<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-12" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-12"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>TIM</organization>
      <address>
        <email>fabio.peruzzini@telecomitalia.it</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="05"/>
    <area>Routing</area>
    <workgroup>Traffic Engineering Architecture and Signaling</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 122?>

<t>This document considers the applicability of Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration
(POI) in the context of IP/MPLS and optical internetworking. It
identifies the YANG data models defined by the IETF to support this
deployment architecture and specific scenarios relevant to Service
Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology (packet over optical) scenario with a specific focus on
the MPI (Multi-Domain Service Coordinator to Provisioning Network
Controllers Interface)in the ACTN architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 136?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The complete automation of the management and control of Service
Providers transport networks (IP/MPLS, optical, and microwave
transport networks) is vital for meeting emerging demand for high-bandwidth use cases, including 5G and fiber connectivity services.
The Abstraction and Control of TE Networks (ACTN) architecture and
interfaces facilitate the automation and operation of complex optical
and IP/MPLS networks through standard interfaces and data models.
This allows a wide range of network services that can be requested by
the upper layers fulfilling almost any kind of service level
requirements from a network perspective (e.g. physical diversity,
latency, bandwidth, topology, etc.)</t>
      <t>Packet Optical Integration (POI) is an advanced use case of traffic
engineering. In wide-area networks, a packet network based on the
Internet Protocol (IP), and often Multiprotocol Label Switching
(MPLS) or Segment Routing (SR), is typically realized on top of an
optical transport network that uses Dense Wavelength Division
Multiplexing (DWDM)(and optionally an Optical Transport Network
(OTN)layer).</t>
      <t>In many existing network deployments, the packet and the optical
networks are engineered and operated independently. As a result,
there are technical differences between the technologies (e.g.,
routers compared to optical switches) and the corresponding network
engineering and planning methods (e.g., inter-domain peering
optimization in IP, versus dealing with physical impairments in DWDM,
or very different time scales). In addition, customers needs can be
different between a packet and an optical network, and it is not
uncommon to use other vendors in both domains. The operation of these
complex packet and optical networks is often siloed, as these
technology domains require specific skill sets.</t>
      <t>The packet/optical network deployment and operation separation are
inefficient for many reasons. First, both capital expenditure (CAPEX)
and operational expenditure (OPEX) could be significantly reduced by
integrating the packet and the optical networks. Second, multi-technology
online topology insight can speed up troubleshooting (e.g., alarm
correlation) and network operation (e.g., coordination of maintenance
events), and multi-technology offline topology inventory can improve
service quality (e.g., detection of diversity constraint violations).
Third, multi-technology traffic engineering can use the available network
capacity more efficiently (e.g., coordination of restoration). In
addition, provisioning workflows can be simplified or automated
across layers (e.g., to achieve bandwidth-on-demand or to perform
activities during maintenance windows).</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using RSVP-TE-based or SR-TE-based, forwarding plane mechanisms.</t>
      <t>The ACTN framework enables the complete multi-technology and multi-vendor
integration of packet and optical networks through a Multi-Domain
Service Coordinator (MDSC), and packet and optical Provisioning
Network Controllers (PNCs).</t>
      <t>This document describes critical scenarios for POI from the packet
service layer perspective and identifies the required coordination
between packet and optical layers to improve POI deployment and
operation. These scenarios focus on multi-domain packet networks
operated as a client of optical networks.</t>
      <t>This document analyses the case where the packet networks support
multi-domain TE paths. The optical networks could be either a DWDM
network, an OTN network (without DWDM layer), or a multi-layer
OTN/DWDM network. Furthermore, DWDM networks could be either fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the level of standardization and the possible gaps will
help assess the feasibility of integration between packet and optical
DWDM domains (and optionally OTN layer) in an end-to-end multi-vendor
service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from CE to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>The PE to PE configuration, including both the network service
layer (VRFs, RT import/export policies configuration) and the
network transport layer (e.g. RSVP-TE LSPs). This includes the
configuration (on the PE side) of the interface towards the CE
(e.g. VLAN, IP address, routing protocol etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>short for "switching technology domain", defined as "region" in <xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>part of the network under control of a single PNC instance. It is subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A physical or logical entity that transmits and receives traffic.</t>
          </dd>
          <dt>Link:</dt>
          <dd>
            <t>An association between two interfaces that can exchange traffic directly.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between between two Ethernet interfaces on logically adjacent IP routers, which is supported by an underlay tunnel in a different technology domain.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between an Ethernet interface on an IP router and an Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between between two Ethernet interfaces on physically adjacent IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between between two Ethernet interfaces on physically adjacent IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between between two Ethernet interfaces on logically adjacent IP routers that belong to the same P-PNC domain, which is supported by supported by two cross-technology Ethernet links and an optical tunnel in between.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document analyses several deployment scenarios for Packet and
Optical Integration (POI) in which ACTN hierarchy is deployed to
control a multi-technology and multi-domain network with two optical
domains and two packet domains, as shown in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, defined in <xref target="RFC8453"/>, is used to control this
multi-technology and multi-domain network where each Packet PNC (P-PNC) is
responsible for controlling its packet domain and where each Optical
PNC (O-PNC) in the above topology is responsible for controlling its
optical domain. The packet domains controlled by the P-PNCs can be
Autonomous Systems (ASes), defined in <xref target="RFC1930"/>, or IGP areas, within
the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The MDSC is responsible for coordinating the whole multi-domain
multi-technology (packet and optical) network. A specific standard
interface (MPI) permits MDSC to interact with the different
Provisioning Network Controller (O/P-PNCs).</t>
      <t>The MPI interface presents an abstracted topology to MDSC, hiding
technology-specific aspects of the network and hiding topology
details depending on the policy chosen regarding the level of
abstraction supported. The level of abstraction can be obtained based
on P-PNC and O-PNC configuration parameters (e.g., provide the
potential connectivity between any PE and any BR in a packet
network).</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries between the packet and optical domains are
congruent. In other words, one optical domain supports
connectivity between IP routers in one and only one packet domain;</t>
        </li>
        <li>
          <t>There are no inter-domain physical links between optical domains.
Inter-domain physical links exist only:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links within
this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Although the new optical technologies (e.g., QSFP-DD ZR 400G) allow
the operators to provide DWDM pluggable interfaces on the IP routers,
the deployment of those pluggable optics is not yet widely adopted.
The reason is that most operators are not yet ready to manage packet
and optical networks in a single unified domain. Therefore, a unified
use case analysis is outside the scope of this document.</t>
      <t>This document analyses scenarios where all the multi-technology IP links,
supported by the optical network, are intra-domain (intra-AS/intra-area), such as PE-BR, PE-P, BR-P, P-P IP links. Therefore the inter-domain IP links are always single-technology links supported by Ethernet
physical links.</t>
      <t>The analysis of scenarios with multi-technology inter-domain IP links is
outside the scope of this document.</t>
      <t>Therefore, if inter-domain links between the optical domains exist,
they would be used to support multi-domain optical services, which
are outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated ROADM functions and with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for multi-domain and multi-technology
coordination across multiple packet and optical domains and provides
multi-layer/multi-domain L2/L3 VPN network services requested by an
OSS/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service- and network-related functions are collapsed into a
single, monolithic implementation, dealing with the end customer
service requests received from the CMI (Customer MDSC Interface)
and adapting the relevant network models. An example is represented
in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation can choose to split the service-related and the
network-related functions into different functional entities, as
described in <xref target="RFC8309"/> and in section 4.2 of <xref target="RFC8453"/>. In this
case, MDSC is decomposed into a top-level Service Orchestrator,
interfacing the customer via the CMI, and into a Network
Orchestrator interfacing at the southbound with the PNCs. The
interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation can choose to split the MDSC functions
between an "higher-level MDSC" (MDSC-H) responsible for packet and
optical multi-technology coordination, interfacing with one Optical
"lower-level MDSC" (MDSC-L), providing multi-domain coordination
between the O-PNCs and one Packet MDSC-L, providing multi-domain
coordination between the P-PNCs (see for example Figure 9 of
<xref target="RFC8453"/>).</t>
          </li>
          <li>
            <t>Another implementation can also choose to combine the MDSC and the
P-PNC functions.</t>
          </li>
        </ol>
        <t>In the current service provider's network deployments, at the North
Bound of the MDSC, instead of a CNC, typically, there is an
OSS/Orchestration layer. In this case, the MDSC would implement only
the Network Orchestration functions, as in <xref target="RFC8309"/> described in
point 2 above. Therefore, the MDSC deals with the network services
requests received from the OSS/Orchestration layer.</t>
        <t>The functionality of the OSS/Orchestration layer and the interface
toward the MDSC are usually operator-specific and outside the scope
of this draft. Therefore, this document assumes that the
OSS/Orchestrator requests the MDSC to set up L2/L3 VPN network
services through mechanisms outside this document's scope.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS/Orchestration layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates them to perform multi-layer/multi-domain
optimizations and/or maintenance activities (e.g. rerouting LSPs
with their associated services when putting a resource, like a
fibre, in maintenance mode during a maintenance window).
Unlike service fulfillment, these workflows are not related to a
network service provisioning request received from
the OSS/Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document analyses the use cases where multi-layer coordination
is triggered by a network service request received from the
OSS/Orchestration layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-LU (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document analyses the inter-domain TE options for which the TE
tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, could be used at the MPI for
intra-domain or inter-domain TE configuration. The analysis of other
options is outside the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms (in the case of inter-domain SR-TE,
the binding SID) are used for the inter-domain TE path stitching;</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> uses technology-specific local protection mechanisms (such as Fast Reroute (FRR) in case of MPLS-TE or Topology Independent Loop-free Alternate Fast Reroute (TI-LFA) in case of SR-TE), with the awareness of multi-technology TE path properties (e.g., SRLG).</t>
            </li>
          </ul>
          <t>In the case of inter-domain TE-paths, it is also assumed that each
packet domain in <xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> implements the same TE
technology, and the stitching between two domains is done using
inter-domain TE.</t>
          <t>In this scenario, one of the key MDSC functions is to identify the
multi-domain/multi-layer TE paths to be used to carry the L2/L3 VPN
traffic between PEs belonging to different packet domains and to
relay this information to the P-PNCs, to ensure that the PEs'
forwarding tables (e.g., VRF) are properly configured to steer the
L2/L3 VPN traffic over the intended multi-domain/multi-layer TE
paths.</t>
          <t>The selection of the TE path should take into account the TE
requirements and the binding requirements for the L2/L3 VPN network
service.</t>
          <t>In general, the binding requirements for a network service (e.g.,
L2/L3 VPN) can be summarized within three cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The customer is asking for VPN isolation to dynamically create
and bind tunnels to the service so that they are not shared by
other services (e.g. VPN).  </t>
              <t>
The level of isolation can be different:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>Hard isolation with deterministic latency means L2/L3 VPN
requires a set of dedicated TE Tunnels (neither sharing
with other services nor competing for bandwidth with other
tunnels), providing deterministic latency performances</t>
                </li>
                <li>
                  <t>hard isolation but without deterministic characteristics</t>
                </li>
                <li>
                  <t>Soft isolation means the tunnels associated with L2/L3 VPN
are dedicated to that but can compete for bandwidth with
other tunnels.</t>
                </li>
              </ol>
            </li>
            <li>
              <t>The customer does not ask for isolation and could request a VPN
service where associated tunnels can be shared across multiple
VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document analyses scenarios where only one TE path is used to
carry the VPN traffic between PEs. Scenarios, where multiple parallel
TE paths are used in load-balancing to carry the VPN traffic between
PEs, are possible but their analysis is outside the scope of this
document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When a new TE path needs to be setup, the MDSC is also responsible
for coordinating the multi-layer/multi-domain path computation.</t>
          <t>Depending on the knowledge that MDSC has of the topology and
configuration of the underlying network domains, three approaches for
performing multi-layer/multi-domain path computation are possible:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC has an abstracted
TE topology view of all of its packet and optical, underlying
domains.  </t>
              <t>
In this case, the MDSC does not have enough TE topology
information to perform multi-layer/multi-domain path computation.
Therefore the MDSC delegates the P-PNCs and O-PNCs to perform
local path computation within their respective controlled domains.
Then, it uses the information returned by the P-PNCs and O-PNCs to
compute the optimal multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue to P-PNC, which does not have the
capability of performing a single-domain/multi-layer path
computation, since it can not retrieve the topology information
from the O-PNCs nor delegate the O-PNC to perform optical path
computation.  </t>
              <t>
A possible solution could include a CNC function within the P-PNC
to request the MDSC multi-domain optical path computation, as
shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could be to rely on the MDSC recursive hierarchy,
as defined in section 4.1 of <xref target="RFC8453"/>, where, for each IP and
optical domain pair, a "lower-level MDSC" (MDSC-L) provides the
essential multi-layer correlation and the "higher-level MDSC"
(MDSC-H) provides the multi-domain coordination.
In this case, the MDSC-H can get an abstract view of the
underlying multi-layer domain topologies from its underlying MDSC-L. Each MDSC-L gets the full view of the IP domain topology from
P-PNC and can get an abstracted view of the optical domain
topology from its underlying O-PNC. In other words, topology
abstraction is possible at the MPIs between MDSC-L and O-PNC and
between MDSC-L and MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC then has only the capability of performing multi-domain/single-layer path computation for the packet layer (the
path can be computed optimally for the two packet domains).  </t>
              <t>
Therefore, the MDSC still needs to delegate the O-PNCs to perform
local path computation within their respective domains. It uses
the information received by the O-PNCs and its TE topology view of
the multi-domain packet layer to perform multi-layer/multi-domain
path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such case MDSC has all the information needed to perform multi-domain/multi-layer path computation, without relying on PNCs.  </t>
              <t>
This approach may present, as a potential drawback, scalability
issues and, as discussed in section 2.2. of <xref target="I-D.ietf-teas-yang-path-computation"/>,
performing path computation for optical networks in the MDSC is
quite challenging because the optimal paths depend also on
vendor-specific optical attributes (which may be different in the
two domains if different vendors provide them).</t>
            </li>
          </ol>
          <t>This document analyses scenarios where the MDSC uses the partial
summarization approach to coordinate multi-domain/multi-layer path
computation.</t>
          <t>Typically, the O-PNCs are responsible for the optical path
computation of services across their respective single domains.
Therefore, when setting up the network service, they must consider
the connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may affect the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, used by the O-PNC for optical path
computation are not exposed at the MPI and therefore out of scope for
this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an IGP area
or an Autonomous System (AS) within the same operator network, is
controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for setting up the TE paths between any two
PEs or BRs in their respective controlled domains, as requested by
MDSC,  and providing topology information to the MDSC.</t>
        <t>For example, for inter-domain SR-TE, the setup bidirectional SR-TE
path from PE13 in domain 1 to PE23 in domain 2, as shown in <xref target="fig-vpn-path"/>,
requires the MDSC to coordinate the actions of:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1 to push a SID list to PE13 including the Binding SID
associated to the SR-TE path in Domain 2 with PE23 as the target
destination (forward direction);</t>
          </li>
          <li>
            <t>P-PNC2 to push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1 with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are then responsible:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer single-domain local TE path computation,
when requested by MDSC between two PEs (for single-domain end-to-end TE path) or between PEs and BRs for an inter-domain TE path
selected by MDSC;</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
of the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting the setup of a new TE path, the MDSC provides the P-PNCs with the explicit path to be created or modified. In other
words, the MDSC can communicate to the P-PNCs the complete list of
nodes involved in the path (strict mode). In this case, the P-PNC is
just responsible to set up that explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide P-PNC a
loose path, together with per-domain TE constraints. The P-PNC can
then select the complete path within its domain.</t>
        <t>In such a case, it is mandatory that P-PNC signals back to the MDSC
which path it has chosen so that the MDSC keeps track of the relevant
resources utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC touches
PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two paths with
the same topology metric, e.g. BR21 - P24 - PE23 and BR21 - BR22 - PE23, but with different loads. It may prefer to steer the traffic on
the latter because it is less loaded.</t>
        <t>For the purposes of this document it is assumed that the MDSC always
provides the explicit list of all the hops to the P-PNCs to setup or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination is
done by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>provide to the MDSC an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation, when requested by
the MDSC;</t>
          </li>
          <li>
            <t>perform optical tunnel setup, when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by O-PNC to perform intra-domain topology
discovery and path setup are usually vendor-specific and outside the
scope of this document.</t>
        <t>Depending on the type of optical network, TE topology abstraction,
path computation and path setup can be single-layer (either OTN or
WDM) or multi-layer OTN/WDM. In the latter case, the multi-layer
coordination between the OTN and WDM layers is performed by the
O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all the MPI
interfaces, between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation defined in <xref target="RFC7951"/>, is assumed to be used at these
interfaces. In addition, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to be compliant with Network Management Datastore
Architecture (NMDA) defined in <xref target="RFC8342"/>, are assumed to be used as
well at these MPI interfaces and also at MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models that are applicable to
the Packet and Optical MPIs. Some of these YANG data models can be
optional depending on the specific network configuration detailed
in <xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module defined
in <xref target="RFC8525"/> is used to allow the MDSC to discover the set of YANG
modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology" YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All the common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>,
which augments the TE Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the "ietf-flexi-grid-topology" YANG module of <xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC uses can use the following client signal YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service" YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the "ietf-eth-tran-service" YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet" YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping" YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping" YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface.  The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are some of the key extensions that
enable the use of PCE/PCEP for ACTN.</t>
        <t>Since the PCEP supports path computation in the packet and optical
networks, PCEP is well suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> states the H-PCE applicability for inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that the PCEP can be used in conjunction with the YANG data
models described in the rest of this document. Depending on whether
ACTN is deployed in a greenfield or brownfield, two options are
possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface towards each PNC to
discover all the TE information and request TE tunnels. It may
perform full multi-layer path computation or delegate path
computation to the underneath PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. We need only one type of
interface (RESTCONF) and use the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MSDC needs to discover through the underlying
PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of their equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest level LTPs in the topology view and
corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and <xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM equipment).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layers alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in <xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs, the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: once CBR client LTP is reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/> for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X and Y are
used to associated the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In case of a multi-layer DWDM/OTN network domain, multi-layer intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in <xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>, associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in <xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship between the IP network
topology and the MPLS-TE network topology depends on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links, inter-domain
Ethernet links or access links, as described in detail in <xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as LLDP <xref target="IEEE_802.1AB"/>, which are
outside the scope of this document, and reported at the MPIs within
the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>We assume that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/> should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an an IP domain and an adjacent optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>More detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other options are possible but not described in this document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the encoding of the plug-id namespace and the
specific LLDP information reported within the plug-id value, such as
the Chassis ID and Port ID mandatory TLVs, is implementation specific
and needs to be consistent across all the PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers: it is therefore more
viable for inter-domain Ethernet links. For the cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable
when possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>
and the optical nodes snoop the LLDP packets received from the
local Ethernet interface and report to the O-PNCs the extracted
information, such as the Chassis ID, the Port ID, System Name TLVs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and does not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching the plug-id
values of the two LTPs reported by two adjacent O-PNC and P-PNC: in
case LLDP snooping is used, the P-PNC reports the LLDP information
sent by the corresponding Ethernet interface on the IP router while the
O-PNC reports the LLDP information received by the corresponding
Ethernet interface on the optical node, e.g., between LTP 5-0 on PE13
and LTP 7-0 on NE11, as shown in <xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating a cross-technology Ethernet link
is reported by an O-PNC in the Ethernet topology or in the OTN
topology model or in both models, depending on the type of
corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet links is based
only on the LLDP information sent by the Ethernet interfaces of the
routers and snooped by the Ethernet interfaces of the optical nodes.
Therefore the MDSC can discover these links also before optical
paths, supporting overlay multi-technology IP links, are setup.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link which supports an
inter-domain IP link, by matching the plug-id values of the two
Ethernet LTPs reported by the two adjacent P-PNCs: the two P-PNCs
report the LLDP information being sent and being received from the
corresponding Ethernet interfaces, e.g., between the Ethernet LTP 3-1
on BR11 and the Ethernet LTP 4-1 on BR21 shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface on
an IP router terminates a cross-technology Ethernet link or an inter-domain Ethernet
link, it has to report at the MPI two Ethernet LTPs representing the
same Ethernet interface, e.g., both the Ethernet LTP 3-0 and the
Ethernet LTP 3-1, supported by LTP 3-0, shown in <xref target="fig-inter-domain-link"/>:</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) is used to represent the physical adjacency between the
Ethernet interface on an IP router and the Ethernet interface on its physically adjacent node,
which can be either an IP router
(in case of a single-technology Ethernet link) or an optical
node (in case of a multi-technology Ethernet link).
Therefore, as described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information
sent by the corresponding Ethernet interface on the IP router; such as the
{BR11,3} and {BR21,4} plug-id values reported, respectively, by
the Ethernet LTP 3-0 on BR11 and by the Ethernet LTP 4-0 on BR21,
as shown in <xref target="fig-inter-domain-link"/>;</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g., LTP 3-0 in
BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to discover the logical
adjacency between the Ethernet interfaces on IP routers, which can be either
single-technology or multi-technology. Therefore, the P-PNC reports, within
the plug-id attribute of this LTP, the LLDP information sent and
received by the corresponding Ethernet interface on the IP router; such as
the {BR11,3,BR21,4} plug-id values reported by the Ethernet LTP 3-1 on BR11 and by the Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in case of an inter-domain Ethernet links, the MDSC cannot discover, using the LLDP
information reported in the plug-id attributes, the physical
adjacency between the two Ethernet interfaces on physically adjacent IP routers, because these
two plug-id values do not match, such as the plug-id values {BR11,3}
and {BR21,4} shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms which are outside the scope of this document, that the
Ethernet interfaces on the IP routers either terminates a cross-technology
link or a single-technology (intra-domain or inter-domain) Ethernet link,
e.g., as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTPs when it
knows, by mechanisms which are outside the scope of this document,
that the corresponding Ethernet interfaces terminate inter-domain Ethernet links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs that are supported by the two Ethernet LTPs terminating an
inter-domain Ethernet link, discovered as described in <xref target="ip-inter-domain-link-discovery"/>,
e.g., between the IP LTP 3-2 on BR21 and the IP LTP 4-2 on BR22,
supported respectively by the Ethernet LTP 3-1 on BR11 and by the
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in <xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in <xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0 on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in <xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in case of an intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency
between the two Ethernet interfaces on physically adjacent IP routers,
because the two plug-id values do
not match, such as the plug-id values {PE13,1} and {P16,2} shown in
<xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical intra-domain
Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0 on P16, as
shown in <xref target="fig-intra-domain-link"/>, if it knows a priori, using mechanisms which are
outside the scope of this document, that all the Ethernet interfaces
on the IP routers either terminates a cross-technology or a single-technology
(intra-domain or inter-domain) Ethernet link, e.g., as shown in
<xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
by mechanisms which are outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of the LAG groups within
its domain and report each intra-domain LAG as an Ethernet bundle
link, within the Ethernet topology exposed at the MPI.</t>
        <t>This is done bundling multiple single-domain Ethernet links, as shown
in <xref target="fig-lag"/>. For example, the Ethernet bundled link between the
Ethernet LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24, is built
from the Ethernet links setup respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and multi-technology intra-domain LAG link is the same (the only difference being
whether the bundled links are single-technology or multi-technology).</t>
        <t>Instead, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document since they do not imply any cross-technology
coordination between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the P-PNC to
discover the configuration of the LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>However, it is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP
can be configured on a LAG group (Aggregated Port) and/or on any
number of its LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP session
configured at LAG member (Aggregation Port)level and another one for
the LLDP session configured at LAG group (Aggregated Port)level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in <xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>The are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but have not enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>;, and that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 has not enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
            <li>
              <t>a new multi-domain TE path needs to be setup between PE13 and
 PE23, e.g., either because existing TE paths between PE13 and
 PE23 are not able to meet the TE and binding requirements of
 the L2/L3 VPN service or because there is no TE path between
 PE13 and PE23.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial summarization, the MDSC
will use the TE topology information provided by the P-PNCs and the
results of the path computation requests sent to the O-PNCs, as
described in <xref target="optical-path-computation"/>, to compute the multi-layer/multi-domain
path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When the setup of the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration required to realize the
request network service across the appropriate optical and packet
domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of Equal Cost Multi-Path (ECMP), between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to setup a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain this
new TE path to use the new underlay optical tunnel setup between BR21
and P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to setup the requested path and returns
to the MDSC the information which is needed for multi-domain TE path
stitching. For example, in case of inter-domain SR-TE, the P-PNC2,
knowing the node and the adjacency SIDs assigned within its domain,
can install the proper SR policy, or hierarchical policies, within
BR21 and returns to the MDSC the binding SID it has assigned to this
policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to setup a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain this new TE
path to use the new underlay optical tunnel setup between PE13 and
BR11, specifying also which inter-domain link should be used to send
traffic to BR21 and the information to be used for the multi-domain
TE path stitching, as described in <xref target="te-path-discovery"/> (e.g., in case of
inter-domain SR-TE, the binding SID  that has been assigned by P-PNC2
to the corresponding SR policy in BR21). The P-PNC1 properly
configures the routers within its domain to setup the requested path
and the multi-domain TE path stitching. For example, in case of
inter-domain SR-TE, the P-PNC1, knowing also the node and the
adjacency SIDs assigned within its domain and the EPE SID assigned by
P-PNC1 to the inter-domain link between BR11 and BR21, and the
binding SID assigned by P-PNC2, installs the proper policy, or
policies, within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, setup/modified,
the MDSC can request to both P-PNCs to configure the L3VPN and its
binding with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, the optical path computation is
usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate the O-PNC for single-domain optical path computation.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/> and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its
underlay optical tunnel. Therefore, the properties of an optical path
between two optical TTPs, as computed by the O-PNC, can be used by
the MDSC to infer the properties of the associated multi-layer
single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two options to request an
O-PNC to perform optical path computation: either via a "compute-only" TE tunnel path, using the generic TE tunnel YANG data model
defined in <xref target="I-D.ietf-teas-yang-te"/> or via the path computation RPC defined in
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one relationship
between a multi-technology intra-domain IP link and its underlay optical
tunnel.</t>
        <t>Therefore, to setup a new multi-technology intra-domain IP link, the MDSC
requires the O-PNC to setup the  optical tunnel (using either the WDM
Tunnel model or the OTN Tunnel model, if the optional OTN switching
is supported) within the optical network and to steer the client
traffic between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based
transport) or the Transparent CBR Client Signal Model (for
transparent transport).</t>
        <t>For example, with a reference to <xref target="fig-multi-technology-link-2"/>, the MDSC can request the
O-PNC1 to setup an optical tunnel between the optical TTPs (7) on
NE11 and (8) on NE12 and to steer over this tunnel the client traffic
between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of <xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been setup and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, which are
outside the scope of this document, is used between the adjacency
between the two IP routers' ports, the P-PNC can automatically discover
the underlay multi-technology single-domain Ethernet link being set up by
the MDSC and report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if there are no automatic discovery mechanisms, the MDSC
can configure this multi-technology single-domain Ethernet link at the MPI
of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., the LTP 5-1 on PE13 and
6-1 on BR11 shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been configured
by the MDSC or discovered by the P-PNC, the corresponding multi-technology
single-domain IP link can also be configured either by the MDSC or by
the P-PNC.</t>
        <t>This document assumes that this IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology single-domain Ethernet link is either discovered by the P-PNC or configured
by the MDSC at the MPI. However, if LAG is supported the P-PNC has
not enough information to know whether the discovered/configured
multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>Therefore the P-PNC does not take any further action after a multi-technology single-domain Ethernet link is discovered or configured by the
MDSC at the MPI.</t>
        <t>The MDSC can request the P-PNC to configure a new multi-technology single-domain IP link, supported by the the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All the other configuration
is provided by the P-PNC.</t>
        <t>For example, with a reference to <xref target="fig-multi-technology-link-2"/>, the MDSC can request the
P-PNC1 to setup a multi-technology single-domain IP Link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11 supported by the multi-technology single-domain Ethernet link between ETH LTP 5-1 on PE13 and ETH LTP 6-1 on
BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain IP link
and, once finished, reports it to the MDSC within the IP topology
exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates at the MPI a new Ethernet bundled link (using the
bundled-link container defined in <xref target="RFC8795"/>) bundling the multi-technology
single-domain Ethernet link(s) being created, as described above.</t>
          <t>When a new LAG link is created, it is also recommended to configure
the minimum number of active member links required to consider the
LAG link as being up. For example, a LAG link with three members can
be considered up when only one member link fails and down when at
least two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/> and this is identified as a
gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup an Ethernet bundled link between the Ethernet LTP 5-1
on BR21 and the Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between the Ethernet LTP 1-1 on BR21 and
the Ethernet LTP 2-1 on P24.</t>
          <t>It is worth noting that the MDSC needs to create also the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology single-domain IP link, supported by the the just configured Ethernet bundled
link, following the same procedure described in <xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP 5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates at the MPI the configuration of an existing Ethernet bundled
link adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as
being up may also need to be updated.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to add the multi-technology single-domain Ethernet link setup
between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on P24
to the existing Ethernet bundle link setup between the Ethernet LTP
5-1 on node BR21 and the Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also
update the bandwidth information of the multi-technology single-domain IP
link supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This version of the draft assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the <xref target="I-D.ietf-teas-yang-te"/>
model to request the P-PNC to set it up, properly specifying
the path constraints, such as the explicit path, to force the P-PNC
to setup an TE path that meets the end-to-end TE and binding
constraints and uses the optical tunnels setup by the MDSC for the
purpose of supporting this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the <xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>[Editor's Note:] Add some text about the protection options (to
further discuss whether to put this text here or in <xref target="multi-technology-link-setup"/>).</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms. For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case of MPLS-TE domain or the TI-LFA local protection, as defined in <xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The  mechanisms to request the configuration TI-LFA local protection for SR-TE paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list of TE tunnel(s) that should be used
to forward L2/L3 VPN traffic between the two PEs terminating the
listed TE tunnel(s). If the list contains more than one TE tunnel for
the same pair of PEs, these TE tunnels are used for load balancing
the associated L2/L3 VPN traffic between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic, between multiple TE
tunnels for the same PEs pair, in a different way than load balancing
is identified as a gap requiring further work and outside of the
scope of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document has shown that the IETF YANG
models described in 3.2 provides useful support for Packet Optical
Integration (POI) scenarios for resource discovery (network topology,
service, tunnels and network inventory discovery) as well as for
supporting multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>Few gaps have been identified to be addressed by the relevant IETF
Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;.</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in <xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks: this gap has been
identified in <xref target="optical-path-computation"/> and the solution in <xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between a common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links and the
UNI topology discover mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of <xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that
being able to use WSON and Flexi-grid topology models together
(through multi-inheritance) is not only useful in cases of mixed
fixed-grid and flexible-grid DWDM network topology but also the only
viable option in case of a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would support also optical tunnel setup in case of a
mixed CWDM and DWDM network topology.</t>
      <t>Although not analysed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs also to be enhanced to
support scenarios where multiple parallel TE paths are used in load-balancing to carry the traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to discover the intra-domain Ethernet and IP links. While LLDP provides valuable information for network management and troubleshooting, it also presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP packets could be captured using a packet sniffer. An attacker can leverage this information to gain insights into the network topology, device types, and configurations, which could be used for further attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device types, software versions, and network configuration details. This might help an attacker identify vulnerable devices or configurations that can be exploited to gain unauthorized access or escalate privileges within the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device, they could manipulate LLDP information to advertise false device information, leading to potential misconfigurations or trust relationships being exploited. This can disrupt network operations or redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP packets, an attacker could overwhelm network devices or management systems, potentially leading to a denial of service where legitimate network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other network devices. Potentially, this might lead to incorrect network mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for authenticating the source of LLDP messages, which means that devices accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known vulnerabilities that could be exploited through information gathered via LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for automating the management and control of multi-layer Service Providers' transport networks, combining the optical and microwave transport layer with the packet (IP/MPLS) layer to create a more efficient and scalable network infrastructure. This approach is particularly beneficial for Service Providers and large enterprises dealing with high bandwidth demands and looking for cost-effective ways to expand their networks. However, integrating these two traditionally separate network layers involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of integration between the packet and optical layers is critical. Furthermore, this includes determining whether to pursue a loose integration (keeping layers distinct but coordinated) or a tight integration (combining layers more closely, potentially at the hardware level) coordinated via the MDSC. Accurate forecasting and planning will also be essential to ensure that the integrated ACTN infrastructure can handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various vendors. Ensuring that packet and optical devices can interoperate seamlessly and the PNCs can manage them is crucial for a successful integration. The Service Provider must also check with the vendors to ensure they support the IETF-based technologies outlined in this document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require comprehensive monitoring solutions that can provide visibility to the PNCs across both packet and optical layers. Identifying and diagnosing issues may become more complex with integrated layers. Telemetry data may also be required to collect lower-layer networking health and consider network and service performance. This topic is further discussed in [ACTN Assurance];</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient, including considerations for automatic protection switching and fast reroute mechanisms that span both layers. Fault isolation and recovery may become more challenging, as issues in one layer can have cascading effects on the other. Effective fault management strategies must be in place to quickly identify and rectify such issues. This topic is further discussed in [ACTN Assurance];</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="2" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-36"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="14" month="February" year="2024"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-22"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="12" month="April" year="2024"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-06"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="29" month="January" year="2024"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-16"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-19"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="1" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-01"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>OTN Tunnel YANG Model</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="6" month="June" year="2024"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-21"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="29" month="January" year="2024"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-12"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="23" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-17"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="18" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-00"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="July" year="2024"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for WSON, while it is known as Impairment-Aware Routing and Spectrum
   Assignment (IA-RSA) for SSON.

   This document provides a YANG data model for the impairment-aware TE
   topology in optical networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-16"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resource and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-15"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="19" month="April" year="2024"/>
            <abstract>
              <t>   This document describes how profiles of the Traffic Engineering (TE)
   Topology Model, defined in RFC8795, can be used to address
   applications beyond "Traffic Engineering".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-01"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="29" month="June" year="2024"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP-FRR concepts being LFAs,
   remote LFAs (RLFA), and remote LFAs with directed forwarding (DLFA).
   It extends these concepts to provide guaranteed coverage in any two-
   connected networks using a link-state IGP.  A key aspect of TI-LFA is
   the FRR path selection approach establishing protection over the
   expected post-convergence paths from the point of local repair,
   reducing the operational need to control the tie-breaks among various
   FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-16"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-01"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="1" month="March" year="2024"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-03"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2506?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Acess, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually operator-specific, typically it would be using a RESTCONF/YANG interface with
a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>, whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from a
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model <xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must reroute IP traffic before the events takes place. It should
be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since a IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the tranponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>Previous versions of document were prepared using 2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="" surname="TBD" fullname="TBD">
        <organization/>
        <address>
      </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="Y." surname="Lee" fullname="Young Lee">
        <organization>Sung Kyun Kwan University</organization>
        <address>
          <email>younglee.tx@gmail.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Apstra</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
