L2VPN) [RFC4664] and includes switching between the
+ local attachment circuits. The L2VPN model covers point-to-point
+ Virtual Private Wire Service (VPWS) and Multipoint Virtual Private
+ LAN Service (VPLS). These services use signaling of Pseudowires
+ across MPLS networks using LDP [RFC8077][RFC4762] or BGP
+ [RFC4761].
+
+ EVPN:
+ [EVPN-YANG] defines a YANG module for Ethernet VPN services. The
+ model is agnostic of the underlay. It applies to MPLS as well as
+ to Virtual eXtensible Local Area Network (VxLAN) encapsulation.
+ The module is also agnostic to the services, including E-LAN,
+ E-LINE, and E-TREE services.
+
+ L3VPN:
+ [L3VPN-YANG] defines a YANG module that can be used to configure
+ and manage BGP L3VPNs [RFC4364]. It contains VRF-specific
+ parameters as well as BGP-specific parameters applicable for
+ L3VPNs.
+
+ Core Routing:
+ [RFC8349] defines the core routing YANG data model, which is
+ intended as a basis for future data model development covering
+ more-sophisticated routing systems. It is expected that other
+ Routing technology YANG modules (e.g., VRRP, RIP, ISIS, or OSPF
+ models) will augment the Core Routing base YANG module.
+
+ MPLS:
+ [RFC8960] defines a base model for MPLS that serves as a base
+ framework for configuring and managing an MPLS switching
+ subsystem. It is expected that other MPLS technology YANG modules
+ (e.g., MPLS LSP Static, LDP, or RSVP-TE models) will augment the
+ MPLS base YANG module.
+
+ BGP:
+ [IDR-BGP-MODEL] defines a YANG module for configuring and managing
+ BGP, including protocol, policy, and operational aspects based on
+ data center, carrier, and content provider operational
+ requirements.
+
+ Routing Policy:
+ [RTGWG-POLICY] defines a YANG module for configuring and managing
+ routing policies based on operational practice. The module
+ provides a generic policy framework that can be augmented with
+ protocol-specific policy configuration.
+
+ SR/SRv6:
+ [SPRING-SR-YANG] defines a YANG module for segment routing
+ configuration and operation.
+
+
+ BFD:
+ Bidirectional Forwarding Detection (BFD) [RFC5880] is a network
+ protocol that is used for liveness detection of arbitrary paths
+ between systems. [BFD-YANG] defines a YANG module that can be
+ used to configure and manage BFD.
+
+ Multicast:
+ [PIM-YANG] defines a YANG module that can be used to configure and
+ manage Protocol Independent Multicast (PIM) devices.
+
+ [RFC8652] defines a YANG module that can be used to configure and
+ manage Internet Group Management Protocol (IGMP) and Multicast
+ Listener Discovery (MLD) devices.
+
+ [SNOOPING-YANG] defines a YANG module that can be used to
+ configure and manage Internet Group Management Protocol (IGMP) and
+ Multicast Listener Discovery (MLD) snooping devices.
+
+ [MVPN-YANG] defines a YANG data model to configure and manage
+ Multicast in MPLS/BGP IP VPNs (MVPNs).
+
+ PM:
+ [TWAMP-DATA-MODEL] defines a YANG data model for client and server
+ implementations of the Two-Way Active Measurement Protocol
+ (TWAMP).
+
+ [STAMP-YANG] defines the data model for implementations of
+ Session-Sender and Session-Reflector for Simple Two-way Active
+ Measurement Protocol (STAMP) mode using YANG.
+
+ [RFC8194] defines a YANG data model for Large-Scale Measurement
+ Platforms (LMAPs).
+
+ ACL:
+ An Access Control List (ACL) is one of the basic elements used to
+ configure device-forwarding behavior. It is used in many
+ networking technologies such as Policy-Based Routing, firewalls,
+ etc. [RFC8519] describes a YANG data model of ACL basic building
+ blocks.
+
+ QoS:
+ [QOS-MODEL] describes a YANG module of Differentiated Services for
+ configuration and operations.
+
+ NAT:
+ For the sake of network automation and the need for programming
+ the Network Address Translation (NAT) function in particular, a
+ YANG data model for configuring and managing the NAT is essential.
+
+ [RFC8512] defines a YANG module for the NAT function covering a
+ variety of NAT flavors such as Network Address Translation from
+ IPv4 to IPv4 (NAT44), Network Address and Protocol Translation
+ from IPv6 Clients to IPv4 Servers (NAT64), customer-side
+ translator (CLAT), Stateless IP/ICMP Translation (SIIT), Explicit
+ Address Mappings (EAMs) for SIIT, IPv6-to-IPv6 Network Prefix
+ Translation (NPTv6), and Destination NAT.
+
+ [RFC8513] specifies a Dual-Stack Lite (DS-Lite) YANG module.
+
+ Stateless Address Sharing:
+ [RFC8676] specifies a YANG module for Address plus Port (A+P)
+ address sharing, including Lightweight 4over6, Mapping of Address
+ and Port with Encapsulation (MAP-E), and Mapping of Address and
+ Port using Translation (MAP-T) softwire mechanisms.
+
+Acknowledgements
+
+ Thanks to Joe Clark, Greg Mirsky, Shunsuke Homma, Brian Carpenter,
+ Adrian Farrel, Christian Huitema, Tommy Pauly, Ines Robles, and
+ Olivier Augizeau for the review.
+
+ Many thanks to Robert Wilton for the detailed AD review.
+
+ Thanks to Éric Vyncke, Roman Danyliw, Erik Kline, and Benjamin Kaduk
+ for the IESG review.
+
+Contributors
+
+ Christian Jacquenet
+ Orange
+ Rennes, 35000
+ France
+
+ Email: Christian.jacquenet@orange.com
+
+
+ Luis Miguel Contreras Murillo
+ Telefonica
+
+ Email: luismiguel.contrerasmurillo@telefonica.com
+
+
+ Oscar Gonzalez de Dios
+ Telefonica
+ Madrid
+ Spain
+
+ Email: oscar.gonzalezdedios@telefonica.com
+
+
+ Weiqiang Cheng
+ China Mobile
+
+ Email: chengweiqiang@chinamobile.com
+
+
+ Young Lee
+ Sung Kyun Kwan University
+
+ Email: younglee.tx@gmail.com
+
+
+Authors' Addresses
+
+ Qin Wu (editor)
+ Huawei
+ 101 Software Avenue
+ Yuhua District
+ Nanjing
+ Jiangsu, 210012
+ China
+
+ Email: bill.wu@huawei.com
+
+
+ Mohamed Boucadair (editor)
+ Orange
+ Rennes 35000
+ France
+
+ Email: mohamed.boucadair@orange.com
+
+
+ Diego R. Lopez
+ Telefonica I+D
+ Spain
+
+ Email: diego.r.lopez@telefonica.com
+
+
+ Chongfeng Xie
+ China Telecom
+ Beijing
+ China
+
+ Email: xiechf@chinatelecom.cn
+
+
+ Liang Geng
+ China Mobile
+
+ Email: gengliang@chinamobile.com