<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-14" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-14"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>TIM</organization>
      <address>
        <email>fabio.peruzzini@telecomitalia.it</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="25"/>
    <area>Routing</area>
    <workgroup>Traffic Engineering Architecture and Signaling</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 124?>

<t>This document explores the applicability of the Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration (POI)
within the context of IP/MPLS and optical internetworking. It examines
the YANG data models defined by the IETF that enable an ACTN-based
deployment architecture and highlights specific scenarios pertinent
to Service Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology scenario (packet over optical), particularly
emphasising the Multi-Domain Service Coordinator to Provisioning
Network Controller Interface (MPI) within the ACTN architecture</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 138?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The full automation of management and control for Service Providers'
transport  networks, spanning IP/MPLS, optical, and microwave
technologies, is crucial to addressing customer demands for high-bandwidth
applications, such as ultra-fast  mobile broadband for 5G and fiber
connectivity services. The Abstraction and  Control of TE Networks (ACTN)
architecture and interfaces enable the automation  and efficient
operation of complex optical and IP/MPLS networks using standardized
interfaces and data models. This approach supports a broad spectrum of
network services that can be requested by upper-layer applications,
meeting diverse  service-level requirements from a network perspective,
such as physical diversity, latency, bandwidth, and topology.</t>
      <t>Packet Optical Integration (POI) represents an advanced application of
traffic engineering. In wide-area networks, packet networks based on the
Internet Protocol (IP), often augmented with Multiprotocol Label
Switching (MPLS) or Segment Routing  (SR), are typically implemented over
an optical transport network utilizing Dense Wavelength Division
Multiplexing (DWDM), occasionally with an optional Optical Transport
Network (OTN) layer.</t>
      <t>There are significant technical differences between the packet and optical technologies
(e.g., routers versus optical switches) and their associated network engineering
and planning approaches (e.g., inter-domain peering optimization in IP
networks versus managing physical impairments in DWDM systems or
operating on vastly different time scales). Additionally, customer
requirements often differ between packet and optical networks, and it is
common for Service Providers to use different vendors for each domain. As
a result, the operation of these complex packet and optical networks is
often siloed, as each technology domain requires specialized skill sets.</t>
      <t>As a consequence, in many existing network deployments, packet and optical networks are engineered and operated independently.</t>
      <t>This separation is inefficient for several reasons.
Firstly, integrating packet and optical
networks can significantly reduce capital expenditures (CAPEX) and
operational expenditures (OPEX).
Secondly, multi-technology topology insights can optimize troubleshooting (e.g., alarm correlation) and enhance network operation (e.g., coordination of maintenance events). Additionally, detailed inventory and planning information can also improve service assurance quality, such as detecting constraint violations or lack of resource diversity.
Thirdly, multi-technology traffic engineering enables more efficient use of
available network capacity (e.g., coordination of restoration).
Furthermore, provisioning workflows can be simplified or automated across
layers, facilitating capabilities such as bandwidth-on-demand and
streamlined maintenance activities.</t>
      <t>The ACTN framework facilitates seamless integration of packet and optical
networks across multiple technologies and vendors.
This is achieved through separated Provisioning Network Controllers (PNCs) for both packet and optical domains,
which hide the complexities of the technical differences between the packet and optical technologies while
providing sufficient abstract information that allows the Multi-Domain Service Coordinator (MDSC)
to provide multi-layer coordination between packet and optical networks.</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using
Resource Reservation Protocol (RSVP) Traffic Engineering (TE)-based or SR
-TE-based, forwarding plane mechanisms.</t>
      <t>This document outlines key scenarios for Packet Optical Integration (POI)
from the perspective of the packet service layer and highlights the
necessary coordination between packet and optical layers to enhance POI
deployment and operation. These scenarios emphasize multi-domain packet
networks functioning as clients of optical networks.</t>
      <t>This document analyzes the scenario in which packet networks support
multi-domain TE paths. The optical networks may
consist of a DWDM network, an OTN network (without a DWDM layer), or a
multi-layer OTN/DWDM network. Additionally, DWDM networks can be either
fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the degree of standardization and identifying potential
gaps are crucial for evaluating the feasibility of integrating packet and
optical DWDM domains (with an optional OTN layer) from an end-to-end,
multi-vendor service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from Customer Edge (CE) to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>The Provider Edge (PE) to PE configuration, including both the network
service layer (VRFs, RT import/export policies configuration) and the
network transport layer (e.g. RSVP-TE Label Switched Paths (LSPs). This
includes the configuration (on the PE side) of the interface towards the
CE (e.g. VLAN, IP address, routing protocol, etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>short for "switching technology domain", defined as "region" in
<xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control
domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>part of the network under the control of a single PNC instance. It is
subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A physical or logical entity that transmits and receives traffic.</t>
          </dd>
          <dt>Link:</dt>
          <dd>
            <t>An association between two interfaces that can exchange traffic
directly.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers, supported by two cross-technology Ethernet links
interconnected through an optical tunnel.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link connecting an Ethernet interface on an IP router to an
Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers within the same P-PNC domain, supported by two
cross-technology Ethernet links interconnected through an optical tunnel.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document examines various deployment scenarios for Packet and
Optical Integration (POI), where the ACTN hierarchy is implemented to
manage a multi-technology, multi-domain network comprising two optical
domains and two packet domains, as illustrated in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, as defined in <xref target="RFC8453"/>, is utilized to manage
this multi-technology, multi-domain network. In this topology, each
Packet PNC (P-PNC) is responsible for controlling its respective packet
domain, while each Optical PNC (O-PNC) is tasked with managing its
optical domain. The packet domains controlled by the P-PNCs can represent
Autonomous Systems (ASes), as defined in <xref target="RFC1930"/>, or Interior
Gateway Protocol (IGP) areas within the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The Multi-Domain Service Coordinator (MDSC) is responsible for
orchestrating the entire multi-domain, multi-technology network,
encompassing both packet and optical domains. A standardized interface,
the Multi-Domain Service Coordinator to Provisioning Network Controller
Interface (MPI), enables the MDSC to interact with various Provisioning
Network Controllers (O-PNCs and P-PNCs).</t>
      <t>The MPI interface provides the MDSC with an abstracted topology,
concealing technology-specific details of the network and selectively
hiding topology information based on the chosen abstraction policy. The
level of abstraction is determined by the configuration parameters of the
P-PNC and O-PNC, such as offering potential connectivity information
between any Provider Edge (PE) and Border Router (BR) within a packet
network.</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries of the packet and optical domains are
congruent. In other words, each optical domain exclusively supports
connectivity between IP routers within a single packet domain.</t>
        </li>
        <li>
          <t>There are no physical links directly connecting optical domains.
Inter-domain physical links exist only under the following conditions:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links
within this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Scenarios using coherent optical interfaces on the IP routers are outside the scope of this document.</t>
      <t>This document analyzes scenarios in which all multi-technology IP links
supported by the optical network are intra-domain (intra-AS/intra-area),
such as PE-BR, PE-P, BR-P, and P-P IP links. Consequently, inter-domain
IP links are always single-technology connections, supported by
single-technology Ethernet links between physically adjacent IP routers.</t>
      <t>As described in <xref target="RFC7424"/>, in order to increase the bandwidth between two adjacent routers, multiple Ethernet links can be setup between adjacent routers using either Link Aggregation Groups (LAGs) <xref target="IEEE_802.1AX"/> or Equal Cost Multi-Path (ECMP) <xref target="RFC2991"/>.</t>
      <t>Therefore, if inter-domain links between optical domains exist, they
would be utilized to support multi-domain optical services, which fall
outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated
ROADM function with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or
without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for coordinating multiple
packet and optical domains in a multi-domain, multi-technology
environment. It facilitates multi-layer and multi-domain L2/L3 VPN
network services as requested by the OSS/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service-related and network-related functions are combined into a
single, monolithic implementation. This implementation manages
end-customer service requests received through the Customer MDSC
Interface (CMI) and adapts the corresponding network models. An example
of this architecture is illustrated in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation may opt to separate the service-related and
network-related functions into distinct functional entities, as outlined
in <xref target="RFC8309"/> and Section 4.2 of <xref target="RFC8453"/>. In this approach, the
MDSC is decomposed into a top-level Service Orchestrator, which
interfaces with the customer through the Customer MDSC Interface (CMI),
and a Network Orchestrator, which interfaces southbound with the PNCs.
The interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation may choose to split the MDSC functions into a
"higher-level MDSC" (MDSC-H) and "lower-level MDSCs" (MDSC-Ls). The
MDSC-H is responsible for multi-technology coordination across packet and
optical domains, while the MDSC-Ls handle domain-specific coordination.
Specifically, an Optical MDSC-L manages multi-domain coordination between
the O-PNCs, and a Packet MDSC-L manages multi-domain coordination between
the P-PNCs. This approach is illustrated, for example, in Figure 9 of
<xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An alternative implementation may choose to integrate the MDSC and
P-PNC functions in a single entity.</t>
          </li>
        </ol>
        <t>In current service provider network deployments, the MDSC's Northbound
Interface (NBI) typically connects to an OSS/Orchestration layer rather
than a CNC. In this scenario, the MDSC is limited to performing Network
Orchestration functions, as described in <xref target="RFC8309"/> (point 2 above).
Consequently, the MDSC handles network service requests received from the
OSS and/or Orchestration.</t>
        <t>The functionality of the OSS and/or Orchestration layer, as well as its
interface with the MDSC, is typically operator-specific and falls outside
the scope of this draft. Therefore, this document assumes that the OSS
and/or Orchestration layer requests the MDSC to provision L2/L3 VPN
network services through mechanisms not covered in this document.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS and/or Orchestration  layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates these workflows to perform multi-layer and
multi-domain optimizations and/or maintenance activities (e.g., rerouting
LSPs and their associated services when a resource, such as a fiber, is
placed in maintenance mode during a maintenance window). Unlike service
fulfilment, these workflows are not triggered by a network service
provisioning request from the OSS or Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document examines use cases in which multi-layer coordination is
initiated by a network service request from the OSS and/or Orchestration
layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke
multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one
spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-Labeled Unicast (BGP-LU) (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document explores inter-domain TE options where the TE tunnel model,
as defined in <xref target="I-D.ietf-teas-yang-te"/>, applies at the MPI for both
intra-domain and inter-domain TE configurations. The assessment of
alternative options is beyond the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms are employed for inter-domain TE path
stitching. In the case of inter-domain SR-TE, a Segment Identifier (SID)
is used in Segment Routing (SR) to define a segment (a portion of the
path) within a network. A binding SID, a special type of SID, acts as a
reference to a precomputed SR policy or path.</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> employs technology-specific
local protection mechanisms, such as Fast Reroute (FRR) for MPLS-TE or
Topology Independent Loop-Free Alternate (TI-LFA) for SR-TE. These
mechanisms operate with an awareness of the multi-technology TE path
properties, such as the Shared Risk Link Group (SRLG) path properties defined in <xref target="RFC8001"/>.</t>
            </li>
          </ul>
          <t>For inter-domain TE paths, it is assumed that each packet domain in
<xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> employs the same TE technology. The
stitching between two domains is achieved using inter-domain TE
mechanisms.</t>
          <t>In this scenario, a key function of the MDSC is to identify the
multi-domain and multi-layer TE paths for carrying L2/L3 VPN traffic
between PEs in different packet domains. The MDSC then relays this
information to the P-PNCs to ensure that the forwarding tables of the PEs
(e.g., VRF) are correctly configured, allowing the L2/L3 VPN traffic to
be routed over the designated multi-domain and multi-layer TE paths.</t>
          <t>The selection of the TE path should consider both the TE requirements and
the binding requirements of the L2/L3 VPN network service.</t>
          <t>In general, the binding requirements for a network service (e.g., L2/L3
VPN) can be categorized into three main cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The customer is asking for VPN isolation to dynamically create
and bind tunnels to the service so that they are not shared by
other services (e.g. VPN).  </t>
              <t>
The level of isolation can be different:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>Hard isolation with deterministic latency implies that the L2/L3
VPN requires a set of dedicated TE tunnels. These tunnels neither
share resources with other services, nor compete for bandwidth with
other tunnels, ensuring deterministic latency performance.</t>
                </li>
                <li>
                  <t>Hard isolation but without deterministic characteristics</t>
                </li>
                <li>
                  <t>Soft isolation means the tunnels associated with L2/L3 VPN
are dedicated to that but can compete for bandwidth with
other tunnels.</t>
                </li>
              </ol>
            </li>
            <li>
              <t>The customer does not require isolation and may request a VPN service
where the associated tunnels are shared across multiple VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document examines scenarios in which a single TE path is used to
carry VPN traffic between PEs. Scenarios involving multiple parallel TE
paths for load-balancing VPN traffic between PEs are possible but are
beyond the scope of this document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When establishing a new TE path, the MDSC is responsible for coordinating
the path computation across multiple layers and domains.</t>
          <t>Based on the MDSC's knowledge of the underlying network topology and
configuration, there are three possible approaches for multi-layer and multi-domain path
computation:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC maintains an abstracted
TE topology view of all its packet and optical underlying domains.  </t>
              <t>
In this case, the MDSC lacks sufficient TE topology information to
perform multi-layer/multi-domain path computation. It delegates the
P-PNCs and O-PNCs to compute local paths within their respective
domains, then uses the returned information to compute the optimal
multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue for the P-PNC, as it lacks the ability
to perform single-domain/multi-layer path computation. It cannot
retrieve topology information from the O-PNCs or delegate optical path
computation to the O-PNCs. A possible solution is to include a CNC
function within the P-PNC to request the MDSC for multi-domain
optical path computation, as shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could involve relying on the MDSC recursive hierarchy,
as defined in Section 4.1 of <xref target="RFC8453"/>, where each IP and optical
domain pair has a "lower-level MDSC" (MDSC-L) for multi-layer
correlation, and a "higher-level MDSC" (MDSC-H) for multi-domain
coordination.  </t>
              <t>
In this case, the MDSC-H obtains an abstract view of the underlying
multi-layer domain topologies from its MDSC-L. Each MDSC-L gets the
full IP domain topology from the P-PNC and an abstracted view of the
optical domain topology from its O-PNC. Topology abstraction occurs
at the MPIs between MDSC-L and O-PNC, as well as between MDSC-L and
MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC can then only perform multi-domain/single-layer path
computation for the packet layer, where the path can be computed
optimally for the two packet domains.  </t>
              <t>
The MDSC must still need to delegate the O-PNCs to perform local path
computation within their domains. It uses the information from the
O-PNCs and its TE topology view of the multi-domain packet layer to
perform multi-layer/multi-domain path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such a case, the MDSC has all the information needed to perform
multi-domain/multi-layer path computation without relying on PNCs.  </t>
              <t>
This approach, however, may present scalability issues. As discussed
in
Section 2.2 of <xref target="I-D.ietf-teas-yang-path-computation"/>, performing
path
computation for optical networks in the MDSC is particularly
challenging,
as optimal paths also depend on vendor-specific optical attributes,
which may vary across domains if provided by different vendors.</t>
            </li>
          </ol>
          <t>This document examines scenarios where the MDSC adopts the partial
summarization approach to enable multi-domain and multi-layer path
computation.</t>
          <t>Typically, O-PNCs are responsible for optical path computation within
their respective domains. When setting up a network service, they must
consider connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may impact the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>,
used by the O-PNC for optical path computation, are not exposed at the
MPI and therefore are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an
IGP area or an Autonomous System (AS) within the same operator network,
is controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for establishing TE paths between any two PEs
or BRs within their controlled domains, as requested by the MDSC. They
also provide topology information to the MDSC to enable efficient
network coordination.</t>
        <t>For example, in inter-domain SR-TE, setting up a bidirectional
SR-TE path from PE13 in Domain 1 to PE23 in Domain 2, as shown in
<xref target="fig-vpn-path"/>, requires the MDSC to coordinate the following actions:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1: Push a SID list to PE13, including the Binding SID
associated with the SR-TE path in Domain 2, with PE23 as the target
destination (forward direction).</t>
          </li>
          <li>
            <t>P-PNC2: Push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1, with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are responsible for the
following:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer, single-domain local TE path computation,
when requested by the MDSC, between two PEs (for single-domain
end-to-end TE path) or between PEs and BRs for an inter-domain TE
path selected by the MDSC.</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
for the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting a new TE path setup, the MDSC provides the P-PNCs
with the explicit path to be created or modified. In other words, the
MDSC communicates the complete list of nodes involved in the path
(strict mode). The P-PNC is then responsible for setting up the
explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide the P-PNC
with a loose path and per-domain TE constraints. The P-PNC can then
select the complete path within its domain.</t>
        <t>In this case, the P-PNC must signal back to the MDSC which path it has chosen, allowing the MDSC to track relevant resource utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC
touches PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two
paths with the same topology metric, e.g., BR21 - P24 - PE23 and
BR21 - BR22 - PE23, but with different loads. It may prefer to steer
traffic on the latter as it is less loaded.</t>
        <t>For the purposes of this document, it is assumed that the MDSC always
provides the explicit list of all hops to the P-PNCs to set up or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination
is handled by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>Provide the MDSC with an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation when requested by
the MDSC;</t>
          </li>
          <li>
            <t>Perform optical tunnel set up when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by the O-PNC to perform intra-domain topology
discovery and path setup are typically vendor-specific and outside
the scope of this document.</t>
        <t>Depending on the optical network type, TE topology abstraction, path
computation, and path setup can be single-layer (either OTN or DWDM)
or multi-layer OTN/DWDM. In the latter case, multi-layer coordination
between the OTN and DWDM layers is handled by the O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all MPI
interfaces between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation from <xref target="RFC7951"/>, is assumed to be used at these
interfaces. Additionally, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to comply with the Network Management Datastore
Architecture (NMDA) from <xref target="RFC8342"/>, are assumed to be used at
these MPI and MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models applicable to the Packet
and Optical MPIs. Some of these YANG data models may be optional,
depending on the specific network configuration detailed in
<xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module
defined in <xref target="RFC8525"/> is used to allow the MDSC to discover the
set of YANG modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology"
YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>, which augments the TE
Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the
"ietf-flexi-grid-topology" YANG module of
<xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid, and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC can use the following client signal YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service"
YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the
"ietf-eth-tran-service" YANG module of
<xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet"
YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the
generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments
the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of
<xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface. The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are key extensions enabling the use of
PCE/PCEP for ACTN.</t>
        <t>Since PCEP supports path computation in both packet and optical
networks, it is well-suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> outlines H-PCE applicability for
inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that PCEP can be used in conjunction with the YANG data models
described in the rest of this document. Depending on whether ACTN is
deployed in a greenfield or brownfield, two options are possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface to each PNC to
discover all TE information and request TE tunnels. It may perform
full multi-layer path computation or delegate path computation to
the underlying PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. We need only one type of
interface (RESTCONF) and use the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a
single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MSDC needs to discover the underlying PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of the equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest-level link termination points (LTPs) in
the topology view and corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and
<xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM node).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for
MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the
ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layer alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example, a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in
<xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs,
the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: once CBR client LTP is
reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>
for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is
reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the
O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is
reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X
and Y are
used to associate the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In the case of a multi-layer DWDM/OTN network domain, multi-layer
intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in
<xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based
or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>,
associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link, and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in
<xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used to report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of
<xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship
between the IP network
topology and the MPLS-TE network topology depend on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links,
inter-domain
Ethernet links or access links, as described in detail in
<xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as Link Layer Discover Protocol LLDP
<xref target="IEEE_802.1AB"/>, which are outside the scope of this document, and
reported at the MPIs within the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>We assume that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet
technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a
gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/>
should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in
one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an an IP domain and an adjacent
optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an
inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are
discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>A more detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of
<xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other link discovery options are possible but not described in this
document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the
encoding of the plug-id namespace and the specific LLDP information
reported within the plug-id value, such as the Chassis ID and Port ID
mandatory TLVs, is implementation-specific and needs to be consistent
across all PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers, making it more viable for
inter-domain Ethernet links. For cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable when
possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>,
and the optical nodes snoop the LLDP packets received from the local
Ethernet interface and report the extracted information, such as the
Chassis ID, Port ID, and System Name TLVs, to the O-PNCs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and do not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching
the plug-id values of the two LTPs reported by adjacent O-PNC and
P-PNCs. In case LLDP snooping is used, the P-PNC reports the LLDP
information sent by the corresponding Ethernet interface on the IP
router, while the O-PNC reports the LLDP information received by the
corresponding Ethernet interface on the optical node, e.g., between
LTP 5-0 on PE13 and LTP 7-0 on NE11, as shown in
<xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating
a cross-technology Ethernet link is reported by an O-PNC in the
Ethernet topology, the OTN topology model, or both, depending on the
type of corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet
links is based solely on the LLDP information sent by the Ethernet
interfaces of the routers and snooped by the Ethernet interfaces of
the optical nodes. Therefore, the MDSC can discover these links even
before optical paths, supporting overlay multi-technology IP links,
are set up.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link supporting an
inter-domain IP link by matching the plug-id values of the two
Ethernet LTPs reported by adjacent P-PNCs. The P-PNCs report the
LLDP information being sent and received from the corresponding
Ethernet interfaces, e.g., between Ethernet LTP 3-1 on BR11 and
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology
Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface
on an IP router terminates a cross-technology Ethernet link or an
inter-domain Ethernet link, it must report at the MPI two Ethernet
LTPs representing the same Ethernet interface, e.g., both Ethernet
LTP 3-0 and Ethernet LTP 3-1, supported by LTP 3-0, as shown in
<xref target="fig-inter-domain-link"/>.</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) represents the physical adjacency between
the Ethernet interface on an IP router and the Ethernet interface on
its physically adjacent node. This node can be either an IP router
(in the case of a single-technology Ethernet link) or an optical node
(in the case of a cross-technology Ethernet link). Therefore, as
described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information sent
by the corresponding Ethernet interface on the IP router, such as
{BR11,3} and {BR21,4} plug-id values reported by the Ethernet LTP
3-0 on BR11 and the Ethernet LTP 4-0 on BR21, as shown in
<xref target="fig-inter-domain-link"/>.</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g.,
LTP 3-0 in BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to
discover the logical adjacency between Ethernet interfaces on IP routers,
which can be either single-technology or multi-technology. Therefore,
the P-PNC reports, within the plug-id attribute of this LTP, the LLDP
information sent and received by the corresponding Ethernet interface
on the IP router, such as the {BR11,3,BR21,4} plug-id values reported
by the Ethernet LTP 3-1 on BR11 and the Ethernet LTP 4-1 on BR21, as
shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in the case of inter-domain Ethernet links,
the MDSC cannot discover, using the LLDP information reported in the
plug-id attributes, the physical adjacency between two Ethernet
interfaces on physically adjacent IP routers, because these plug-id
values do not match, such as the {BR11,3} and {BR21,4} plug-id values
shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms outside the scope of this document, that the Ethernet
interfaces on the IP routers either terminate a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit to report the physical Ethernet LTPs when it
knows, through mechanisms outside the scope of this document, that
the corresponding Ethernet interfaces terminate inter-domain Ethernet
links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs supported by the two Ethernet LTPs terminating an inter-domain
Ethernet link, discovered as described in
<xref target="ip-inter-domain-link-discovery"/>,
e.g., between IP LTP 3-2 on BR21 and IP LTP 4-2 on BR22, supported
respectively by Ethernet LTP 3-1 on BR11 and Ethernet LTP 4-1 on BR21,
as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting
multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in
<xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The Ethernet interface 5 on the P13 router is terminating two Ethernet
abstract links:
- The multi-technology intra-domain Ethernet link between logical
Ethernet LTP 5-1 on PE13 and the logical Ethernet LTP 6-1 on BR11;
- The cross-technology Ethernet link, which is supporting that
multi-technology intra-domain Ethernet link, between the physical
Ethernet LTPs 5-0 on PE13 and the physical Ethernet LTP 7-0 on the
optical NE11.</t>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in
<xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the
multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0
on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in
<xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology
intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels
support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in the case of intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency between
two Ethernet interfaces on physically adjacent IP routers, because
the plug-id values do not match, such as {PE13,1} and {P16,2}, as shown
in <xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical
intra-domain Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0
on P16, as shown in <xref target="fig-intra-domain-link"/>, if it knows a priori,
using mechanisms outside the scope of this document, that all Ethernet
interfaces on the IP routers terminate either a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
through mechanisms outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of LAG groups within its
domain and report each intra-domain LAG as an Ethernet bundle link
within the Ethernet topology exposed at the MPI.</t>
        <t>This is done by bundling multiple single-domain Ethernet links, as
shown in <xref target="fig-lag"/>. For example, the Ethernet bundled link between
Ethernet LTP 5-1 on BR21 and Ethernet LTP 6-1 on P24 is built from
the Ethernet links set up respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and
multi-technology intra-domain LAG links are the same, with the only
difference being whether the bundled links are single-technology or
multi-technology.</t>
        <t>However, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document, as they do not imply cross-technology
coordination
between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the
P-PNC to discover the configuration of LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>It is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP can be
configured on a LAG group (Aggregated Port) and/or on any number of its
LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP
session
configured at LAG member (Aggregation Port)level and another one for
the LLDP session configured at LAG group (Aggregated Port)level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in
<xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP
session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the
multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined
in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry
the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>The are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and
<xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but have not enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>;, and
that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 has not enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay
optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
            <li>
              <t>a new multi-domain TE path needs to be setup between PE13 and
 PE23, e.g., either because existing TE paths between PE13 and
 PE23 are not able to meet the TE and binding requirements of
 the L2/L3 VPN service or because there is no TE path between
 PE13 and PE23.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial
summarization, the MDSC will use the TE topology information provided
by the P-PNCs and the results of the path computation requests sent to
the O-PNCs, as described in <xref target="optical-path-computation"/>, to compute
the multi-layer/multi-domain path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When setting up the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration needed to realize the requested
network service across the appropriate optical and packet domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in
<xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of ECMP, between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to set up a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain the
new TE path to use the underlay optical tunnel setup between BR21 and
P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to set up the requested path and returns
the information needed for multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC2, knowing the node and adjacency SIDs
assigned within its domain, can install the proper SR policy or
hierarchical policies within BR21 and return to the MDSC the binding
SID assigned to this policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to set up a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain the new TE path
to use the underlay optical tunnel setup between PE13 and BR11,
specifying which inter-domain link should be used to send traffic to
BR21 and the information for multi-domain TE path stitching, as
described in <xref target="te-path-discovery"/> (e.g., in inter-domain SR-TE, the
binding SID assigned by P-PNC2 to the corresponding SR policy in BR21).
The P-PNC1 properly configures the routers within its domain to set up
the requested path and the multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC1, knowing the node and adjacency SIDs
assigned within its domain and the PE SID assigned by P-PNC1 to the
inter-domain link between BR11 and BR21, along with the binding SID
assigned by P-PNC2, installs the proper policy or policies within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, set up or modified,
the MDSC can request both P-PNCs to configure the L3VPN and its binding
with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, optical path
computation is usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate single-domain optical path computation to the O-PNC.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/>,
and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its underlay
optical tunnel. Therefore, the properties of an optical path between
two optical TTPs, as computed by the O-PNC, can be used by the MDSC to
infer the properties of the associated multi-layer single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two
options to request an O-PNC to perform optical path computation: either
via a "compute-only" TE tunnel path, using the generic TE tunnel YANG
data model defined in <xref target="I-D.ietf-teas-yang-te"/>, or via the path
computation RPC defined in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one
relationship between a multi-technology intra-domain IP link and its
underlay optical tunnel.</t>
        <t>Therefore, to set up a new multi-technology intra-domain IP link,
the MDSC requires the O-PNC to set up the optical tunnel (using either
the WDM Tunnel model or the OTN Tunnel model, if optional OTN switching
is supported) within the optical network and steer client traffic
between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based transport)
or the Transparent CBR Client Signal Model (for transparent transport).</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request O-PNC1 to set up an optical tunnel between optical
TTPs (7) on NE11 and (8) on NE12 and steer client traffic over this
tunnel between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of
<xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been set up and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, outside
the scope of this document, are used between the adjacency of the two
IP routers' ports, the P-PNC can automatically discover the underlay
multi-technology single-domain Ethernet link set up by the MDSC and
report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if no automatic discovery mechanisms are used, the MDSC
can configure this multi-technology single-domain Ethernet link at
the MPI of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., LTP 5-1 on
PE13 and 6-1 on BR11, as shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been
configured by the MDSC or discovered by the P-PNC, the corresponding
multi-technology single-domain IP link can also be configured either
by the MDSC or the P-PNC.</t>
        <t>This document assumes that the IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology
single-domain Ethernet link is either discovered by the P-PNC or
configured by the MDSC at the MPI. However, if LAG is supported, the
P-PNC lacks enough information to determine whether the discovered or
configured multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs, and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All other configuration is
provided by the P-PNC.</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request P-PNC1 to set up a multi-technology single-domain
IP link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11, supported
by the multi-technology single-domain Ethernet link between ETH LTP
5-1 on PE13 and ETH LTP 6-1 on BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain
IP link and, once finished, reports it to the MDSC within the IP
topology exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates a new Ethernet bundled link at the MPI (using the
bundled-link container defined in <xref target="RFC8795"/>), bundling the
multi-technology single-domain Ethernet link(s) being created, as
described above.</t>
          <t>When a new LAG link is created, it is recommended to configure the
minimum number of active member links required to consider the LAG
link as up. For example, a LAG link with three members can be
considered up when only one member link fails and down when at least
two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>
and is identified as a gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to set up an Ethernet bundled link between Ethernet LTP 5-1 on
BR21 and Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between Ethernet LTP 1-1 on BR21 and
Ethernet LTP 2-1 on P24.</t>
          <t>It is also worth noting that the MDSC needs to create the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just configured Ethernet
bundled link, following the same procedure described in
<xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP
5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates the configuration of an existing Ethernet bundled link at the
MPI, adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as up
may also need to be updated.</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to add the multi-technology single-domain Ethernet link set up
between Ethernet LTP 3-1 on BR21 and Ethernet LTP 4-1 on P24 to the
existing Ethernet bundle link set up between Ethernet LTP 5-1 on node
BR21 and Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also update
the bandwidth information of the multi-technology single-domain IP link
supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties
of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC
and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to
ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This document assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the
<xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to set it up,
properly specifying the path constraints, such as the explicit path,
to ensure the P-PNC sets up a TE path that meets the end-to-end TE
and binding constraints and uses the optical tunnels set up by the
MDSC to support this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of
both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the
<xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the
P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model
supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>[Editor's Note:] Add some text about the protection options (to
further discuss whether to put this text here or in
<xref target="multi-technology-link-setup"/>).</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms.
For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case
of MPLS-TE domain or the TI-LFA local protection, as defined in
<xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The
mechanisms to request the configuration TI-LFA local protection for SR-TE
paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG
models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection
configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of
MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain
IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services, and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list
of TE tunnel(s) that should be used to forward L2/L3 VPN traffic
between the two PEs terminating the listed TE tunnel(s). If the list
contains more than one TE tunnel for the same pair of PEs, these TE
tunnels are used to load balance the associated L2/L3 VPN traffic
between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic between multiple TE
tunnels for the same PE pair in a way other than load balancing is
identified as a gap requiring further work and is outside the scope
of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document shows that the IETF YANG models
described in <xref target="yang"/> provide useful support for Packet Optical Integration
(POI) scenarios for resource discovery (network topology, service,
tunnels, and network inventory discovery), as well as for supporting
multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>The following gaps were identified that may need to be addressed by
the relevant IETF Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;.</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in
<xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks:
this gap has been
identified in <xref target="optical-path-computation"/> and the solution in
<xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between a common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links
and the
UNI topology discover mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of
<xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that being
able to use WSON and Flexi-grid topology models together (through
multi-inheritance) is not only useful for mixed fixed-grid and
flexible-grid DWDM network topologies but also the only viable option
for a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would also support optical tunnel setup in the case
of a mixed CWDM and DWDM network topology.</t>
      <t>Although not analyzed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs enhancement
to support scenarios where multiple parallel TE paths are used in
load-balancing to carry traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to
discover the intra-domain Ethernet and IP links. While LLDP provides
valuable information for network management and troubleshooting, it also
presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP
packets could be captured using a packet sniffer. An attacker can
leverage this information to gain insights into the network topology,
device types, and configurations, which could be used for further
attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device
types, software versions, and network configuration details. This might
help an attacker identify vulnerable devices or configurations that can
be exploited to gain unauthorized access or escalate privileges within
the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device,
they could manipulate LLDP information to advertise false device
information, leading to potential misconfigurations or trust
relationships being exploited. This can disrupt network operations or
redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP
packets, an attacker could overwhelm network devices or management
systems, potentially leading to a denial of service where legitimate
network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other
network devices. Potentially, this might lead to incorrect network
mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for
authenticating the source of LLDP messages, which means that devices
accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement
several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing
untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who
can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify
unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known
vulnerabilities that could be exploited through information gathered via
LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for
automating the management and control of multi-layer Service Providers'
transport networks, combining the optical and microwave transport layer
with the packet (IP/MPLS) layer to create a more efficient and scalable
network infrastructure. This approach is particularly beneficial for
Service Providers and large enterprises dealing with high bandwidth
demands and looking for cost-effective ways to expand their networks.
However, integrating these two traditionally separate network layers
involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of
integration between the packet and optical layers is critical.
Furthermore, this includes determining whether to pursue a loose
integration (keeping layers distinct but coordinated) or a tight
integration (combining layers more closely, potentially at the hardware
level) coordinated via the MDSC. Accurate forecasting and planning will
also be essential to ensure that the integrated ACTN infrastructure can
handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various
vendors. Ensuring that packet and optical devices can interoperate
seamlessly and the PNCs can manage them is crucial for a successful
integration. The Service Provider must also check with the vendors to
ensure they support the IETF-based technologies outlined in this
document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require
comprehensive monitoring solutions that can provide visibility to the
PNCs across both packet and optical layers. Identifying and diagnosing
issues may become more complex with integrated layers. Telemetry data may
also be required to collect lower-layer networking health and consider
network and service performance. This topic is further discussed in [ACTN
Assurance];</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient,
including considerations for automatic protection switching and fast
reroute mechanisms that span both layers. Fault isolation and recovery
may become more challenging, as issues in one layer can have cascading
effects on the other. Effective fault management strategies must be in
place to quickly identify and rectify such issues. This topic is further
discussed in [ACTN Assurance];</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="9" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-37"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-24"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-07"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="12" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-17"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-03"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="3" month="December" year="2024"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-22"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="4" month="February" year="2025"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-14"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-01"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7424">
          <front>
            <title>Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks</title>
            <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="A. Ghanwani" initials="A." surname="Ghanwani"/>
            <author fullname="N. So" initials="N." surname="So"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Demands on networking infrastructure are growing exponentially due to bandwidth-hungry applications such as rich media applications and inter-data-center communications. In this context, it is important to optimally use the bandwidth in wired networks that extensively use link aggregation groups and equal-cost multipaths as techniques for bandwidth scaling. This document explores some of the mechanisms useful for achieving this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7424"/>
          <seriesInfo name="DOI" value="10.17487/RFC7424"/>
        </reference>
        <reference anchor="RFC2991">
          <front>
            <title>Multipath Issues in Unicast and Multicast Next-Hop Selection</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next-hop should be used for a given data packet. This memo summarizes current practices, problems, and solutions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2991"/>
          <seriesInfo name="DOI" value="10.17487/RFC2991"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for WSON, while it is known as Impairment-Aware Routing and Spectrum
   Assignment (IA-RSA) for SSON.

   This document provides a YANG data model for the impairment-aware TE
   topology in optical networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-17"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8001">
          <front>
            <title>RSVP-TE Extensions for Collecting Shared Risk Link Group (SRLG) Information</title>
            <author fullname="F. Zhang" initials="F." role="editor" surname="Zhang"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="C. Margaria" initials="C." surname="Margaria"/>
            <author fullname="M. Hartley" initials="M." surname="Hartley"/>
            <author fullname="Z. Ali" initials="Z." surname="Ali"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides extensions for Resource Reservation Protocol - Traffic Engineering (RSVP-TE), including GMPLS, to support automatic collection of Shared Risk Link Group (SRLG) information for the TE link formed by a Label Switched Path (LSP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8001"/>
          <seriesInfo name="DOI" value="10.17487/RFC8001"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-17"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document describes how profiles of the Traffic Engineering (TE)
   Topology Model, defined in RFC8795, can be used to address
   applications beyond "Traffic Engineering".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-02"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="12" month="February" year="2025"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  However, the data model is designed with
   appropriate provisions to ease future augmentations with application-
   specific and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-04"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="29" month="August" year="2024"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-04"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2704?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Acess, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can
request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually
operator-specific, typically it would be using a RESTCONF/YANG interface
with a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between
the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in
<xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and
<xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from a
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model
<xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must reroute IP traffic before the events takes place. It should
be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the
link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after
checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port
with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has
been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since a IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the tranponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are
vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not
provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>Previous versions of document were prepared using
2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Zheng" fullname="Yanlei Zheng">
        <organization>China Unicom</organization>
        <address>
          <email>zhengyanlei@chinaunicom.cn</email>
        </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="Y." surname="Lee" fullname="Young Lee">
        <organization>Sung Kyun Kwan University</organization>
        <address>
          <email>younglee.tx@gmail.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Nvidia</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
