<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nmop-simap-concept-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="SIMAP Concept &amp; Needs">SIMAP: Concept, Requirements, and Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-02"/>
    <author fullname="Olga Havel">
      <organization>Huawei</organization>
      <address>
        <email>olga.havel@huawei.com</email>
      </address>
    </author>
    <author fullname="Benoit Claise">
      <organization>Huawei</organization>
      <address>
        <email>benoit.claise@huawei.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="14"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>Service &amp; Infrastructure Maps</keyword>
    <keyword>Service emulation</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>service flexibility</keyword>
    <keyword>service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>Digital Map</keyword>
    <keyword>Emulation</keyword>
    <keyword>Simulation</keyword>
    <keyword>Topology</keyword>
    <keyword>Multi-layer</keyword>
    <abstract>
      <?line 64?>

<t>This document defines the concept of Service &amp; Infrastructure Maps (SIMAP) and identifies a set of SIMAP
requirements and use cases. The SIMAP was previously known as Digital Map.</t>
      <t>The document intends to be used as a reference for the assessment effort of the various topology modules to meet
SIMAP requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Management Operations Working Group mailing list (nmop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-wg-nmop/draft-ietf-nmop-digital-map-concept"/>.</t>
    </note>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Service &amp; Infrastructure Maps (SIMAP) is a data model that provides a view of the operator's networks and services,
including how it is connected to other models/data (e.g., inventory, observability sources, and
operational knowledge). It specifically provides an approach to model multi-layered topology
and appropriate mechanism to navigate amongst layers and correlate between them.
This includes layers from physical topology to service topology.
This model is applicable to multiple domains (access, core, data center, etc.) and
technologies (Optical, IP, etc.).</t>
      <t>The SIMAP modelling defines the core topological entities (network, node, link, and termination point) at each layer,
their role in the network topology, core topological properties, and topological relationships
both inside each layer and between the layers. It also defines how to access other external models
from a topology. The SIMAP model is a topological model that is linked to the other functional
models and connects them all: configuration, maintenance, assurance (KPIs, status, health, and symptoms),
Traffic-Engineering (TE), different behaviors and actions, simulation, emulation, mathematical abstractions,
AI algorithms, etc. These other models exist outside of the SIMAP and are not defined during SIMAP modelling.</t>
      <t>The SIMAP data consists of virtual instances of network and service topologies at different layers.
The SIMAP provides access to this data via standard APIs for both read, typically as a nortbound interface from a controller, with query capabilities and links to other YANG modules (e.g., Service Assurance for Intent-based Networking (SAIN) <xref target="RFC9417"/>, Service Attachment Points (SAPs) <xref target="RFC9408"/>, Inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>, and potentially linking to non-YANG models).
The SIMAP also provides write operations with the same set of APIs, not to change a topology layer on the fly as a northbound interface from the controller, but for offline simulations, before applying the changes to the network via the normal controller operations.</t>
      <t>Both read and write APIs are similar, stemming from the same YANG model, to facilitate the comparison of the offline simulated SIMAP with the network one.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Topology:</dt>
        <dd>
          <t>Topology in this document refers to the network and service topology.
A network topology defines how physical or logical nodes, links and
termination points are related and arranged. A Service topology defines how
service components (e.g., VPN instances, customer interfaces, and
customer links) between customer sites are interrelated and
arranged.</t>
        </dd>
        <dt/>
        <dd>
          <t>There are several types of topologies: point-to-point,
bus, ring, star, tree, mesh, hybrid, and daisy chain.</t>
        </dd>
        <dt/>
        <dd>
          <t>Topologies may be unidirectional or bidirectional (bus, some
rings).</t>
        </dd>
        <dt>Multi-layered topology:</dt>
        <dd>
          <t>A multi-layered topology models relationships between different topology layers,
where each layer represents a connectivity aspect of the network
and services that needs to be configured, controlled and monitored.
Each topology layer has a separate lifecycle.</t>
        </dd>
        <dt>Topology layer:</dt>
        <dd>
          <t>Represents topology at a single layer in the multi-layered topology.</t>
        </dd>
        <dt/>
        <dd>
          <t>The topology layer can also represent what needs to be managed by a
specific user or application, for example IGP layer can be of interest to the operator
troubleshooting or optimizing the routing, while the optical layer may be
of interest to the user managing the optical network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers may relate closely to OSI layers, like L1 topology
for physical topology, Layer 2 for link topology and Layer 3 for IPv4 and
IPv6 topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers represent the control aspects of Layer 3, like OSPF, IS-IS, or BGP.</t>
        </dd>
        <dt/>
        <dd>
          <t>The service layer represents the service view of the connectivity, that can differ for
different types of services and for different providers/solutions.</t>
        </dd>
        <dt/>
        <dd>
          <t>The top layer represents the application/flow view of service connectivity.</t>
        </dd>
        <dt>Service:</dt>
        <dd>
          <t>Represents network connectivity service provided over a network that enables devices, systems, or networks to
communicate and exchange data with each other. It provides the underlying infrastructure and mechanisms
necessary for establishing, maintaining, and managing connections between different endpoints.
The example services are: L2VPN, L3VPN, EVPN, VPLS, VPWS,</t>
        </dd>
        <dt>Subservice:</dt>
        <dd>
          <t>Represents component of the service that can be independently managed but is not provided as a service.
The example subservices are: MPLS Tunnels, SRV6 Tunnels, VRFs, VPN Links, IGP Links.</t>
        </dd>
        <dt>Resource:</dt>
        <dd>
          <t>Defined in <xref target="I-D.ietf-nmop-terminology"/></t>
        </dd>
      </dl>
      <t>The document defines the following terms:</t>
      <dl>
        <dt>Service &amp; Infrastructure Maps (SIMAP):</dt>
        <dd>
          <t>SIMAP is a data model that provides a view of the operator's networks and services,
including how it is connected to other models/data (e.g., inventory, observability sources, and
operational knowledge). It specifically provides an approach to model multi-layered topology
and appropriate mechanism to navigate amongst layers and correlate between them.
This includes layers from physical topology to service topology.</t>
        </dd>
        <dt/>
        <dd>
          <t>This model is applicable to multiple domains (access, core, data centers, etc.) and
technologies (Optical, IP, etc.).</t>
        </dd>
        <dt>SIMAP modelling:</dt>
        <dd>
          <t>The set of principles, guidelines, and conventions to model the SIMAP
using the IETF modelling approach <xref target="RFC8345"/>. They cover the
network types (layers and sublayers), entity types, entity roles
(network, node, termination point, or link), entity properties,
relationship types between entities and relationships to other entities.</t>
        </dd>
        <dt>SIMAP model:</dt>
        <dd>
          <t>Defines the core topological entities, their role in the network,
core topological properties, and relationships both inside each layer and
between the layers.</t>
        </dd>
        <dt/>
        <dd>
          <t>It is the basic topological model with references/pointers to other models and connects them all:
configuration, maintenance, assurance (KPIs, status, health, symptoms, etc.), traffic engineering,
different behaviors, simulation, emulation, mathematical abstractions, AI algorithms, etc.</t>
        </dd>
        <dt>SIMAP data:</dt>
        <dd>
          <t>Consists of instances of network and service topologies at
 different layers.  This includes instances of networks, nodes,
 links and termination points, topological relationships between
 nodes, links and termination points inside a network,
 relationships between instances belonging to different networks,
 links to functional data for the instances, including
 configuration, health, symptoms.</t>
        </dd>
        <dt/>
        <dd>
          <t>The SIMAP data can be historical, real-time, or future data for 'what-if' scenarios.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sample-simap-use-cases">
      <name>Sample SIMAP Use Cases</name>
      <t>The following are sample use cases that require SIMAP:</t>
      <ul spacing="normal">
        <li>
          <t>Inventory queries</t>
        </li>
        <li>
          <t>Service placement feasibility checks</t>
        </li>
        <li>
          <t>Service-&gt; subservice -&gt; resource</t>
        </li>
        <li>
          <t>Resource -&gt; subservice -&gt; service</t>
        </li>
        <li>
          <t>Intent/service assurance</t>
        </li>
        <li>
          <t>Service E2E and per-link KPIs on SIMAP (connectivity status, high-availability, delay, jitter, and loss)</t>
        </li>
        <li>
          <t>Capacity planning</t>
        </li>
        <li>
          <t>Network design</t>
        </li>
        <li>
          <t>Network Simulation and Emulation</t>
        </li>
        <li>
          <t>Traffic Engineering</t>
        </li>
        <li>
          <t>Postmortem Replay</t>
        </li>
        <li>
          <t>Closed-loop</t>
        </li>
        <li>
          <t>Network Digital Twin (NDT)</t>
        </li>
      </ul>
      <t>Overall, the SIMAP is needed to provide the mechanism to connect data islands from the core multi-layered topology.
It is a solution feasible and useful in the short-term for the existing operations use cases, but it is also a
requirement for the SIMAP.</t>
      <ul empty="true">
        <li>
          <t>The following subsections include some initial use case descriptions to initiate the discussion about what type of info
is needed to describe the use cases in the context of SIMAP.
The next version of the draft will include more info on these use cases and more input from the operators,
from the perspective of what the value of the SIMAP for each use case is and how the SIMAP API can be used.
This will also clarify if only read and if/when write interface is needed per use case.</t>
        </li>
      </ul>
      <section anchor="inventory-queries">
        <name>Inventory Queries</name>
        <t>Network inventory refers to a comprehensive record or database that tracks and documents all the network components and devices within an organization's IT infrastructure.</t>
        <t>Key elements typically found in a network inventory include:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Hardware Details:</dt>
              <dd>
                <t>Descriptions of physical devices such as routers (including its internal components such as cards, power supply units, pluggables), switches, servers, network cables, including model numbers, serial numbers, and manufacturer information. These information will facilitate locating additional details of the hadware in the manufacturer systems and the correlation with the purchase catalog of the company.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Software and Firmware:</dt>
              <dd>
                <t>Versions of operating systems, network management tools, and firmware running on network devices. Note that a network device can have components with their own software and firmware.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Licensing Information:</dt>
              <dd>
                <t>For any licensed software or devices, the network inventory will track license numbers, expiry dates, and compliance.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>Network inventory lifecycle refers to the stages a network device or component goes through from its introduction to the network until its removal or replacement. It encompasses everything from acquisition and deployment to maintenance, upgrade, and eventually decommissioning. Managing the network inventory lifecycle efficiently is crucial for maintaining a secure, functional, and cost-effective network.</t>
        <t>A well-maintained network inventory helps organizations with network management, troubleshooting, asset tracking, security, and ensuring compliance with regulations. It also helps in scaling the network, planning upgrades, and responding to issues quickly.  In order to facilitate the planning and troubleshooting processes it is necessary to be able to navigate from network inventory to network topology and services.</t>
        <t>The application will be able to retrieve physical topology from the controller via the SIMAP API and from the
response it will be able to retrieve physical inventory of individual devices and cables.</t>
        <t>The application may request either one or multiple topology layers via the SIMAP API and from the response
it will be able to retrieve both physical and logical inventory.</t>
        <t>For Access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer service, reduced Mean Time To Repair (MTTR), and lower operational costs
through truck roll reduction. For example, operators may use custom-tags that are readily available for a customer-facing device and then query
the inventory based on that tag to correlate it with the inventory and then map it to the network/service topology. The mapping and correlation can be then used for triggering apprpriate service checks.</t>
      </section>
      <section anchor="service-placement-feasibility-checks">
        <name>Service Placement Feasibility Checks</name>
        <t>Service placement feasibility checks refers to the process of evaluating whether a specific service can be deployed
and operated effectively in a given network. This includes accessing the various factors to ensure that the
service will function as indended (e.g., based on traffic performance requirements), without causing network disruptions or
innefficiencies and effecting other services already provisioned on the network.</t>
        <t>Some of the factors that need assesing are network capabilities, status, limitations, resource usage and availability.
The service could be simulated during the feasibility checks to identify if there are any potential issues.
The load testing could be done to evaluate performance under stress.</t>
        <t>The Service Feasibility Check application will be able to retrieve the topology at any layer from the controller
via the SIMAP API and from the response it will be able to navigate to any other YANG modules outside of the
core SIMAP topology to retrive any other information needed: resource usage, availability, status, etc.</t>
      </section>
      <section anchor="service-subservice-resource">
        <name>Service-&gt; Subservice -&gt; Resource</name>
        <t>The application will be able to retrieve all services using the SIMAP API for selected network types.
The application will be able to retrieve the topology for selected services via SIMAP API and from the response
it will be able to navigate via the supporting relationship top-down to the lower layers. That way, it will be able to
determine what logical resources are used by the service. The supporting relations to the lowest layer will help
application to determine what physical resources are used by the service.</t>
      </section>
      <section anchor="resource-subservice-service">
        <name>Resource -&gt; Subservice -&gt; Service</name>
        <t>The application will be able to navigate from the Physical, L2 or L3 topology to the services that use specific
resources. For example, the application will be able to select the resource and by navigating the supporting relationship
bottom-up come to the service and its nodes, tps and links.</t>
      </section>
      <section anchor="intentservice-assurance">
        <name>Intent/Service Assurance</name>
        <t>Network intent and service assurance work together to ensure that the network aligns with business goals and that the services provided meet the agreed-upon Service Level Agreements (SLAs).</t>
        <t>The Service Assurance for Intent-Based Networking Architecture (SAIN) <xref target="RFC9417"/> approach emphasizes a comprehensive view of components involved in service delivery, including network devices and functions, to effectively monitor and maintain service health.</t>
        <t>The key objectives of this architecture:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Holistic Service Monitoring:</dt>
              <dd>
                <t>By considering all elements involved in service delivery, the architecture enables a thorough assessment of service health.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Correlation of Service Degradation:</dt>
              <dd>
                <t>It assists in linking service performance issues to specific network components, facilitating precise identification of faults.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Impact Assessment:</dt>
              <dd>
                <t>The architecture identifies which services are affected by the failure or degradation of particular network components, aiding in prioritizing remediation efforts.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>When a service is degraded, the SAIN architecture will highlight where in the assurance service graph to look, as opposed to going hop by hop to troubleshoot the issue.
More precisely, the SAIN architecture will associate to each service instance a list of symptoms originating from specific subservices, corresponding to components of the network.
These components are good candidates for explaining the source of a service degradation.</t>
        <t>The application will be able to retrieve topology layer and any network/node/termination point/link instances from the controller via the SIMAP API and from the response it will be able to determine the health of each instance by navigating to the SAIN subservices and its symptoms.</t>
      </section>
      <section anchor="service-e2e-and-per-link-kpis">
        <name>Service E2E and Per-link KPIs</name>
        <t>The application will be able to retrieve the topology at any layer from the controller via the SIMAP API and from the
response it will be able to navigate any retrieve any KPIs for selected topology entity.</t>
      </section>
      <section anchor="capacity-planning">
        <name>Capacity Planning</name>
        <t>Network Capacity Planning refers to the process of analyzing, predicting, and ensuring that the network has sufficient
capacity (e.g., <xref target="RFC5136"/>), resources, and infrastructure to meet current and future demands. It involves evaluating the network's ability
to handle increasing (including forecast) amounts of data, traffic, and users activity, while maintaining acceptable levels of performance,
reliability, and security.</t>
        <t>The capacity planning primary goal is to ensure that a network can support business operations, applications, and
services without interruptions, delays, or degradation in quality. This requires a thorough understanding of the
network's current state, as well as future requirements and growth projections.</t>
        <t>Key aspects of network capacity planning include:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic analysis: Monitoring and analyzing network traffic patterns to identify trends, peak usage periods, and areas
of congestion. For example, by generating a core traffic matrix with IPFIX flow record <xref target="RFC7011"/> or deducting an approximate traffic matrix from the link utilization data.</t>
          </li>
          <li>
            <t>Resource utilization: Evaluating the link utilization throughout the network for the current demand identifying bottlenecks and potential QoS peformance issues.</t>
          </li>
          <li>
            <t>Growth forecasting: Predicting future network growth based on business expansion, new applications, or changes in users
behavior.</t>
          </li>
          <li>
            <t>What-if scenarios: Creating models to assess the network behavior under different scenarios, such as increased traffic,
failure conditions (link, router or Shared Risk Resource Group), and new application deployments (such as a new Content Delivery Network source, a new peering point, a new data center...).</t>
          </li>
          <li>
            <t>Upgrade planning: Identifying areas where upgrades or additions are needed to ensure that the network can minimize the
 effect of node/link failures, mitigate QoS problems, or simply to support growing demands.</t>
          </li>
          <li>
            <t>Cost-benefit analysis: Evaluating the costs and benefits of upgrading or adding new resources to determine the most
cost-effective solutions.</t>
          </li>
        </ul>
        <t>By implementing a robust capacity planning process, organizations can:</t>
        <ul spacing="normal">
          <li>
            <t>Ensure better network reliability: Minimize downtime and ensure that the network is always available when needed.</t>
          </li>
          <li>
            <t>Improve performance: Optimize network resources to support business-critical applications and services.</t>
          </li>
          <li>
            <t>Optimize costs: Avoid unnecessary over-provisioning by making informed decisions based on data-driven insights.</t>
          </li>
          <li>
            <t>Support business growth: Scale the network to meet increasing demands and support business expansion.</t>
          </li>
        </ul>
        <t>The application will be able to retrieve topology layer and any network/node/termination point/link instances from
the controller via the SIMAP API and from the response it will be able to map the traffic analysis to the entities
(typically links and router), evaluate their current utilization, based on the grow forecasting evaluate which elements
to add to the network, and finally perform the 'what-if' failure analysis by simulating the removal of link(s) and/or
router(s) while evaluating the network performance.</t>
      </section>
      <section anchor="network-design">
        <name>Network design</name>
        <t>Network design involves defining both the logical structure-such as access, aggregation, and core layers and
the physical layout, including devices and links.</t>
        <t>It serves as a blueprint, detailing how these elements
interconnect to deliver the intended network behavior and functionality. The application will retrieve the
proposed network topology as the initial design, which can then undergo critical analyses-such as traffic flow
simulations to identify bottlenecks and redundancy checks to ensure resilience-before being transformed into
actionable intent and, eventually, deployment configurations. Throughout the network's lifecycle, the design rules
embedded within the topology can be continuously validated. For example, a link rule might specify that a connection
etween core and aggregation layers must have its source and destination located within the same data center.
Another example to declare that specific link type should only exist between Core &lt;&gt; Aggregation layer with
certain constrains on port optic speed, type (LR vs SR for instance) etc."</t>
      </section>
      <section anchor="network-simulation-and-network-emulation">
        <name>Network Simulation and Network Emulation</name>
        <t>Network simulation is a process used to analyse the behaviour of networks via software. It allows network engineers and researchers to assess how the network protocols work under different conditions, such as diffenet topologies, traffic loads, network failures, or the introduction of new devices. Network emulation, on the other hand, replicates the behavior of a real-world network, allowing for more realistic analysis compared to network simulation. While network simulation focuses on modeling and approximating network behavior, network emulation involves creating a real-time, functional network environment whose protocol behaves exactly like a real network. Ideally, network emulation uses the same software images as in the real network, but it could also be peformed (with less accuracy) using generic software.</t>
        <section anchor="types-of-network-simulation">
          <name>Types of Network simulation</name>
          <t>There are several types of network simulations, each designed to address specific needs and use cases. Below are the main categories of network simulation:</t>
          <ol spacing="normal" type="1"><li>
              <dl>
                <dt>Discrete Event Simulation (DES):</dt>
                <dd>
                  <t>This is the most common type of network simulation. It models a series of events that occur at specific points in time. Each event triggers a change in the state of a network component (e.g., a link is down, a card fails, or a packet arrives).</t>
                </dd>
              </dl>
            </li>
            <li>
              <dl>
                <dt>Continuous Simulation:</dt>
                <dd>
                  <t>In contrast to discrete event simulation, continuous simulation models systems where variables change continuously over time. Network parameters like bandwidth, congestion, and throughput can be treated as continuous functions.</t>
                </dd>
                <dt/>
                <dd>
                  <t>The main use case is to model certain aspects of network performance that evolve continuously, such as link speeds or delay distributions in links that are impacted by envirnnmental conditions (such as microwave or satellite links).</t>
                </dd>
              </dl>
            </li>
            <li>
              <dl>
                <dt>Monte Carlo Simulation:</dt>
                <dd>
                  <t>This type of simulation uses statistical methods to model and analyze networks under uncertain or variable conditions. Monte Carlo simulations generate a large number of random samples to predict the performance of a network across multiple scenarios. It is used for probabilistic analysis, risk assessment, and performance evaluation under uncertain conditions.</t>
                </dd>
              </dl>
            </li>
          </ol>
        </section>
        <section anchor="goals-of-network-simulation">
          <name>Goals of Network Simulation</name>
          <t>The simulations can be also classified depending on the goal of the simulation.</t>
          <section anchor="network-protocol-analysis">
            <name>Network Protocol Analysis</name>
            <t>This type of simulation focuses on simulating specific networking protocols (IS-IS, OSPF, BGP, SR) to understand how they perform under different conditions. It models the protocol operations and interactions among devices in the network. For example, simulation can be used to asses the impact of changing a link metric. Morever, specific features of the networking protocol can be tested. For example, how fast-reroute performs in a given network topology.</t>
          </section>
          <section anchor="traffic-simulation">
            <name>Traffic Simulation</name>
            <t>This simulation focuses on modelling traffic flow across the network, including packet generation, flow control, routing, and congestion. It aims to evaluate traffic's impact on network performance.</t>
            <t>The main use is to model the impact of different types of traffic (e.g., voice, video, mobile data, web browsing) and understand how they affect the network's bandwidth and congestion levels. It can be used to identify bottelnecks and assist the capacity planning process.</t>
          </section>
          <section anchor="simulation-of-different-topologies-under-normal-and-failure-scenarios">
            <name>Simulation of Different Topologies Under Normal and Failure Scenarios</name>
            <t>This type of simulation focuses on the structure and layout of the network itself. It simulates different network topologies, such as mesh, horse-shoe, bus, star, or tree topologies, and their impact on the network's performance.  It can be used, together with the traffic simualtion to evaluate the most efficient topology for a network, under normal conditions and considering factors like fault tolerance.</t>
          </section>
        </section>
      </section>
      <section anchor="traffic-engineering">
        <name>Traffic Engineering</name>
        <t>Traffic Engineering (TE) <xref target="RFC9522"/> is a network optimization technique designed to enhance network performance and resource utilization by intelligently controlling the flow of data, for example by enabling dynamic path selection based on constraints such as bandwidth availability, latency, and link costs.</t>
        <t>Its primary goal is to prevent network congestion, balance traffic loads, and ensure efficient use of bandwidth while meeting performance requirements.</t>
        <t>The TE use case is a combination of the both the capacity planning and the simulation use case. Therefore there are no specific SIMAP requirements.</t>
      </section>
      <section anchor="postmortem-replay">
        <name>Postmortem Replay</name>
        <t>The postmortem replay use case consists in using SIMAPs for the purpose of analysis of network service property evolution based on recorded changes. A collection of relevant timestamped network events, such as routing updates, configuration changes, link status modifications, traffic metrics evolution, and service characteristics, is being made accessible from and/or within a SIMAP to support investigation and automated processing.
Using a structured format, the stored data can be replayed in sequence, allowing network operators to examine historical network behavior, diagnose issues, and assess the impact of such events on service assurance.</t>
        <t>The mechanism supports correlation with external data sources to facilitate comprehensive post-mortem analysis.
Further than centralizing and correlating such various sources of information, the SIMAP can provide simulation of the network behaviour to assist investigations.</t>
        <t>In essence, this use case builds upon a collection of other SIMAP use cases, such as, inventory queries, intent/service assurance, Service KPIs, capacity planning, and simulation to provide a thorough understanding of a network event impacting service assurance.</t>
        <t>Note that this use case may serve as a component of Service Disruption Detection fine tuning as described in <xref target="I-D.ietf-nmop-network-anomaly-architecture"/>.</t>
      </section>
      <section anchor="closed-loop">
        <name>Closed Loop</name>
        <t>A network closed loop refers to an automated and intelligent system where network operations are continuously monitored, analyzed, and optimized in real time through feedback mechanisms. This self-adjusting cycle ensures that the network dynamically adapts to changes, resolves issues proactively, and maintains optimal performance without manual intervention.</t>
        <t>Key Characteristics of a Network Closed Loop:</t>
        <ul spacing="normal">
          <li>
            <t>Real-Time Monitoring: Collects data from network devices, traffic flows, and applications to build a comprehensive view of network health and performance.</t>
          </li>
          <li>
            <t>Automated Analysis: Ideally leverages AI and machine learning to identify anomalies, predict potential failures, or detect security threats.</t>
          </li>
          <li>
            <t>Proactive Action: Automatically triggers corrective measures, such as reconfiguring devices, isolating compromised endpoints, or rerouting traffic.</t>
          </li>
          <li>
            <t>Continuous Optimization: Uses feedback from previous cycles to refine network policies and improve future responses.</t>
          </li>
        </ul>
        <t>The application will be able to retrieve topology layer and any network/node/termination point/link instances from the controller via the SIMAP API and from the response it will be able to map the traffic analysis to the entities (typically links and router), for automated analysis. The corrective measures would be applied, either directly to the network by managed the SIMAP entities (network/node/termination point/link instances) or by validating first the corrective measure in an offline simulation (see the simulation and traffic engineering use cases).</t>
      </section>
      <section anchor="network-digital-twin-ndt">
        <name>Network Digital Twin (NDT)</name>
      </section>
    </section>
    <section anchor="simap-requirements">
      <name>SIMAP Requirements</name>
      <section anchor="core-requirements">
        <name>Core Requirements</name>
        <t>The following are the core requirements for the SIMAP (note that some of them are supported by
default by <xref target="RFC8345"/>):</t>
        <dl>
          <dt>REQ-BASIC-MODEL-SUPPORT:</dt>
          <dd>
            <t>Basic model with network, node, link, and termination point entity types.</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that users of the SIMAP model
must be able to understand topology model at any layer via these core concepts only,
without having to go to the details of the specific augmentations to understand the topology.</t>
          </dd>
          <dt>REQ-LAYERED-MODEL:</dt>
          <dd>
            <t>Layered SIMAP, from physical network (ideally optical, layer 2, layer 3) up to  service and intent views.</t>
          </dd>
          <dt>REQ-PASSIVE-TOPO:</dt>
          <dd>
            <t>SIMAP must support topology of the complete network, including active and passive parts.</t>
          </dd>
          <dt/>
          <dd>
            <t>For Access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer service, reduced MTTR, and lower operational costs
through truck roll reduction.</t>
          </dd>
          <dt>REQ-PROG-OPEN-MODEL:</dt>
          <dd>
            <t>Open and programmable SIMAP.</t>
          </dd>
          <dt/>
          <dd>
            <t>This includes "read" operations to retrieve the view of the network, typically as application-facing interface of
Software Defined Networking (SDN) controllers or orchestrators.</t>
          </dd>
          <dt/>
          <dd>
            <t>It also includes "write" operations, not for the ability to directly change the SIMAP data
(e.g., changing the network or service parameters), but for offline simulations, also known as what-if scenarios.</t>
          </dd>
          <dt/>
          <dd>
            <t>Running a "what-if" analysis requires the ability to take
snapshots and to switch easily between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>Note that there is a need to distinguish between a change on the SIMAP
for future simulation and a change that reflects the current reality of the network.</t>
          </dd>
          <dt>REQ-STD-API-BASED:</dt>
          <dd>
            <t>Standard based SIMAP Models and APIs, for multi-vendor support.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide the standard YANG APIs
that provide for read/write and queries.  These APIs must also provide the capability to retrieve the
links to external data/models.</t>
          </dd>
          <dt>REQ-COMMON-APP:</dt>
          <dd>
            <t>SIMAP models and APIs must be common over different network domains (campus, core, data center, etc.).</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that clients of the SIMAP API must be able to understand the topology model of layers of any
domain without having to understand the details of any technologies and domains.</t>
          </dd>
          <dt>REQ-SEMANTIC:</dt>
          <dd>
            <t>SIMAP must provide semantics for layered network topologies and for linking external models/data.</t>
          </dd>
          <dt>REQ-LAYER-NAVIGATE:</dt>
          <dd>
            <t>SIMAP must provide intra-layer and inter-layer relationships.</t>
          </dd>
          <dt>REQ-EXTENSIBLE:</dt>
          <dd>
            <t>SIMAP must be extensible with metadata.</t>
          </dd>
          <dt>REQ-PLUGG:</dt>
          <dd>
            <t>SIMAP must be pluggable. That is,
</t>
            <ul spacing="normal">
              <li>
                <t>Must connect to other YANG modules for inventory, configuration, assurance, etc.</t>
              </li>
              <li>
                <t>Given that no all involved components can be available using YANG, there is a need to connect
SIMAP YANG model with other modelling mechanisms.</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-GRAPH-TRAVERSAL:</dt>
          <dd>
            <t>SIMAP must be optimized for graph traversal for paths. This means that only providing link nodes and
source and sink relationships to termination-points may not be sufficient, we may need to have the direct
relationship between the termination points or nodes.</t>
          </dd>
          <dt>REQ-BIDIR:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model bidirectional links
One of the core characteristics of any network topology is the link
directionality.  While data flows are unidirectional, the
bidirectional links are also common in networking.  Examples are
Ethernet cables, bidirectional SONET rings, socket connection to the
server, etc.  We also encounter requirements for simplified service
layer topology, where we want to model link as bidirectional to be
supported by unidirectional links at the lower layer.</t>
          </dd>
          <dt>REQ-MULTI-POINT:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model multipoint links
One of the core characteristics of any network topology is its type
and link cardinality.  Any topology model should be able to model any
topology type in a simple and explicit way, including point to
multipoint, bus, ring, star, tree, mesh, hybrid and daisy chain.  Any
topology model should also be able to model any link cardinality in a
simple and explicit way, including point to point, point to
multipoint, multipoint to multipoint or hybrid.</t>
          </dd>
          <dt>REQ-MULTI-DOMAIN:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model links between the network/domains
One of the core characteristics of any topology is connectivity between different network, subnetworks or domains.</t>
          </dd>
          <dt>REQ-SUBNETWORK:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model network decomposition into sub-networks.
This would allow modelling hierarchical network domains, Autonomous System with multiple Areas or e2e network
with multiple domains.</t>
          </dd>
          <dt>REQ-SHARED:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to share nodes, links and termination points between different networks.</t>
          </dd>
          <dt>REQ-SUPPORTING:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model supporting relationships between different types of topological entities
(e.g., tp is supported by the node). This may be required in the cases when tp is not supported by the underlying tp,
but by the node (e.g., loopback does not have physical representation, so it is supported by physical device).</t>
          </dd>
          <dt>REQ-STATUS:</dt>
          <dd>
            <t>Links and nodes that are down must appear in the topology. The status of the nodes and links must be either
implemented in the SIMAP model or accessible from the SIMAP model.</t>
          </dd>
        </dl>
      </section>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The following are design requirements for modelling the SIMAP. They are derived from the core requirements
collected from the operators and although there is some duplication, these are focused on summarizing the requirements
for the design of the model and API:</t>
        <dl>
          <dt>REQ-TOPO-ONLY:</dt>
          <dd>
            <t>SIMAP should contain only topological information.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP is not required to contain all models and data required for
all the management and use cases. However, it should be designed to support adequate pointers to other functional
data and models to ease navigating in the overall system. For example:
</t>
            <ul spacing="normal">
              <li>
                <t>ACLs and Route Policies are not required to be supported in the SIMAP, they would be linked to the SIMAP</t>
              </li>
              <li>
                <t>Dynamic paths may either be outside of the SIMAP or part of traffic engineering data/models</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-PROPERTIES:</dt>
          <dd>
            <t>SIMAP entities should mainly contain properties used to identify topological entities at different layers,
identify their roles, and topological relationships between them.</t>
          </dd>
          <dt>REQ-RELATIONSHIPS:</dt>
          <dd>
            <t>SIMAP should contain all topological relationships inside each layer or between the layers (underlay/overlay)</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP should contain links to other models/data to enable generic navigation to other YANG models in
generic way.</t>
          </dd>
          <dt>REQ-CONDITIONAL:</dt>
          <dd>
            <t>Provide capability for conditional retrieval of parts of SIMAP.</t>
          </dd>
          <dt>REQ-TEMPO-HISTO:</dt>
          <dd>
            <t>Must support geo-spatial, temporal, and historical data.  The temporal and historical can also be supported
external to the SIMAP.</t>
          </dd>
        </dl>
      </section>
      <section anchor="architectural-requirements">
        <name>Architectural Requirements</name>
        <t>The following are the architectural requirements for the controller that provides SIMAP API:</t>
        <dl>
          <dt>REQ-DM-SCALES:</dt>
          <dd>
            <t>Scale, performance, ease of integration.</t>
          </dd>
          <dt>REQ-DM-DISCOVERY:</dt>
          <dd>
            <t>Initial discovery and dynamic (change only) synch with the physical network.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the SIMAP concepts, requirements, and use cases, there is no specific security considerations.
However, the RFC 8345 Security Considerations aspects will be useful when designing the solution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  However, the data model is designed with
   appropriate provisions to ease future augmentations with application-
   specific and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-04"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-terminology">
          <front>
            <title>Some Key Terms for Network Fault and Problem Management</title>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="21" month="January" year="2025"/>
            <abstract>
              <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG models and management protocols that report, make
   visible, or manage network faults and problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-10"/>
        </reference>
        <reference anchor="RFC5136">
          <front>
            <title>Defining Network Capacity</title>
            <author fullname="P. Chimento" initials="P." surname="Chimento"/>
            <author fullname="J. Ishac" initials="J." surname="Ishac"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>Measuring capacity is a task that sounds simple, but in reality can be quite complex. In addition, the lack of a unified nomenclature on this subject makes it increasingly difficult to properly build, test, and use techniques and tools built around these constructs. This document provides definitions for the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling between a source and destination in an IP network. By doing so, we hope to provide a common framework for the discussion and analysis of a diverse set of current and future estimation techniques. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5136"/>
          <seriesInfo name="DOI" value="10.17487/RFC5136"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-anomaly-architecture">
          <front>
            <title>An Architecture for a Network Anomaly Detection Framework</title>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Wanting Du" initials="W." surname="Du">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   This document describes the motivation and architecture of a Network
   Anomaly Detection Framework and the relationship to other documents
   describing network symptom semantics and network incident lifecycle.

   The described architecture for detecting IP network service
   interruption is generic applicable and extensible.  Different
   applications are being described and exampled with open-source
   running code.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-anomaly-architecture-01"/>
        </reference>
        <reference anchor="RFC9179">
          <front>
            <title>A YANG Grouping for Geographic Locations</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a generic geographical location YANG grouping. The geographical location grouping is intended to be used in YANG data models for specifying a location on or in reference to Earth or any other astronomical object.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9179"/>
          <seriesInfo name="DOI" value="10.17487/RFC9179"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="I-D.ogondio-opsawg-ospf-topology">
          <front>
            <title>A YANG Data Model for Open Shortest Path First (OSPF) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Open Shortest
   Path First (OSPF) information.  This document augments the 'ietf-
   network' data model by adding OSPF concepts and explains how the data
   model can be used to represent the OSPF topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-opsawg-ospf-topology-01"/>
        </reference>
        <reference anchor="I-D.ogondio-nmop-isis-topology">
          <front>
            <title>A YANG Data Model for Intermediate System to intermediate System (IS-IS) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Intermediate
   System to Intermediate System (IS-IS).  This document augments the
   'ietf-network' data model by adding IS-IS concepts and explains how
   the data model can be used to represent the IS-IS topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-nmop-isis-topology-00"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Hardware Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="9" month="July" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for network hardware
   inventory data information.

   The YANG data model presented in this document is intended to be used
   as the basis toward a generic YANG data model for network hardware
   inventory data information which can be augmented, when required,
   with technology-specific (e.g., optical) inventory data, to be
   defined either in a future version of this document or in another
   document.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-network-inventory-yang-02"/>
        </reference>
        <reference anchor="I-D.wzwb-opsawg-network-inventory-management">
          <front>
            <title>A YANG Network Data Model of Network Inventory</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="19" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

   This document is meant to help IVY base Network Inventory model
   discussion and ease agreement on a base model that would be flexible
   enough to be augmented with components that are covered by the IVY
   Charter.

   The hardware components definition are adapted from draft-ietf-ccamp-
   network-inventory-yang-02.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wzwb-opsawg-network-inventory-management-04"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-topology">
          <front>
            <title>A Network Data Model for Inventory Topology Mapping</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a YANG model to map the network inventory data
   with the topology model to form a base underlay network.  The model
   facilitates the correlation between the layer (e.g., Layer 2 and
   Layer 3) topology information and the inventory data of the underlay
   network for better service provisioning, network maintenance
   operations, and other assessment scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-01"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-16"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   Delivery of network services assumes that appropriate setup is
   provisioned over the links that connect customer termination points
   and a provider network.  The required setup to allow successful data
   exchange over these links is referred to as an attachment circuit
   (AC), while the underlying link is referred to as "bearer".

   This document specifies a YANG service data model for ACs.  This
   model can be used for the provisioning of ACs before or during
   service provisioning (e.g., Network Slice Service).

   The document also specifies a YANG service model for managing bearers
   over which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-20"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="10" month="October" year="2024"/>
            <abstract>
              <t>   A network incident refers to an unexpected interruption of a network
   service, degradation of a network service quality, or sub-health of a
   network service.  Different data sources including alarms, metrics,
   and other anomaly information can be aggregated into a few amount of
   network incidents through data correlation analysis and the service
   impact analysis.

   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help resolve network incidents
   for the sake of network service health and root cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-02"/>
        </reference>
      </references>
    </references>
    <?line 582?>

<section anchor="related-ietf-activities">
      <name>Related IETF Activities</name>
      <section anchor="sec-ntw-topo">
        <name>Network Topology</name>
        <t>Interestingly, we could not find any network topology definition in
   IETF RFCs (not even in <xref target="RFC8345"/>) or Internet-Drafts.  However, it is mentioned
   in multiple documents.  As an example, in Overview and Principles of
   Internet Traffic Engineering <xref target="RFC9522"/>, which
   mentions:</t>
        <blockquote>
          <t>To conduct performance studies and to support planning of existing
   and future networks, a routing analysis may be performed to determine
   the paths the routing protocols will choose for various traffic
   demands, and to ascertain the utilization of network resources as
   traffic is routed through the network.  Routing analysis captures the
   selection of paths through the network, the assignment of traffic
   across multiple feasible routes, and the multiplexing of IP traffic
   over traffic trunks (if such constructs exist) and over the
   underlying network infrastructure.  A model of network topology is
   necessary to perform routing analysis.  A network topology model may
   be extracted from:</t>
          <ul spacing="normal">
            <li>
              <t>Network architecture documents</t>
            </li>
            <li>
              <t>Network designs</t>
            </li>
            <li>
              <t>Information contained in router configuration files</t>
            </li>
            <li>
              <t>Routing databases such as the link state database of an interior gateway protocol (IGP)</t>
            </li>
            <li>
              <t>Routing tables</t>
            </li>
            <li>
              <t>Automated tools that discover and collate network topology information.</t>
            </li>
          </ul>
          <t>Topology information may also be derived from servers that monitor
   network state, and from servers that perform provisioning functions.</t>
        </blockquote>
      </section>
      <section anchor="sec-core">
        <name>Core SIMAP Components</name>
        <t>The following specifications are core for the SIMAP:</t>
        <ul spacing="normal">
          <li>
            <t>IETF network model and network topology model <xref target="RFC8345"/></t>
          </li>
          <li>
            <t>A YANG grouping for geographic location <xref target="RFC9179"/></t>
          </li>
          <li>
            <t>IETF modules that augment <xref target="RFC8345"/> for different technologies:  </t>
            <ul spacing="normal">
              <li>
                <t>A YANG data model for Traffic Engineering (TE) Topologies <xref target="RFC8795"/></t>
              </li>
              <li>
                <t>A YANG data model for Layer 2 network topologies <xref target="RFC8944"/></t>
              </li>
              <li>
                <t>A YANG data model for OSFP topology  <xref target="I-D.ogondio-opsawg-ospf-topology"/></t>
              </li>
              <li>
                <t>A YANG data model for IS-IS topology <xref target="I-D.ogondio-nmop-isis-topology"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-add">
        <name>Additional SIMAP Components</name>
        <t>The SIMAP may need to link to the following models, some are already augmenting <xref target="RFC8345"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Service Attachment Point (SAP) <xref target="RFC9408"/>, augments 'ietf-network' data model <xref target="RFC8345"/> by adding the SAP.</t>
          </li>
          <li>
            <t>SAIN <xref target="RFC9417"/> <xref target="RFC9418"/></t>
          </li>
          <li>
            <t>Network Inventory Model <xref target="I-D.ietf-ivy-network-inventory-yang"/> focuses on physical and virtual inventory.
Logical inventory is currently outside of the scope.
It does not augment RFC8345 like the two Internet-Drafts that it evolved from <xref target="I-D.ietf-ccamp-network-inventory-yang"/>
and <xref target="I-D.wzwb-opsawg-network-inventory-management"/>. <xref target="I-D.ietf-ivy-network-inventory-topology"/>
correlates the network inventory with the general topology via RFC8345 augmentations that reference inventory.</t>
          </li>
          <li>
            <t>KPIs: delay, jitter, loss</t>
          </li>
          <li>
            <t>Attachment Circuits (ACs) <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>Configuration: L2SM <xref target="RFC8466"/>, L3SM <xref target="RFC8299"/>, L2NM <xref target="RFC9291"/>, and L3NM <xref target="RFC9182"/></t>
          </li>
          <li>
            <t>Incident Management for Network Services <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to Mohamed Boucadair for his valuable contributions, reviews, and comments.
Many thanks to Adrian Farrel for his SIMAP suggestion and helping to agree the terminology.
Many thanks to Dan Voyer, Brad Peters, Diego Lopez, Ignacio Dominguez Martinez-Casanueva, Italo Busi, Wu Bo,
Sherif Mostafa, Christopher Janz, Rob Evans, Danielle Ceccarelli, and many others for their contributions, suggestions
and comments.</t>
      <t>Many thanks to Nigel Davis <eref target="mailto:ndavis@ciena.com">ndavis@ciena.com</eref> for the valuable discussions and his confirmation of the
modelling requirements.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Ahmed Elhassany">
        <organization>Swisscom</organization>
        <address>
          <email>Ahmed.Elhassany@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
