<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-network-inventory-topology-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Inventory Topology Mapping">A YANG Network Data Model for Inventory Topology Mapping</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-04"/>
    <author fullname="Bo Wu" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG</workgroup>
    <keyword>Automation</keyword>
    <keyword>Network Digital Map</keyword>
    <keyword>Network Inventory</keyword>
    <keyword>Network Operation</keyword>
    <keyword>Network Topology</keyword>
    <abstract>
      <?line 54?>

<t>This document defines a YANG data model to
   map the network inventory data with the topology data
   to form a base underlay network. The data model facilitates the
   correlation between the layer (e.g.,  Layer 2 or Layer 3) topology information
   and the inventory data of the underlay network for better service
   provisioning, network maintenance operations, and other assessment scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Inventory YANG Working Group mailing list (inventory-yang@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-ivy-wg/network-inventory-topology"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-ivy-network-inventory-yang"/> defines the base network inventory
  model to aggregate the inventory data of Network Elements (NEs). This data includes identification of these NEs and their hardware,
  firmware, and software components.  Examples
   of inventory hardware components could be rack, shelf, slot, board,
   or physical port.  Examples of inventory software components could
   be platform Operating System (OS), software-modules, bios, or boot-
   loader <xref target="I-D.ietf-ivy-network-inventory-software"/>.</t>
      <t>In order to ease navigation from (or to) inventory and network topologies,
this document extends the network topology data model <xref target="RFC8345"/> for network
inventory mapping: "ietf-network-inventory-topology" (<xref target="sec-module"/>).  This data model provides a mechanism for the correlation with existing
network and topology data models, such as "A YANG Network Data Model for Service Attachment Points (SAPs)" <xref target="RFC9408"/>, "A YANG Data Model for Layer 2 Network Topologies" <xref target="RFC8944"/>, and "A YANG Data Model for Layer 3 Topologies" <xref target="RFC8346"/>.</t>
      <t>Similar to the base inventory data model  <xref target="I-D.ietf-ivy-network-inventory-yang"/>, the network inventory topology
does not make any assumption about involved NEs and their roles in topologies. As such, the mapping
model can be applied independent of the network type (optical local loops, access network, core network, etc.) and application.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
          </li>
        </ul>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>AAAA --&gt; the assigned RFC number for <xref target="I-D.ietf-ivy-network-inventory-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The meanings of the symbols in the YANG tree diagrams are defined in <xref target="RFC8340"/>.</t>
      <t>This document uses terms defined in <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
    </section>
    <section anchor="sample">
      <name>Sample Use Cases of the Data Model</name>
      <section anchor="determine-available-resources-of-service-attachment-points-saps">
        <name>Determine Available Resources of Service Attachment Points (SAPs)</name>
        <t>The inventory topology data model can be used as a basis for correlating
   underlay information, such as physical port components.  <xref target="nwi-topology-usage"/> exemplifies this usage.</t>
        <t>During service provisioning, to check available physical port
   resources, the SAPs information can be
   associated with the underlay inventory information and interface
   information associated with the inventory topology, e.g.,
   "parent-termination-point" of SAP Model can be associated with the
   "port-component-ref" of the inventory topology data model,
   which can be used to check the availability and capacity of physical
   ports.</t>
        <figure anchor="nwi-topology-usage">
          <name>An Example Usage of Network Inventory Topology</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="432" viewBox="0 0 432 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,288 L 32,320" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,64" fill="none" stroke="black"/>
                <path d="M 136,112 L 136,160" fill="none" stroke="black"/>
                <path d="M 136,208 L 136,256" fill="none" stroke="black"/>
                <path d="M 192,160 L 192,208" fill="none" stroke="black"/>
                <path d="M 208,64 L 208,112" fill="none" stroke="black"/>
                <path d="M 208,256 L 208,288" fill="none" stroke="black"/>
                <path d="M 224,160 L 224,208" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,64" fill="none" stroke="black"/>
                <path d="M 280,112 L 280,160" fill="none" stroke="black"/>
                <path d="M 280,208 L 280,256" fill="none" stroke="black"/>
                <path d="M 384,288 L 384,320" fill="none" stroke="black"/>
                <path d="M 136,32 L 280,32" fill="none" stroke="black"/>
                <path d="M 136,64 L 280,64" fill="none" stroke="black"/>
                <path d="M 136,112 L 280,112" fill="none" stroke="black"/>
                <path d="M 136,160 L 280,160" fill="none" stroke="black"/>
                <path d="M 136,208 L 280,208" fill="none" stroke="black"/>
                <path d="M 136,256 L 280,256" fill="none" stroke="black"/>
                <path d="M 32,288 L 384,288" fill="none" stroke="black"/>
                <path d="M 32,320 L 384,320" fill="none" stroke="black"/>
                <g class="text">
                  <text x="212" y="52">Customer</text>
                  <text x="36" y="84">Customer</text>
                  <text x="104" y="84">Service</text>
                  <text x="164" y="84">Models</text>
                  <text x="52" y="100">(e.g.,</text>
                  <text x="104" y="100">L3SM,</text>
                  <text x="152" y="100">L2SM)</text>
                  <text x="200" y="132">Service</text>
                  <text x="208" y="148">Orchestration</text>
                  <text x="56" y="196">SAP</text>
                  <text x="104" y="196">Network</text>
                  <text x="160" y="196">Model</text>
                  <text x="272" y="196">Inventory</text>
                  <text x="348" y="196">Topology</text>
                  <text x="408" y="196">Model</text>
                  <text x="208" y="228">Network</text>
                  <text x="204" y="244">Controller</text>
                  <text x="208" y="308">Network</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                        +-----------------+
                        |     Customer    |
                        +--------+--------+
        Customer Service Models  |
           (e.g., L3SM, L2SM)    |
                        +--------+--------+
                        |    Service      |
                        |  Orchestration  |
                        +------+---+------+
                               |   |
             SAP Network Model |   | Inventory Topology Model
                        +------+---+------+
                        |     Network     |
                        |   Controller    |
                        +--------+--------+
                                 |
           +---------------------+---------------------+
           |                  Network                  |
           +-------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="what-if-scenarios">
        <name>"What-if" Scenarios</name>
        <t><xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> defines Network Digital Twin (NDT)
   as a virtual representation of the physical network.  Such
    representation is meant to be used to analyze,
   diagnose, emulate, and then manage the physical network based on
   data, models, and interfaces.</t>
        <t>The management system can use NDT to build
   multi-layer topology maps for networks and endpoints with
   relationship types and dependencies, and identify potential impacts
   on configuration management information from incidents, problems, and
   changes. More generally, the inventory topology data model can be used as part of the Service &amp; Infrastructure Maps (SIMAP) <xref target="I-D.ietf-nmop-simap-concept"/>.</t>
        <t>The inventory topology data model can, for example, be used to emulate
   several "what-if" scenarios such as the impact of End of Life (EOL) or depletion of a
   hardware component (chipset) on the network resilience and service
   availability.</t>
      </section>
    </section>
    <section anchor="module-tree-structure">
      <name>Module Tree Structure</name>
      <t>An overview of the structure of the "ietf-network-inventory-topology" module is shown in <xref target="tree"/>.</t>
      <figure anchor="tree">
        <name>The Structure of the Network Inventory Mapping Data Model</name>
        <artwork align="center"><![CDATA[
module: ietf-network-inventory-topology
  augment /nw:networks/nw:network/nw:node:
    +--ro inventory-mapping-attributes
            {topology-to-inventory-navigate}?
       +--ro ne-ref?   nwi:ne-ref
  augment /nw:networks/nw:network/nt:link:
    +--ro inventory-mapping-attributes
            {topology-to-inventory-navigate}?
       +--ro cable-name?   string
       +--ro link-type?    string
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--ro inventory-mapping-attributes
            {topology-to-inventory-navigate}?
       +--ro ne-ref?          nwi:ne-ref
       +--ro port-ref?        leafref
       +--ro port-breakout!
          +--ro breakout-channel* [channel-id]
             +--ro channel-id    uint16
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element:
    +--ro node-ref?      leafref {inventory-to-topology-navigate}?
    +--ro network-ref?   -> /nw:networks/network/network-id
            {inventory-to-topology-navigate}?

]]></artwork>
      </figure>
      <t>The module defines two features "inventory-to-topology-navigate" and "topology-to-inventory-navigate"
to control the navigation direction (from topology to inventory and vice versa).</t>
      <t>The module augments the "ietf-network-topology" module as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Inventory mapping attributes for nodes, links, and termination
      points: The corresponding containers augments the topology module
      with the references to the base network inventory  </t>
          <t>
The inventory topology
 model associates inventory data with overlay topologies.  It can be
 used as the "supporting-networks" of SAP, Layer 2, or Layer 3
 topologies.</t>
        </li>
      </ul>
      <t>Also, the "ietf-network-inventory-topology" module augments the "ietf-network-inventory" to add
required references to navigate from the inventory to topologies ('node-ref' and 'network-ref').</t>
      <section anchor="cable-level-extensions-cable-name-and-link-type">
        <name>Cable-Level Extensions: cable-name and link-type</name>
        <t>The dedicated passive-network inventory defined in draft-ygb-ivy-passive-network-inventory tracks and manages complex passive paths. For the simpler case of a direct point-to-point cable or fibre between two devices, this document adds lightweight leaves to the topology link:</t>
        <ul spacing="normal">
          <li>
            <t>cable-name – optional asset identifier for a single physical cable (e.g., "CAB-2025-042").</t>
          </li>
          <li>
            <t>link-type – flexible-text hint such as "copper", "single-mode-fibre", "multi-mode-fibre", "coax".</t>
          </li>
        </ul>
        <t>When the link is formed by a single physical cable (e.g., one factory-terminated patch cord), both leaves may be populated.
If the link is composed of several passive elements—such as jumpers, adapters, patch panels, or splice points—the cable-name leaf can be omitted, and the controller can derive the full path by traversing the TP → port-ref references and using the passive-inventory module.</t>
      </section>
      <section anchor="port-breakout-capability">
        <name>Port-Breakout Capability</name>
        <t>High-density Ethernet ports (e.g., 400 Gb/s DR4) can be split into
multiple independent lower-speed channels. The breakout channels
represent the intrinsic capability of the port to be partitioned,
regardless of whether the port is currently configured as a trunk or as
a breakout port.</t>
        <t>A trunk port is associated with exactly one physical interface.
A breakout port is a port that is decomposed into two or more physical
interfaces; those interfaces may run at the same or different speeds
and may consume the same or a different number of breakout channels.</t>
        <t>The container breakout-config is added under the termination-point
augmentation.  It lists the logical channels into which the single
physical port can be divided.  Only termination-points whose parent
port is breakout-capable need to instantiate the container; otherwise
the container is omitted, keeping the topology model minimal for the
common non-breakout case.</t>
        <t>Breakout channel is an atomic resource element obtained by partitioning a breakout port.
One physical interface may be associated with one or more breakout
channels, but one breakout channel MUST NOT be associated with more
than one physical interface. Appendix B provides example configurations.</t>
        <t>It is assumed that a port which supports breakout can be configured
either as a trunk port or as a breakout port. Interface channelisation (e.g., VLAN sub-interfaces) is outside the scope of this document and is addressed by the Layer 2 network topology model <xref target="RFC8944"/>.</t>
      </section>
    </section>
    <section anchor="sec-module">
      <name>Network Inventory Topology YANG Module</name>
      <t>This module augments the Network Topology <xref target="RFC8345"/>.</t>
      <t>This module imports the base network inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <sourcecode type="yang" markers="true" name="ietf-network-inventory-topology@2025-10-20.yang"><![CDATA[
module ietf-network-inventory-topology {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology";
  prefix nwit;

  import ietf-network {
    prefix nw;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies,
                 Section 4.1";
  }
  import ietf-network-topology {
    prefix nt;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies,
                 Section 4.2";
  }
  import ietf-network-inventory {
    prefix nwi;
    reference
      "RFC AAAA: A YANG Data Model for Network Inventory";
  }

  organization
    "IETF Network Inventory YANG (ivy) Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/ivy>
     WG List:  <mailto:inventory-yang@ietf.org>

     Editor: Bo Wu
             <lana.wubo@huawei.com>
     Editor: Mohamed Boucadair
             <mohamed.boucadair@orange.com>
     Author: Cheng Zhou
             <zhouchengyjy@chinamobile.com>
     Author: Qin Wu
             <bill.wu@huawei.com>";
  description
    "This YANG module defines a YANG module for network
     topology and inventory mapping.

     Copyright (c) 2025 IETF Trust and the persons identified
     as authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.";

  revision 2025-10-20 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A Network Data Model for Inventory Topology
                 Mapping";
  }

  /* features */

  feature inventory-to-topology-navigate {
    description
      "Indicates support for navigating from inventory to topology.";
  }

  feature topology-to-inventory-navigate {
    description
      "Indicates support for navigating from topology to inventory.";
  }

  /* Groupings */
  /* Node Grouping Feature with 1:1 mapping to NE*/

  grouping node-inventory-feature-attributes {
    description
      "Network Inventory mapping node scope attributes";
    container inventory-mapping-attributes {
      if-feature "topology-to-inventory-navigate";
      config false;
      description
        "The container node attributes of Network Inventory
         mapping.";
      leaf ne-ref {
        type nwi:ne-ref;
        config false;
        description
          "1:1 mapping to the Network Element (NE) from which this
           node is abstracted.";
      }
    }
  }

  grouping tp-inventory-feature-attributes {
    description
      "Network Inventory mapping Termination Point (TP) scope
       attributes.";
    container inventory-mapping-attributes {
      if-feature "topology-to-inventory-navigate";
      config false;
      description
        "Specifies the TP attributes of Network Inventory mapping.";
      /* 1:1 mapping to physical port component */
      uses nwi:port-ref;
      // breakout channels (lightweight, per physical port)
      container port-breakout {
        presence "When present, it indicates that port breakout is
                  supported.";
        description
          "Breakout capability of the physical port represented by
           this TP.
           One TP = one physical port; channels are listed here.";
        list breakout-channel {
          key "channel-id";
          description
            "A single lane or sub-port that the physical port can be
             partitioned into.";
          leaf channel-id {
            type uint16;
            description
              "Unique index of the breakout channel within the port.";
          }
        } // breakout-channel
      } // port-breakout          
    }
  }

  grouping link-inventory-feature-attributes {
    description
      "Network Inventory mapping link scope attributes.";
    container inventory-mapping-attributes {
      if-feature "topology-to-inventory-navigate";
      config false;
      description
        "Specifies  the link attributes of network inventory
         mapping.";
      leaf cable-name {
        type string;
        config false;
        description
          "Reports the reference of the cable inventory from which
           this link is abstracted.";
      }
      leaf link-type {
        type string;
        config false;
        description
          "Reports the type of the link.";
      }
    }
  }

  /* Main blocks */

  augment "/nw:networks/nw:network/nw:node" {
    description
      "Groups parameters for inventory at the node level.";
    uses node-inventory-feature-attributes;
  }

  augment "/nw:networks/nw:network/nt:link" {
    description
      "Augments inventory topology link information.";
    uses link-inventory-feature-attributes;
  }

  augment "/nw:networks/nw:network/nw:node/nt:termination-point" {
    description
      "Augments inventory termination point information.";
    uses tp-inventory-feature-attributes;
  }

  /* Augment the network-inventory to add topology navigate */

  augment "/nwi:network-inventory/nwi:network-elements"
        + "/nwi:network-element" {
    if-feature "inventory-to-topology-navigate";
    description
      "Augments the network element with 1:1 mapping with the network
       the element is part of.";
    uses nw:node-ref;
  }
}

]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section is modeled after the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The "ietf-network-inventory-topology" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management (1) have to
use a secure transport layer (e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and
QUIC {{?RFC9000]) and (2) have to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>No writable data nodes are defined in this module; all nodes are read-only ("config false").</t>
      <t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
      <dl>
        <dt>'ne-ref':</dt>
        <dd>
          <t>The reference may be used to track the set of network elements.</t>
        </dd>
      </dl>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
   the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
   Name:  ietf-network-inventory-topology
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology
   Prefix:  nwit
   Maintained by IANA?  N
   Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="14" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-11"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-software">
          <front>
            <title>A YANG Network Data Model of Network Inventory Software Extensions</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="10" month="June" year="2025"/>
            <abstract>
              <t>   The base Network Inventory YANG model defines the physical network
   elements (NEs) and hardware components of NEs.  This document extends
   the base Network Inventory model for non-physical NEs (e.g.,
   controllers, virtual routers, virtual firewalls) and software
   components (e.g., platform operating system (OS), software-patch).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-software-01"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="6" month="July" year="2025"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications, realize efficient and cost-effective data-driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Network Digital
   Twin, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-11"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-simap-concept">
          <front>
            <title>SIMAP: Concept, Requirements, and Use Cases</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Everything OPS</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="18" month="October" year="2025"/>
            <abstract>
              <t>   This document defines the concept of Service &amp; Infrastructure Maps
   (SIMAP) and identifies a set of SIMAP requirements and use cases.
   The SIMAP was previously known as Digital Map.

   The document intends to be used as a reference for the assessment of
   the various topology modules to meet SIMAP requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-07"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
      </references>
    </references>
    <?line 498?>

<section anchor="cable-name-link-type-usage-examples">
      <name>Cable-Name / Link-Type Usage Examples</name>
      <t>This appendix illustrates when to populate the link-level <tt>cable-name</tt> and <tt>link-type</tt> leaves defined and when to rely on the forthcoming <tt>ietf-passive-inventory</tt> module for multi-segment passive paths.</t>
      <ul spacing="normal">
        <li>
          <t>Direct Point-to-Point Cable</t>
        </li>
      </ul>
      <t>Topology:
[TP-A] ——— 3 m duplex fibre ——— [TP-B]</t>
      <t>The link is realised by exactly one cable stock-keeping unit.
<tt>cable-name</tt> is filled with the operator's asset tag; <tt>link-type</tt> is set to "fiber".</t>
      <ul spacing="normal">
        <li>
          <t>Three-Segment Passive Path of Fiber Distribution Terminal (FDT)</t>
        </li>
      </ul>
      <t>Topology:
[TP-A] —— FDT-1 —— segment —— FDT-2 —— [TP-B]</t>
      <t>The link spans two FDTs and one cable segment (no active inventory).
<tt>cable-name</tt> is omitted; the controller derives the complete passive path by:
1. reading <tt>port-ref</tt> of TP-A and TP-B;
2. walking the passive-inventory relationships (FDT-1 ↔ cable ↔ FDT-2).</t>
    </section>
    <section anchor="json-example-of-an-mpo-breakout-channel-port">
      <name>JSON Example of an MPO Breakout-Channel Port</name>
      <t>This appendix provides an example of a 400 Gb/s DR4 port that is physically implemented as four independent 100 Gb/s lanes (an MPO breakout). The lanes are exposed as breakout-channel entries so that the port can later be configured as either a single 400G trunk or four 100G breakout interfaces. The instance data below shows the minimal JSON encoding <xref target="RFC7951"/> of the port-breakout container for this port.</t>
      <t>=============== NOTE: '' line wrapping per RFC 8792 ================</t>
      <t>{
  "ietf-network-topology:networks": {
    "network": [
      {
        "network-id": "example:underlay-topology-400g",
        "node": [
          {
            "node-id": "example:n1",
            "termination-point": [
              {
                "tp-id": "example:400g-1/0/1",
                "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
                  "ne-ref": "example:NE-1",
                  "port-ref": "example:port-1",
                  "port-breakout": {
                    "breakout-channel": [
                      { "channel-id": 1 },
                      { "channel-id": 2 },
                      { "channel-id": 3 },
                      { "channel-id": 4 }
                    ]
                  }
                }
              }
            ]
          }
        ]
      }
    ]
  }
}</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank Italo Busi, Olga Havel, Aihua Guo, Oscar
   Gonzalez de Dios, and many others for their helpful comments and
   suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Chaode Yu">
        <organization>Huawei</organization>
        <address>
          <email>yuchaode@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81ce3PbyJH/H59iQledxV2Belj7ouLdlWXZqytLVkztbXLJ
VhkEhiRiEGAwgGRaUSp/5QPc5RPuJ7lf9zwwAEnRm82lwkq8JDDT09PT7+5R
GIZBlVaZHIreifjdyeVLcSmr26J8J55HVSQuikRmYlKU4jy/kXlVlEtxXSyK
rJguxUW0WKT5tBdE43EpbwDioUFxVMkpXg2FqpIgSIo4j+ZYNymjSRWmspqE
6c0yzPXyYWpBhZUBFe4fBaoez1Ol0iKvlgtMPj+7fhHk9Xwsy2GQYIVhEBe5
krmq1VBUZS0D4PUkiEoZAb/XC1lGFWYrEeUJcMujqZxjnV5Ai07Lol5gmCVB
sx2iTC94J5d4ngyDQITipK6KOQOjX45q6TStooy27T92kPyHDhv/oSVcEER1
NSuwLREGAp9JnWWaYs8K8UPNz4pyGuXpBwYyFN/V0a1M+UVZ0JHKJMWa/EDO
ozQbigw7HtzW4+LbGQ8exMU8WF3hopjhvwlWquMoidJyzWqvyyifSh/4XM8a
jO2sbwses2GR05nMp+K/Z8W6vZzO0pzYb5xmrTU+YHhME5d/XH4b06A5j9mw
xm/SfCutDGRAyUCaFmHAS1WZjnHSOAeG7aMfQTjE7xj6JuAG9hI40+gW8Lwo
iX9uwLNBmk+8X2EYimisqjKKq4DAXM9SJSAxNfGqSOQkzSVYWAtsQoI6Z0Gt
Cho9jxaimklhREk4UdJDb9Nqxu+tYPFjmlgVJOpzAB5HSoo6T2SZRUsLaAA8
pL/cJIrTDOxeARkAJBBxUZYyYzqIMaZJmfNaACNLsSMH08GuEK/41yHIZr4+
6TfYOFqQYAgWVILQ2UUx4addHFlXYeEKQJUsb9KY0VqUxU1KagOqaNeNxeHk
lcyjPJaicKphl5csAL0UkVJSKaa6ijGyTAs10Ac0T5MEvBk8gnBXZZHUMWMc
iLu7X52HzwcPaLQlpOL+3p0j7YMJvnJgQN0erIim01JOQesN1LAK5CxjjabE
zuWZ6g8M79CgNI+zOsGCaYIB6SSN9TlpUmJ9TLDkTksxi8rkFopzF1hM0nLO
3/m9KiYV/cJpzxdFTqsNhDh7H80XmVQsDxMPQwvIG46vdZbgoAR4/N2uUDOZ
TfCfrKh2xbjAhF0tVmIxWyogmolFUVbeKu0l1mCklyAoWGUBlmTWNjoXime0
VJWci53Xo/6umx+C3DWgAwmc9C4hMC6KikU/KyLwGo73my3Ha4Hd34NVzkHf
kubhCCUfcnSTTjXhJ2UBBAp61/c2QyS2rGCkIgVKQdXSAvI9WDdRLUlvSbRh
HbDjmxenXz45+gwsR9JhBgfNgnNto2H5eFebTXBP7NzdKRkbMt3fg788BtML
sqwlrJ/mEnovT9WcFyZMff3Aiki+TxWdR2D3wAy4ug8choIWhURu81RGWuzF
SVVF8YxpdVWkLBGjkyvV7xmSfHW0/+X9/a4D1wFjdVTHMOMkCMA3RNOvjo4I
AGH8IJAn6yY/OfqcGWSUztMsYv5wiqAj3ZquH61Ydjdof0tV+F44nbyocPDv
JNBfkp6r5ws+lQjmu6JZRXYDF6CtE8ivgP7IPb4ciBPFR6OXNbwUaJzjiMyA
wLMsBbAU2noBrqUzMQrcsS78OcgCcCBhzwr9b7EgdRzHUMJ25C7xkGx+ySoe
9BlFXkXrNND10SNxxv5PCkiXBfTmznXBGkfOC9rZeClwDmZQPwi+1qPMOTSv
hprDwfZMH3ytWnAWMAp8fIt67K3fttnkScDaKNJEsZwVGamEmyirWf9HFfYj
EweYByVaQGAjoiz9gJ9mOAaz9U7nkojor6oxzWkbOM85zNUHmpBlltrwnyFt
Va19YF44YmLKBI5bEFxlrKOIkkueMCmyrLglfWmwYttCHrD4RPwWHxGGX/NI
sFA6zYEmUU675EbqgRL4lmec4LN1xsfyOdne04IfOpf+OdnUlH/TEYAfZURG
XzkKLOfjItM8jJ8stFUp4dek0bSM5ooJok0zMWwjrvssru1jrRWdnywxrTXl
4zZAXCpGbM/E9yD7aaSkQ9TTJHePFA+6Z65+LmlBrCVObuBdRmPMfiNVUZex
nr1NAWrCrOoFX9kYwcX+ElK57BFi43Q8ToVDymEWnQfm+W2Nrm6Z77a/cHeX
36ZNdFcrxGIwUfK9xF7hnbBkYE1+AVKJ53VJjGjcuo5PB9FBXBDDfjiitNYm
VEtLJa2qiBg+1mbT7HQqVcQpnK2kcZe9jVrK+ZOJ+8idLOEVM4zWyzXwVg8A
yoz8Y5rcW4AN8yrUR81AwgUdYo9P+OTKsIZVsKvwNRTsPHRUD0s56Vn+evD8
GYfbWYpD9DnBEZnFVxOaIgDts8TRAgEBfpBWMrRn5xtIkNf8F3xEFKkb5pu1
n0/D7ufTjWP/zP+e1gpxODQHPdkO99NVuA6ClRumrOqAM6HLqyejC/x7OLro
/+Mrrt2JXV08DBdjX5c4BIoOmbW24/Bpg8VmHDxUOgCJ2awTpJmOB63NCNHr
fwo6+nDtsmIVq87YU4rUYat+CSNs/LTArbJoC9xm5v3zKmB/fz93xfWfT1nK
gruheLSqXQWn+p72TnIbRsHs0HMvfFw91R4sorZf8EOm+dMeAmGopZ62Rr0f
4ESEKfTKyAbIHAPrIKmkcGJeTp0JTHR+LKzgU4QRGNmLg7s5tGuMQRT7/Lqv
VTKs0A0g1ngFZwTKHHj4EWyj8F3CQoxgh3RGrD0DdoU8g8q4XFa7RfC1lh84
5GWHIC8UYl45r2HvTPCLhXJ4uTnTc82i7MEnQicvSKPuugCmZSLUwDgoLgkJ
34RDUtK4NYXjz68ZvTrVcSywqNJQZ1Kczoa/rfywTrtB8LEX2uSTOdC2T0dd
apYu2NnWA60/HlOEqRHUyYEl1HZF37CzdA7FXunAPidXdpJOa6N+PPR9g8eh
bQqwBA2QYaxhkud6DU4UzSg1CD/ggrz5qcwRl2fZcne7ber6JrCULpqwSvQ/
wMeTMoKSrOOqxgIXRKad0fnFyVW/FcLn82IRqhRkhJ3MY7mojJv3EVjsMuGl
FqVdn48Mx9BGlbyhrYnerRUUl0lyXhLvmYlMGzmj9NNEvEoniFnOXr/qUxoC
B5VJy+ycrVtNq4idGKerZNWnc/KjK7A+7LSkRBcncJrMmG/F2R+94NBeXJNP
PLL0g0hDaSDcwTx563xpR17zYHv+QCcOSPzUrLjNtbdM/jdT/S/uEwR65FBs
AYk9RPWU+W8vvx1aKfC+81cc2TAwyrQsmqMNTbwaRpXO9Or8lfvcOQ1aFd7q
Jokj778JGiUNuLkkH+sb/Ib2HepfH4NhNczS/N2/AsOYXOOQUtiEJU7QuPHN
CMIkJA1BA5oRH0ll2suK0/qvJb35tE7AG8g+sT8UMe9k/ahxKaN3RV39ykNM
v7ZvQtJjucw+Eb8338I0+bHtUhjCu9f0rAZVDj5vkzUdrrB566k0md0W9HUj
fHLTmXi7NXsVd74kNW5Ch7iWshq6gYLovc0DlgEs8kn7GLeu5Is9OS4cjhtX
hfTwqKtmVn0VU2X0guYHvBa2uloPuRT8bSEmMqJFFLTYgxj3dMLvYe7sBRQr
aadUa+Im7Zukpckl7bCZdNalKjpZYLZlULoq6g9aeBuuUWu07oqujZTJ4lDa
5hOPaEb+RCN/2pEA+WCnSQ0Yl8CTZ3e02r0YckmIMwIKNighcCbVBazbaDYu
C+PlILmAGPwlS7JRqpUMXa2K6JLYOgPNbhKbZxcRq7X1LzJlFMv7eUxxXnkp
AOteMIVVvSCFQNrK8r0NxHdtpnjXK2fpapoDHQQnmSp2f56NfOCM3aweO61J
EpTyTzXYKukQ0bKj9se6rpWHoth5bDXFYz7zx57UP+7rfOop245XcGgyBBDw
Din7Ah5obApPdQZEs2wiE8pPUqaUMn43Mlw5UT95pvsBltMxp846U0IPfaoc
aSdW+6CKHaFMvrfr4L/VDOf6wtQe4OUtKECMiavIizKSqHmZ5Ji/6O3QYU5S
qPmmjAkdkUgSSc4f+WlAnIDCtqczjKR/Sc3eNGzsOF8b+SD0KfbTX/9XFJx6
j5hrZeXqcyYfGgHzfOontDSGJiXROz15Fh7uH34W7h8d9nBUYXMCDH0CmqS0
XiXfV2JGW3SllLhYLKAVAUWvQZUdGfLG6aEOOdrP4iJ63wND/DCztV2sJnRy
cK7z6lswhrNKtWPN9ka3MHtUlG8qyqRPRUBIqSHjHIJKRbxiwV51MgjOJ62V
2QPmqGvi/G3LBNZq/vTXv9td/7GeY9Ok3JJoUfE3vfYiyjlQA9EV1RKkUXOY
y8Wr5tTIjtpApJinFbBy4aHV+5rXwNGyJEQ4nV5nGbMlUQkcTLqddCa9u74S
P/3tf5x74ksyAa7dQCsTXgGPNYYW0iua/8y4JxDZhXHug+A7sGaYkNRWS3FG
9W1Ilc7O2ZM52t8XL8d7Sjx/c9S3+yNSUHRXFQHzA+UN/EoOTIssQ7WgCobx
cpTuFbBeknscuDDcKCPyLsEhnDs0qUQbzFPCWEfnFOFxTh9EDqgIXiYZVYQw
8nYmuVDvZhA31CXlTrOlC1VtEhuOBBiGREoFUYMdl5aho817C6ebVEWgFxNU
Yl/H2C6eH2B+CyKDMNugQgspDOk4lcjJKgXYzCkEdhnTJkNwjIkFlwPtExYF
IGmLQIp4kaLDdMLMAsmmY8DuWC0yBRR0VGtw5A03ZRdQcuWsjMfhzLnn8zJZ
eX8JtLvOjGtN1/X8A2PFTH2KTGyWKmPUyPSwcjAraqLotLNW2KREgk4NQTNl
klKROQHI1znVqroLK8Ah2uk8emAPpNkDMVwmXd0NbFhFlO4wDRZu28e6FeQ2
VTJovSBwTvTfSbmw8uk7OrCUwCudR5ktgQdggTl8vxyYNjSHSQK9n3XOgElM
h411Yle+sCpNFGPGhFWukxH26Lq8/Xoty1rF2mV0YnDLlhZQYA8JqhlgaUiX
Y8TF96Nrcfn6eh1MAgb6YTcbxEecLEihpO/Fs6aFwORW2jkn4sxzK6E1mRxd
yNT8odnHOGzKQ1LzTaMSApmaHh+nGRhAYR61SUhdPoZqZrup0u68UZ3/9erk
kuqrYSOtfWaRulLYi2ZomFsTxbTcB0q7sTDhiJU+TxpuWxBW2jtsZ0fThcCp
m805XF3nNKmdu0deC4epaK7zObstia1WkkF7IlwrJvdmr/3nVEW5UkS/Agv+
YZ9Z3MHhpvEhG1QcysHg4BjPyFarhSnIiV5d5kMCNYS0RHM1fD/PhnBgaeZw
m1tO4GC7JmBQhNzVMUUhetct7BgVb+SxyT4bW26inh6VvImQQ7G+cWS162R3
tU4xMmHk0eCA0btfj1KbTA1u1b8Gt8MHcfP4o0249AHsqI1gG3ZOCMzyQbtL
UzME9Q+vERuGuwMm7Ysf8IZU6kvqDWZQbADiSgP44aX4QY6H+PrrWVUt1HBv
j4JMDk5kycw+wLJ7t9M9gPtabwKTXsEIYtavqT+0KoZtGfjWTvs60BNsI0rT
+es+v17X0vt1e9r6dt4GxEONuwbUiW5G7jbtNjAeasztwPCacpv5q+23XzO1
YQXiMl00R8Zahw+ok8OJWk/9TjdewQmBrsJ0kiADQ+nTYrEsOYTbifuCoiru
MRfXZa0q5+BT9EAdJy5QMykvshu8SdfFEYMvYdrg9TNURUZcljfcbMNT3iA6
Vjr/YrsIanb5hDH29GQMcgJXCrBgf21Jh/sj6QcZKWzbdXTukjVZkEdUcVxV
l6rWtS5XfhFkqv5Iwa+JUSnayZU0zSzWySFK6bTFG0S+yu7z2eg5OFhPoIAV
iMHEA+dG6mNLgYZ8j03m8hU8+Exc2fYNBdi6nYRw4eHPjWU0E3asaFUERspG
rAzWIZWe+pakTG1pgQMNhkl0PD+5PNENU2qGvZlmT+saTIraEse418xQV2Qr
qOeGDm9Kh7UUfFOgg9zt7e0gJWEkxHRvE+9hjw3TwkFxeDInW4NlnQKfh9Om
uEVaj9qtjkFvowptl1paKZlNmOE5vMyYvHlRUaZi0GNDZcnBHB0e7IeH+0bf
duWLlCI1UEUNDQe9B1QxIUWq+KOvjayaCntFxOnpvU+aZOwne/TE/BQPZ2Yf
2pLOQSnrGGr9YHKy4DxTr1zNjS0HDV4Wi4dTv78Ui7Xp4EGLOmyMuKsN5OEn
l3QXwT4WLwyi7HkfDA9cqhcgL880Sad2MOf9mm2YTXpVmc0bWrWcdiECatzd
BpDhIy+CeqAWZFaF1zCxOG1Nuh+bKSZAnUSZkvbZKvpsTPyAjpH2MFjXFtGw
r7UcblXOCemKk0Ne6MbWphZ17F6sQ3I9mkC0c4i+e24a/qnfv685yEbQaatU
xLujMMPcLIENcqjfB/bf+xZvVIt/OmdcN5G6bksUO9dXfc0rFt1mhcG/H8+M
FjK27YmctdvCMauMAnntnOeGNkkt3vThRlPiIpsedLD2VjM3YsfLRe+SJ9Be
oN9s2RC1Ve30mFcn6+CF9Djba3J38C8oH2iVGUffjLiD0OY88zFKz+e7jfze
ZEJWE4MtWrmEIofN/qpsTq+vBv4zyoPgxJ62kxAE6LihHvVUUJIKEGcweD62
9Hil9uvRS4h3cil6Ta3Xm7tpr4IuD5h8OZx5Tr1QHqHJHK7uuilTNR8vS8qJ
tEFrbZ2wbmrQd63JrKR0Tfq49WITykD6+zz9U60zwe/t2aykhMgCmVZrTqO0
cLp33+99PrZ0Dbx3bQZ1nw1qi+sf/2zFxcWGrkn7t9ZPTY2kraLW3TMzn/VG
zSt8dAybbg/5B43aG9kkjZxz6SInTs82Lllj2VaE3JaBNls2s4+mLvb/tQ2G
VjTVqY0mFjbgAgwjxllBZUztk9lmkN6WJpveZv5lH5DjBhu0kI/ptRVodcLO
QEaVXIuhtjDbfEHnhW5HVfc0PYDqiU02rmm000faNBS2sNwq3j8Dywe6ln4m
6p5fo+vIm9Df4lT5jr5Zx+/lC1tRSpR4t+VcBLLKTR/bW9RzjP1pZ54ZYYni
a7At/TLHW6notyra4sZK7OL6RFppHa3k7KQmYm6ztT5l6zfdB/eB65PWaRbK
00Bhl+8gMU979IcDev4bUn1Pt3VufNsE1wOK+blDmlIidUnuy2mRUyHA1DBM
+ty7VcZJfapUTipXTZvTxVVpaDe2t4tsluXJ4AvSNV4zq6wAJSwn8ZdH+1+M
U+V6Wbd3naxPqfmXy3URMwAy+tqWLs7q23l0PS3VGbhQN0B7jcGLsqiKuPDu
cAaXZ9enry9fmBrG54dHB/f3nKJ5czby33y5z/euqJqs5AbwOwd9MYuowl4E
lDuLiKocp5dRrthfal0/H42+M9CPDj87pPuS169Gdr0jupap02S/+f781Dz+
an9//0d9y3Dn0K3Gmbp5zR3plPejZKB3/68J0U5bLdMn+j6jubJgkiU7lyen
F/2mxAJ6BK4MVpmLbNxRUtLdjzSu7L1I0u/s+8U13SO1lC3KwNESeJY8NyIX
3quK031AyQkmuiTYXJ1aB8SeondVXl/7KegSPRXQLwtxC1ZnCMw43ErWvVBX
NWWjY162GQX/LgkLqufu9HwTTF0twaiYO9NKA7vLWNA+I5sCZ2xETyaB4v4H
6scA2W7qjPrOtaMBeZ97aii/SctCZ/B03Zoufs5qFegqhrk7YFv8CCF7IIbN
SB6mEsES/jElc+osCSgzZzO1fRPMK38nA2FcuLjpiHf3MOlPoFCDpGnfb7bP
POnxgd0o/i/VXmC3SqEUHvANTmry4v4ubhgd6qa6xhEzxLM97VzT0GVMzTId
ja24Bskp1q6qA3R+nlIKFUEDx1bMypRPNdquuWr6/Ztzez+zl6secanLvOqA
IjB6XxdwfnvxSrwxA+zt7ieff/nl/f3Q6HkMB1Ds8BdUAAmIWYUO/1SXgQzV
zs9GLznSBC54dLl3cmwY1W6XN8XlfELXFSYHGsGfS6JWmtiQyqvxErhLWqLX
5Kw1XT7fP4RC9eOyXifL3eukuT0aXvJfPvmIlny9OO3vl9P8iiuCQ27o5qob
+c1N4wNR7RssqI/H8C5G2+S0oW8YhmIMBuZLwxzOEIpiT7wiZ/Ka3HZ9F8r9
GQu2z5FtSkizrOY7d5I6S6jzrXANac7bD9mjFm+beOkti+lbF3i8tT1tViHS
awuvlNxdZI66rGZxMafDfstUWmn7euvXunSnnpLa5Wt3QFLb73Pd6nhlWx11
6o0pAVtlyD0Mfn99FZ78KH7669/1/8QTMRdJzW2Vuh2yeUVjn/2oLZ0NwaAH
s9S0MPj9UjqaUzAg70LbK1PnKaxGi1jURQhK+9dktbUpysfKdEdW0fS4RVF2
o1gb94CiLHu84esZtGQ4MgS5MgS5ot476K4XNBBE8UpvJjEJU/yCrpxtIorA
2/DA/rAE994dik30gUDkutcc47QC92hjIO3kMNMxWyh30v1VMpnOo+Nuw6Fu
NlTmMXFyJVvsgJMZBgcDtljMXDaj+JboQjtlxAj34+BwIG6j7N3mzkP/Wpli
yhFt/vZ3syn6xjThDmLxn6PXl+7qITkdubi4ei1ssi88NVkj6mHsyF/zV0Vy
1xXEPbx+y2K7286mzMCC3Pk711lC7oevy1YL44EFQgk47MMgZhNOfd3OqF+S
oyLf6y6+SK1mAyU1NVKNp/CydzZpR+qibPchERDbimTzgNjUy6ZbkdE9oEdN
grW5Rmha4al9LTZuxFjCTPANK+M7mhY0pj/0Y8Enr13bL776jHxvr+vSa0tz
WS33lxxMr+TT9oe6vs6G4vEfHhOnS7iBJmij3DP3k3zx1aHoTHoaBBRLrr++
4KL13tBEnD3zBA9+b2K/JovTczYkwfue4ZChvbPfRKWg7LS3682jdEoDsQ3V
jeiAzQ967ZaX3mryoA1zFa6etuhAJvTCg739ve4KPHyLtRyu5h7/sCYP/1Ef
r2o3XIM5U5z/noCH/OVZuA5t+3cIOqP52UPjLRtuQADDurK3huj2c9fKyg/F
gbhft/K6oYcfP/TJxw898tLf/ufHNU9XR3aftH/7MJo39ql+8qNNhDxCQPou
L25hdXU6Jrgb6rZgmTzt6fjL3JqyzS23qZrpyCWChjqvoqwQz2qV7orX2TQS
38HDyXbFSTqrI/GyLvBYxRF3Hb0s8g9RJj/ATsH6FuaC0Zz+BhG32SrbJkt/
gExmi0mdkRnTaSLTu6Lq6RT+se4E/T/yfoMswlIAAA==

-->

</rfc>
