<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nmop-digital-map-concept-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Digital Map Concept &amp; Needs">Digital Map: Concept, Requirements, and Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-digital-map-concept-00"/>
    <author fullname="Olga Havel">
      <organization>Huawei</organization>
      <address>
        <email>olga.havel@huawei.com</email>
      </address>
    </author>
    <author fullname="Benoit Claise">
      <organization>Huawei</organization>
      <address>
        <email>benoit.claise@huawei.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="24"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>Service emulation</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>service flexibility</keyword>
    <keyword>service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>Digital Map</keyword>
    <keyword>Digital Twin</keyword>
    <keyword>Emulation</keyword>
    <keyword>Simulation</keyword>
    <keyword>Topology</keyword>
    <keyword>Multi-layer</keyword>
    <abstract>
      <?line 63?>

<t>This document defines the concept of Digital Map, explains its connection to the Digital Twin, and identifies a set of Digital Map requirements and use cases.</t>
      <t>The document intends to be used as a reference for the assessment effort of the various topology modules to meet Digital Map requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Management Operations Working Group mailing list (nmop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-wg-nmop/draft-ietf-nmop-digital-map-concept"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="digital-twin-overview">
        <name>Digital Twin Overview</name>
        <t>The network digital twin (referred to simply as Digital Twin) concepts and a reference architecture are discussed in
the "Digital Twin Network: Concepts and Reference Architecture" <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>.
That reference document defines the core elements of Digital Twin: Data, Models, Interfaces, and Mapping.</t>
        <t>The Digital Twin, constructed based on the four core technology elements, is intended to analyze, diagnose, emulate,
and control the physical network in its whole lifecycle with the help of optimization algorithms, management methods,
and expert knowledge.</t>
        <t>Also, that document <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> states that a Digital Twin can be seen as an indispensable part of the overall network system
and provides a general architecture involving the whole lifecycle of physical networks in the future, serving the
application of innovative network technologies (e.g., network planning, construction, maintenance and optimization,
improving the automation and intelligence level of the network).</t>
      </section>
      <section anchor="digital-map">
        <name>Digital Map</name>
        <t>Digital Map provides the core multi-layer topology model and data for the Digital Twin and connects them to the
other Digital Twin models and data. This includes layers from physical topology to service topology.</t>
        <t>The Digital Map modelling defines the core topological entities (network, node, link, and interface) at each layer, their role in
the network, core properties, and relationships both inside each layer and between the layers.</t>
        <t>The Digital Map model can be approached as a topological model that is linked to other functional parts of the Digital Twin and
connects them all: configuration, maintenance, assurance (KPIs, status, health, and symptoms), Traffic-Engineering (TE),
different behaviors and actions, simulation, emulation, mathematical abstractions, AI algorithms, etc.</t>
        <t>The Digital Map data consists of virtual instances of network and service topologies at different layers.
The Digital Map provides the access to this data via standard APIs for both read and write operations
(write operations for offline simulations), with query capabilities and links to other YANG modules
(e.g., Service Assurance for Intent-based Networking (SAIN) <xref target="RFC9417"/>, Service Attachement Points (SAPs) <xref target="RFC9408"/>,
Inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>, and non-YANG models.</t>
      </section>
      <section anchor="digital-map-as-a-prerequisite-for-digital-twin">
        <name>Digital Map as a Prerequisite for Digital Twin</name>
        <t>One of the important requirements for Digital Twin is to ease correlating all models and
data to topological entities at different layers in the layered twin network.  The Digital Map aims at providing a
virtual instance of the topological information of the network, based on this Digital Map Model.
<strong>Building a Digital Map is prerequisite towards the Digital Twin.</strong></t>
        <t>The Digital Map model/data provide this missing correlation between the topology models/data and all other
models/data: KPIs, alarms, incidents, inventory (with UUIDs), configuration, traffic engineering, planning,
simulation ("what-if"), emulations, actions, and behaviors.</t>
        <t>Some of these models/data provide a device view, some provide a network or subnetwork view, while others focus
more on the customer service perspective.  All these views are needed for both inner and outer closed-loops.</t>
        <t>It is debatable what is part of the Digital Map itself versus what are pointers from the Digital Map to some
other sources of information.  As an example, a Digital Map should not specifically include all information
about the device inventory (product name, vendor, product series, embedded software, and
hardware/software versions, as specified in a Network Inventory. A pointer to another inventory system
might be sufficient or support of means that ease the mapping between inventory and topology.</t>
        <t>Similarly, Digital Map should not specifically contain incidents, configuration,
data plane monitoring, or even assurance information, simply to name a few, but should provide pointers to the different data sources.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>This document defines the concept of Digital Map, explains its connection to the Digital Twin, and identifies a set of Digital Map requirements and use cases.</t>
        <t>The document intends to be used as a reference for the assessment effort of the various topology modules to meet Digital Map requirements.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The document defines the following terms:</t>
      <dl>
        <dt>Digital Twin:</dt>
        <dd>
          <t>Virtual instance of a physical system (twin) that is continually
updated with the latter's performance, maintenance and health
 status data throughout the physical system's life cycle (as
 defined in  <xref section="2.2" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/></t>
        </dd>
        <dt>Topology:</dt>
        <dd>
          <t>Network topology defines how physical or logical nodes, links and
interfaces are related and arranges.  Service topology defines how
service components (e.g., VPN instances, customer interfaces, and
customer links) between customer sites are interrelated and
arranged.  There are at least 8 types of topologies: point to
point, bus, ring, star, tree, mesh, hybrid and daisy chain.
Topologies may be unidirectional or bidirectional (bus, some
rings).</t>
        </dd>
        <dt>Topology layer:</dt>
        <dd>
          <t>Defines a layer in the multilayer topology.  A multilayer topology
models relationships between different layers of connectivity,
where each layer represents a connectivity aspect of the network
and service that needs to be configured, controlled and monitored.</t>
        </dd>
        <dt/>
        <dd>
          <t>The topology layer can also represent what needs to be managed by a
specific user, for example IGP layer can be of interest to the operator
troubleshooting or optimizating the routing, while the optical layer may be
of interest to the user managing the optical network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers may relate closely to OSI layers, like L1 topology
for physical topology, Layer 2 for link topology and Layer 3 for IPv4 and
IPv6 topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers represent the control
 aspects of Layer 3, like OSPF, IS-IS, or BGP.</t>
        </dd>
        <dt/>
        <dd>
          <t>The service layer represents
the service view of the connectivity, that can differ for
different types of services and for different providers/solutions.</t>
        </dd>
        <dt/>
        <dd>
          <t>The top layer represents the application/flow view of connectivity.</t>
        </dd>
        <dt>Digital Map:</dt>
        <dd>
          <t>Basis for the Digital Twin that provides a virtual instance of the
  topological information of the network.  It provides the core
  multi-layer topology model and data for the Digital Twin and
  connects them to the other Digital Twin models and data.</t>
        </dd>
        <dt>Digital Map modelling:</dt>
        <dd>
          <t>The set of principles, guidelines, and conventions to model the
    Digital Map using the IETF <xref target="RFC8345"/> approach.  They cover the
    network types (layers and sublayers), entity types, entity roles
    (network, node, termination point or link), entity properties and
    relationship types between entities.</t>
        </dd>
        <dt>Digital Map model:</dt>
        <dd>
          <t>Defines the core topological entities, their role in the network,
core properties and relationships both inside each layer and
between the layers.</t>
        </dd>
        <dt/>
        <dd>
          <t>It is the basic topological model that is
linked to other functional parts of the Digital Twin and connects
them all: configuration, maintenance, assurance (KPIs, status,
health, symptoms, etc.), traffic engineering, different behaviors,
simulation, emulation, mathematical abstractions, AI algorithms,
etc.</t>
        </dd>
        <dt>Digital Map data:</dt>
        <dd>
          <t>Consists of instances of network and service topologies at
 different layers.  This includes instances of networks, nodes,
 links and termination points, topological relationships between
 nodes, links and termination points inside a network,
 relationships between instances belonging to different networks,
 links to functional data for the instances, including
 configuration, health, symptoms.
 :The data can be historical, real-time, or future data for 'what-if' scenarios.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sample-digital-map-use-cases">
      <name>Sample Digital Map Use Cases</name>
      <t>The following are sample Digital Twin use cases that require Digital Map:</t>
      <ul spacing="normal">
        <li>
          <t>Generic inventory queries</t>
        </li>
        <li>
          <t>Service placement feasibility checks</t>
        </li>
        <li>
          <t>Service-&gt; subservice -&gt; resource</t>
        </li>
        <li>
          <t>Resource -&gt; subservice -&gt; service</t>
        </li>
        <li>
          <t>Intent/service assurance</t>
        </li>
        <li>
          <t>Service E2E and per-link KPIs on the Digital Map (delay, jitter, and loss)</t>
        </li>
        <li>
          <t>Capacity planning</t>
        </li>
        <li>
          <t>Network design</t>
        </li>
        <li>
          <t>Simulation</t>
        </li>
        <li>
          <t>Closed loop</t>
        </li>
      </ul>
      <t>Overall, the Digital Map is needed to break down data islands and have a Digital Twin for emulation and closed loop,
which is a catalyst for autonomous networking.</t>
    </section>
    <section anchor="digital-map-requirements">
      <name>Digital Map Requirements</name>
      <section anchor="core-requirements">
        <name>Core Requirements</name>
        <t>The following are the core requirements for the Digital Map (note that some of them are supported by default by <xref target="RFC8345"/>):</t>
        <dl>
          <dt>REQ-BASIC-MODEL-SUPPORT:</dt>
          <dd>
            <t>Basic model with network, node, link, and interface entity types. This means that users of the Digital Map model must be able to understand topology model at any layer via these core concepts only, without having to go to the details of the specific augmentations to understand the topology.</t>
          </dd>
          <dt>REQ-LAYERED-MODEL:</dt>
          <dd>
            <t>Layered Digital Map, from physical network (ideally optical, layer 2, layer 3) up to  service and intent views.</t>
          </dd>
          <dt>REQ-PROG-OPEN-MODEL:</dt>
          <dd>
            <t>Open and programmable Digital Map.</t>
          </dd>
          <dt/>
          <dd>
            <t>This includes "read" operations to retrieve the view of the network, typically as application-facing interface of Software Defined Networking (SDN) controllers or orchestrators.</t>
          </dd>
          <dt/>
          <dd>
            <t>It also includes "write" operations, not for the ability to directly change the Digital Map data (e.g., changing the network or service parameters),
but for offline simulations, also known as what-if scenarios.</t>
          </dd>
          <dt/>
          <dd>
            <t>Running a "what-if" analysis requires the ability to take
snapshots and to switch easily between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>Note that there is a need to distinguish between a change on the Digital Map
for future simulation and a change that reflects the current reality of the network.</t>
          </dd>
          <dt>REQ-STD-API-BASED:</dt>
          <dd>
            <t>Standard based Digital Map Models and APIs, for multi-vendor support.</t>
          </dd>
          <dt/>
          <dd>
            <t>Digital Map must provide the standard YANG APIs
that provide for read/write and queries.  These APIs must also provide the capability to retrieve the links to external data/models.</t>
          </dd>
          <dt>REQ-COMMON-APP:</dt>
          <dd>
            <t>Digital Map models and APIs must be common over different network domains (campus, core, data center, etc.). This means that clients of the Digital Map API must be able to understand the topology model of layers of any domain without having to understand the details of any technologies and domains.</t>
          </dd>
          <dt>REQ-SEMANTIC:</dt>
          <dd>
            <t>Digital Map must provide semantics for layered network topologies and for linking external models/data.</t>
          </dd>
          <dt>REQ-LAYER-NAVIGATE:</dt>
          <dd>
            <t>Digital Map must provide intra-layer and inter-layer relationships.</t>
          </dd>
          <dt>REQ-EXTENSIBLE:</dt>
          <dd>
            <t>Digital Map must be extensible with metadata.</t>
          </dd>
          <dt>REQ-PLUGG:</dt>
          <dd>
            <t>Digital Map must be pluggable. That is,
</t>
            <ul spacing="normal">
              <li>
                <t>Must connect to other YANG modules for inventory, configuration, assurance, etc.</t>
              </li>
              <li>
                <t>Given that no all involved components can be available using YANG, there is a need to connect Digital Map YANG model with other modelling mechanisms.</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-GRAPH-TRAVERSAL:</dt>
          <dd>
            <t>Digital Map must be optimized for graph traversal for paths. This means that only providing link nodes and
source and sink relationships to termination-points may not be sufficient, we may need to have the direct
relationship between the termination points or nodes.</t>
          </dd>
        </dl>
      </section>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The following are design requirements for modelling the Digital Map:</t>
        <dl>
          <dt>REQ-TOPO-ONLY:</dt>
          <dd>
            <t>Digital Map should contain only topological information.</t>
          </dd>
          <dt/>
          <dd>
            <t>Digital Map is not required to contain all data required for
all the management and use cases. However, it should be designed to support adequate pointers to other functional Digital
Twin data and models to ease navigating in the overall system. For example:</t>
          </dd>
        </dl>
        <ul spacing="normal">
          <li>
            <t>ACLs and Route Policies are not required to be supported in the Digital Map, they would be linked to Digital Map</t>
          </li>
          <li>
            <t>Dynamic paths may either be outside of the Digital Map or part of traffic engineering data/models</t>
          </li>
        </ul>
        <dl>
          <dt>REQ-PROPERTIES:</dt>
          <dd>
            <t>Digital Map entities should mainly contain properties used to identify topological entities at different layers,
identify their roles, and topological relationships between them.</t>
          </dd>
          <dt>REQ-RELATIONSHIPS:</dt>
          <dd>
            <t>Digital Map should contain only topological relationships inside each layer or between the layers (underlay/overlay).</t>
          </dd>
          <dt>REQ-CONDITIONAL:</dt>
          <dd>
            <t>Provide capability for conditional retrieval of parts of Digital Map.</t>
          </dd>
          <dt>REQ-TEMPO-HISTO:</dt>
          <dd>
            <t>Must support geo-spatial, temporal, and historical data.  The temporal and historical can be supported external
to the Digital Map.</t>
          </dd>
        </dl>
      </section>
      <section anchor="architectural-requirements">
        <name>Architectural Requirements</name>
        <t>The following are the architectural requirements for the Digital Map:</t>
        <dl>
          <dt>REQ-DM-SCALES:</dt>
          <dd>
            <t>Scale, performance, ease of integration.</t>
          </dd>
          <dt>REQ-DM-DISCOVERY:</dt>
          <dd>
            <t>Initial discovery and dynamic (change only) synch with the physical network.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the Digital Map concepts, requirements, and use cases, there is no specific security considerations.
However, the RFC 8345 Security Considerations aspects will be useful when designing the solution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications, realize efficient and cost-effective data-driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Digital Twin
   Network, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-06"/>
        </reference>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-03"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC9179">
          <front>
            <title>A YANG Grouping for Geographic Locations</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a generic geographical location YANG grouping. The geographical location grouping is intended to be used in YANG data models for specifying a location on or in reference to Earth or any other astronomical object.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9179"/>
          <seriesInfo name="DOI" value="10.17487/RFC9179"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="I-D.ogondio-opsawg-ospf-topology">
          <front>
            <title>A YANG Data Model for Open Shortest Path First (OSPF) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Open Shortest
   Path First (OSPF) information.  This document augments the 'ietf-
   network' data model by adding OSPF concepts and explains how the data
   model can be used to represent the OSPF topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-opsawg-ospf-topology-01"/>
        </reference>
        <reference anchor="I-D.ogondio-nmop-isis-topology">
          <front>
            <title>A YANG Data Model for Intermediate System to intermediate System (IS-IS) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Intermediate
   System to Intermediate System (IS-IS).  This document augments the
   'ietf-network' data model by adding IS-IS concepts and explains how
   the data model can be used to represent the IS-IS topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-nmop-isis-topology-00"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Hardware Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="9" month="July" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for network hardware
   inventory data information.

   The YANG data model presented in this document is intended to be used
   as the basis toward a generic YANG data model for network hardware
   inventory data information which can be augmented, when required,
   with technology-specific (e.g., optical) inventory data, to be
   defined either in a future version of this document or in another
   document.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-network-inventory-yang-02"/>
        </reference>
        <reference anchor="I-D.wzwb-opsawg-network-inventory-management">
          <front>
            <title>A YANG Network Data Model of Network Inventory</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="19" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

   This document is meant to help IVY base Network Inventory model
   discussion and ease agreement on a base model that would be flexible
   enough to be augmented with components that are covered by the IVY
   Charter.

   The hardware components definition are adapted from draft-ietf-ccamp-
   network-inventory-yang-02.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wzwb-opsawg-network-inventory-management-04"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-topology">
          <front>
            <title>A Network Inventory Topology Model</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="7" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG model for network inventory topology to
   correlate the network inventory data with the general topology model
   to form a base underlay network, which can facilitate the mapping and
   correlation of the layer (e.g.  Layer 2, Layer3) topology information
   above to the inventory data of the underlay network for agile service
   provisioning and network maintenance analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-00"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-13"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-16"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.draft-ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="28" month="June" year="2024"/>
            <abstract>
              <t>   A network incident refers to an unexpected interruption of a network
   service, degradation of a network service quality, or sub-health of a
   network service.  Different data sources including alarms, metrics,
   and other anomaly information can be aggregated into a few amount of
   network incidents by data correlation analysis and the service impact
   analysis.

   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help resolve network incidents
   for the sake of network service health and root cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-01"/>
        </reference>
      </references>
    </references>
    <?line 323?>

<section anchor="related-ietf-activities">
      <name>Related IETF Activities</name>
      <section anchor="sec-ntw-topo">
        <name>Network Topology</name>
        <t>Interestingly, we could not find any network topology definition in
   IETF RFCs (not even in <xref target="RFC8345"/>) or Internet-Drafts.  However, it is mentioned
   in multiple documents.  As an example, in Overview and Principles of
   Internet Traffic Engineering <xref target="RFC9522"/>, which
   mentions:</t>
        <blockquote>
          <t>To conduct performance studies and to support planning of existing
   and future networks, a routing analysis may be performed to determine
   the paths the routing protocols will choose for various traffic
   demands, and to ascertain the utilization of network resources as
   traffic is routed through the network.  Routing analysis captures the
   selection of paths through the network, the assignment of traffic
   across multiple feasible routes, and the multiplexing of IP traffic
   over traffic trunks (if such constructs exist) and over the
   underlying network infrastructure.  A model of network topology is
   necessary to perform routing analysis.  A network topology model may
   be extracted from:</t>
          <ul spacing="normal">
            <li>
              <t>Network architecture documents</t>
            </li>
            <li>
              <t>Network designs</t>
            </li>
            <li>
              <t>Information contained in router configuration files</t>
            </li>
            <li>
              <t>Routing databases such as the link state database of an interior gateway protocol (IGP)</t>
            </li>
            <li>
              <t>Routing tables</t>
            </li>
            <li>
              <t>Automated tools that discover and collate network topology information.</t>
            </li>
          </ul>
          <t>Topology information may also be derived from servers that monitor
   network state, and from servers that perform provisioning functions.</t>
        </blockquote>
      </section>
      <section anchor="sec-core">
        <name>Core Digital Map Components</name>
        <t>The following specifications are core for the Digital Map:</t>
        <ul spacing="normal">
          <li>
            <t>IETF network model and network topology model <xref target="RFC8345"/></t>
          </li>
          <li>
            <t>A YANG grouping for geographic location <xref target="RFC9179"/></t>
          </li>
          <li>
            <t>IETF modules that augment <xref target="RFC8345"/> for different technologies:  </t>
            <ul spacing="normal">
              <li>
                <t>A YANG data model for Traffic Engineering (TE) Topologies <xref target="RFC8795"/></t>
              </li>
              <li>
                <t>A YANG data model for Layer 2 network topologies <xref target="RFC8944"/></t>
              </li>
              <li>
                <t>A YANG data model for OSFP topology  <xref target="I-D.ogondio-opsawg-ospf-topology"/></t>
              </li>
              <li>
                <t>A YANG data model for IS-IS topology <xref target="I-D.ogondio-nmop-isis-topology"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-add">
        <name>Additional Digital Map Components</name>
        <t>The Digital Map may need to link to the following models, some are already augmenting <xref target="RFC8345"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Service Attachment Point (SAP) <xref target="RFC9408"/>, augments 'ietf-network' data model <xref target="RFC8345"/> by adding the SAP.</t>
          </li>
          <li>
            <t>SAIN <xref target="RFC9417"/> <xref target="RFC9418"/></t>
          </li>
          <li>
            <t>Network Inventory Model <xref target="I-D.ietf-ivy-network-inventory-yang"/> focuses on physical and virtual inventory. Logical inventory is currently outside of the scope.
It does not augment RFC8345 like the two Internet-Drafts that it evolved from <xref target="I-D.ietf-ccamp-network-inventory-yang"/>
and <xref target="I-D.wzwb-opsawg-network-inventory-management"/>. <xref target="I-D.ietf-ivy-network-inventory-topology"/>
correlates the network inventory with the general topology via RFC8345 augmentations that reference inventory.</t>
          </li>
          <li>
            <t>KPIs: delay, jitter, loss</t>
          </li>
          <li>
            <t>Attachment Circuits (ACs) <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>Configuration: L2SM <xref target="RFC8466"/>, L3SM <xref target="RFC8299"/>, L2NM <xref target="RFC9291"/>, and L3NM <xref target="RFC9182"/></t>
          </li>
          <li>
            <t>Incident Management for Network Services <xref target="I-D.draft-ietf-nmop-network-incident-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to Mohamed Boucadair (<eref target="mailto:mohamed.boucadair@orange.com">mohamed.boucadair@orange.com</eref>) for his valuable contributions, reviews, and comments.</t>
      <t>Many thanks to Nigel Davis <eref target="mailto:ndavis@ciena.com">ndavis@ciena.com</eref> for the valuable discussions and his confirmation of the modelling requirements.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Ahmed Elhassany">
        <organization>Swisscom</organization>
        <address>
          <email>Ahmed.Elhassany@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
