<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-15" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-15"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>FiberCop</organization>
      <address>
        <email>fabio.peruzzini@fibercop.com</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="04"/>
    <area>Routing</area>
    <workgroup>Traffic Engineering Architecture and Signaling</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 124?>

<t>This document explores the applicability of the Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration (POI)
within the context of IP/MPLS and optical internetworking. It examines
the YANG data models defined by the IETF that enable an ACTN-based
deployment architecture and highlights specific scenarios pertinent
to Service Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology scenario (packet over optical), particularly
emphasising the Multi-Domain Service Coordinator to Provisioning
Network Controller Interface (MPI) within the ACTN architecture</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 138?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The full automation of management and control for Service Providers'
transport  networks, spanning IP/MPLS, optical, and microwave
technologies, is crucial to addressing customer demands for high-bandwidth
applications, such as ultra-fast  mobile broadband for 5G and fiber
connectivity services. The Abstraction and  Control of TE Networks (ACTN)
architecture and interfaces enable the automation  and efficient
operation of complex optical and IP/MPLS networks using standardized
interfaces and data models. This approach supports a broad spectrum of
network services that can be requested by upper-layer applications,
meeting diverse  service-level requirements from a network perspective,
such as physical diversity, latency, bandwidth, and topology.</t>
      <t>Packet Optical Integration (POI) represents an advanced application of
traffic engineering. In wide-area networks, packet networks based on the
Internet Protocol (IP), often augmented with Multiprotocol Label
Switching (MPLS) or Segment Routing  (SR), are typically implemented over
an optical transport network utilizing Dense Wavelength Division
Multiplexing (DWDM), occasionally with an optional Optical Transport
Network (OTN) layer.</t>
      <t>There are significant technical differences between the packet and optical technologies
(e.g., routers versus optical switches) and their associated network engineering
and planning approaches (e.g., inter-domain peering optimization in IP
networks versus managing physical impairments in DWDM systems or
operating on vastly different time scales). Additionally, customer
requirements often differ between packet and optical networks, and it is
common for Service Providers to use different vendors for each domain. As
a result, the operation of these complex packet and optical networks is
often siloed, as each technology domain requires specialized skill sets.</t>
      <t>As a consequence, in many existing network deployments, packet and optical networks are engineered and operated independently.</t>
      <t>This separation is inefficient for several reasons.
Firstly, integrating packet and optical
networks can significantly reduce capital expenditures (CAPEX) and
operational expenditures (OPEX).
Secondly, multi-technology topology insights can optimize troubleshooting (e.g., alarm correlation) and enhance network operation (e.g., coordination of maintenance events). Additionally, detailed inventory and planning information can also improve service assurance quality, such as detecting constraint violations or lack of resource diversity.
Thirdly, multi-technology traffic engineering enables more efficient use of
available network capacity (e.g., coordination of restoration).
Furthermore, provisioning workflows can be simplified or automated across
layers, facilitating capabilities such as bandwidth-on-demand and
streamlined maintenance activities.</t>
      <t>The ACTN framework facilitates seamless integration of packet and optical
networks across multiple technologies and vendors.
This is achieved through separated Provisioning Network Controllers (PNCs) for both packet and optical domains,
which hide the complexities of the technical differences between the packet and optical technologies while
providing sufficient abstract information that allows the Multi-Domain Service Coordinator (MDSC)
to provide multi-layer coordination between packet and optical networks.</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using
Resource Reservation Protocol (RSVP) Traffic Engineering (TE)-based or SR
-TE-based, forwarding plane mechanisms.</t>
      <t>This document outlines key scenarios for Packet Optical Integration (POI)
from the perspective of the packet service layer and highlights the
necessary coordination between packet and optical layers to enhance POI
deployment and operation. These scenarios emphasize multi-domain packet
networks functioning as clients of optical networks.</t>
      <t>This document analyzes the scenario in which packet networks support
multi-domain TE paths. The optical networks may
consist of a DWDM network, an OTN network (without a DWDM layer), or a
multi-layer OTN/DWDM network. Additionally, DWDM networks can be either
fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the degree of standardization and identifying potential
gaps are crucial for evaluating the feasibility of integrating packet and
optical DWDM domains (with an optional OTN layer) from an end-to-end,
multi-vendor service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from Customer Edge (CE) to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>The Provider Edge (PE) to PE configuration, including both the network
service layer (VRFs, RT import/export policies configuration) and the
network transport layer (e.g. RSVP-TE Label Switched Paths (LSPs). This
includes the configuration (on the PE side) of the interface towards the
CE (e.g. VLAN, IP address, routing protocol, etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>short for "switching technology domain", defined as "region" in
<xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control
domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>part of the network under the control of a single PNC instance. It is
subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A physical or logical entity that transmits and receives traffic.</t>
          </dd>
          <dt>Link:</dt>
          <dd>
            <t>An association between two interfaces that can exchange traffic
directly.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers, supported by two cross-technology Ethernet links
interconnected through an optical tunnel.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link connecting an Ethernet interface on an IP router to an
Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers within the same P-PNC domain, supported by two
cross-technology Ethernet links interconnected through an optical tunnel.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document examines various deployment scenarios for Packet and
Optical Integration (POI), where the ACTN hierarchy is implemented to
manage a multi-technology, multi-domain network comprising two optical
domains and two packet domains, as illustrated in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, as defined in <xref target="RFC8453"/>, is utilized to manage
this multi-technology, multi-domain network. In this topology, each
Packet PNC (P-PNC) is responsible for controlling its respective packet
domain, while each Optical PNC (O-PNC) is tasked with managing its
optical domain. The packet domains controlled by the P-PNCs can represent
Autonomous Systems (ASes), as defined in <xref target="RFC1930"/>, or Interior
Gateway Protocol (IGP) areas within the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The Multi-Domain Service Coordinator (MDSC) is responsible for
orchestrating the entire multi-domain, multi-technology network,
encompassing both packet and optical domains. A standardized interface,
the Multi-Domain Service Coordinator to Provisioning Network Controller
Interface (MPI), enables the MDSC to interact with various Provisioning
Network Controllers (O-PNCs and P-PNCs).</t>
      <t>The MPI interface provides the MDSC with an abstracted topology,
concealing technology-specific details of the network and selectively
hiding topology information based on the chosen abstraction policy. The
level of abstraction is determined by the configuration parameters of the
P-PNC and O-PNC, such as offering potential connectivity information
between any Provider Edge (PE) and Border Router (BR) within a packet
network.</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries of the packet and optical domains are
congruent. In other words, each optical domain exclusively supports
connectivity between IP routers within a single packet domain.</t>
        </li>
        <li>
          <t>There are no physical links directly connecting optical domains.
Inter-domain physical links exist only under the following conditions:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links
within this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Scenarios using coherent optical interfaces on the IP routers are outside the scope of this document.</t>
      <t>This document analyzes scenarios in which all multi-technology IP links
supported by the optical network are intra-domain (intra-AS/intra-area),
such as PE-BR, PE-P, BR-P, and P-P IP links. Consequently, inter-domain
IP links are always single-technology connections, supported by
single-technology Ethernet links between physically adjacent IP routers.</t>
      <t>As described in <xref target="RFC7424"/>, in order to increase the bandwidth between two adjacent routers, multiple Ethernet links can be setup between adjacent routers using either Link Aggregation Groups (LAGs) <xref target="IEEE_802.1AX"/> or Equal Cost Multi-Path (ECMP) <xref target="RFC2991"/>.</t>
      <t>Therefore, if inter-domain links between optical domains exist, they
would be utilized to support multi-domain optical services, which fall
outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated
ROADM function with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or
without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for coordinating multiple
packet and optical domains in a multi-domain, multi-technology
environment. It facilitates multi-layer and multi-domain L2/L3 VPN
network services as requested by the OSS/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service-related and network-related functions are combined into a
single, monolithic implementation. This implementation manages
end-customer service requests received through the Customer MDSC
Interface (CMI) and adapts the corresponding network models. An example
of this architecture is illustrated in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation may opt to separate the service-related and
network-related functions into distinct functional entities, as outlined
in <xref target="RFC8309"/> and Section 4.2 of <xref target="RFC8453"/>. In this approach, the
MDSC is decomposed into a top-level Service Orchestrator, which
interfaces with the customer through the Customer MDSC Interface (CMI),
and a Network Orchestrator, which interfaces southbound with the PNCs.
The interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation may choose to split the MDSC functions into a
"higher-level MDSC" (MDSC-H) and "lower-level MDSCs" (MDSC-Ls). The
MDSC-H is responsible for multi-technology coordination across packet and
optical domains, while the MDSC-Ls handle domain-specific coordination.
Specifically, an Optical MDSC-L manages multi-domain coordination between
the O-PNCs, and a Packet MDSC-L manages multi-domain coordination between
the P-PNCs. This approach is illustrated, for example, in Figure 9 of
<xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An alternative implementation may choose to integrate the MDSC and
P-PNC functions in a single entity.</t>
          </li>
        </ol>
        <t>In current service provider network deployments, the MDSC's Northbound
Interface (NBI) typically connects to an OSS/Orchestration layer rather
than a CNC. In this scenario, the MDSC is limited to performing Network
Orchestration functions, as described in <xref target="RFC8309"/> (point 2 above).
Consequently, the MDSC handles network service requests received from the
OSS and/or Orchestration.</t>
        <t>The functionality of the OSS and/or Orchestration layer, as well as its
interface with the MDSC, is typically operator-specific and falls outside
the scope of this draft. Therefore, this document assumes that the OSS
and/or Orchestration layer requests the MDSC to provision L2/L3 VPN
network services through mechanisms not covered in this document.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS and/or Orchestration  layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates these workflows to perform multi-layer and
multi-domain optimizations and/or maintenance activities (e.g., rerouting
LSPs and their associated services when a resource, such as a fiber, is
placed in maintenance mode during a maintenance window). Unlike service
fulfilment, these workflows are not triggered by a network service
provisioning request from the OSS or Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document examines use cases in which multi-layer coordination is
initiated by a network service request from the OSS and/or Orchestration
layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke
multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one
spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-Labeled Unicast (BGP-LU) (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document explores inter-domain TE options where the TE tunnel model,
as defined in <xref target="I-D.ietf-teas-yang-te"/>, applies at the MPI for both
intra-domain and inter-domain TE configurations. The assessment of
alternative options is beyond the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms are employed for inter-domain TE path
stitching. In the case of inter-domain SR-TE, a Segment Identifier (SID)
is used in Segment Routing (SR) to define a segment (a portion of the
path) within a network. A binding SID, a special type of SID, acts as a
reference to a precomputed SR policy or path.</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> employs technology-specific
local protection mechanisms, such as Fast Reroute (FRR) for MPLS-TE or
Topology Independent Loop-Free Alternate (TI-LFA) for SR-TE. These
mechanisms operate with an awareness of the multi-technology TE path
properties, such as the Shared Risk Link Group (SRLG) path properties defined in <xref target="RFC8001"/>.</t>
            </li>
          </ul>
          <t>For inter-domain TE paths, it is assumed that each packet domain in
<xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> employs the same TE technology. The
stitching between two domains is achieved using inter-domain TE
mechanisms.</t>
          <t>In this scenario, a key function of the MDSC is to identify the
multi-domain and multi-layer TE paths for carrying L2/L3 VPN traffic
between PEs in different packet domains. The MDSC then relays this
information to the P-PNCs to ensure that the forwarding tables of the PEs
(e.g., VRF) are correctly configured, allowing the L2/L3 VPN traffic to
be routed over the designated multi-domain and multi-layer TE paths.</t>
          <t>The selection of the TE path should consider both the TE requirements and
the binding requirements of the L2/L3 VPN network service.</t>
          <t>In general, the binding requirements for a network service (e.g., L2/L3
VPN) can be categorized into three main cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The customer is asking for VPN isolation to dynamically create
and bind tunnels to the service so that they are not shared by
other services (e.g. VPN).  </t>
              <t>
The level of isolation can be different:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>Hard isolation with deterministic latency implies that the L2/L3
VPN requires a set of dedicated TE tunnels. These tunnels neither
share resources with other services, nor compete for bandwidth with
other tunnels, ensuring deterministic latency performance.</t>
                </li>
                <li>
                  <t>Hard isolation but without deterministic characteristics</t>
                </li>
                <li>
                  <t>Soft isolation means the tunnels associated with L2/L3 VPN
are dedicated to that but can compete for bandwidth with
other tunnels.</t>
                </li>
              </ol>
            </li>
            <li>
              <t>The customer does not require isolation and may request a VPN service
where the associated tunnels are shared across multiple VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document examines scenarios in which a single TE path is used to
carry VPN traffic between PEs. Scenarios involving multiple parallel TE
paths for load-balancing VPN traffic between PEs are possible but are
beyond the scope of this document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When establishing a new TE path, the MDSC is responsible for coordinating
the path computation across multiple layers and domains.</t>
          <t>Based on the MDSC's knowledge of the underlying network topology and
configuration, there are three possible approaches for multi-layer and multi-domain path
computation:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC maintains an abstracted
TE topology view of all its packet and optical underlying domains.  </t>
              <t>
In this case, the MDSC lacks sufficient TE topology information to
perform multi-layer/multi-domain path computation. It delegates the
P-PNCs and O-PNCs to compute local paths within their respective
domains, then uses the returned information to compute the optimal
multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue for the P-PNC, as it lacks the ability
to perform single-domain/multi-layer path computation. It cannot
retrieve topology information from the O-PNCs or delegate optical path
computation to the O-PNCs. A possible solution is to include a CNC
function within the P-PNC to request the MDSC for multi-domain
optical path computation, as shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could involve relying on the MDSC recursive hierarchy,
as defined in Section 4.1 of <xref target="RFC8453"/>, where each IP and optical
domain pair has a "lower-level MDSC" (MDSC-L) for multi-layer
correlation, and a "higher-level MDSC" (MDSC-H) for multi-domain
coordination.  </t>
              <t>
In this case, the MDSC-H obtains an abstract view of the underlying
multi-layer domain topologies from its MDSC-L. Each MDSC-L gets the
full IP domain topology from the P-PNC and an abstracted view of the
optical domain topology from its O-PNC. Topology abstraction occurs
at the MPIs between MDSC-L and O-PNC, as well as between MDSC-L and
MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC can then only perform multi-domain/single-layer path
computation for the packet layer, where the path can be computed
optimally for the two packet domains.  </t>
              <t>
The MDSC must still need to delegate the O-PNCs to perform local path
computation within their domains. It uses the information from the
O-PNCs and its TE topology view of the multi-domain packet layer to
perform multi-layer/multi-domain path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such a case, the MDSC has all the information needed to perform
multi-domain/multi-layer path computation without relying on PNCs.  </t>
              <t>
This approach, however, may present scalability issues. As discussed
in
Section 2.2 of <xref target="I-D.ietf-teas-yang-path-computation"/>, performing
path
computation for optical networks in the MDSC is particularly
challenging,
as optimal paths also depend on vendor-specific optical attributes,
which may vary across domains if provided by different vendors.</t>
            </li>
          </ol>
          <t>This document examines scenarios where the MDSC adopts the partial
summarization approach to enable multi-domain and multi-layer path
computation.</t>
          <t>Typically, O-PNCs are responsible for optical path computation within
their respective domains. When setting up a network service, they must
consider connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may impact the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>,
used by the O-PNC for optical path computation, are not exposed at the
MPI and therefore are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an
IGP area or an Autonomous System (AS) within the same operator network,
is controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for establishing TE paths between any two PEs
or BRs within their controlled domains, as requested by the MDSC. They
also provide topology information to the MDSC to enable efficient
network coordination.</t>
        <t>For example, in inter-domain SR-TE, setting up a bidirectional
SR-TE path from PE13 in Domain 1 to PE23 in Domain 2, as shown in
<xref target="fig-vpn-path"/>, requires the MDSC to coordinate the following actions:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1: Push a SID list to PE13, including the Binding SID
associated with the SR-TE path in Domain 2, with PE23 as the target
destination (forward direction).</t>
          </li>
          <li>
            <t>P-PNC2: Push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1, with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are responsible for the
following:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer, single-domain local TE path computation,
when requested by the MDSC, between two PEs (for single-domain
end-to-end TE path) or between PEs and BRs for an inter-domain TE
path selected by the MDSC.</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
for the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting a new TE path setup, the MDSC provides the P-PNCs
with the explicit path to be created or modified. In other words, the
MDSC communicates the complete list of nodes involved in the path
(strict mode). The P-PNC is then responsible for setting up the
explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide the P-PNC
with a loose path and per-domain TE constraints. The P-PNC can then
select the complete path within its domain.</t>
        <t>In this case, the P-PNC must signal back to the MDSC which path it has chosen, allowing the MDSC to track relevant resource utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC
touches PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two
paths with the same topology metric, e.g., BR21 - P24 - PE23 and
BR21 - BR22 - PE23, but with different loads. It may prefer to steer
traffic on the latter as it is less loaded.</t>
        <t>For the purposes of this document, it is assumed that the MDSC always
provides the explicit list of all hops to the P-PNCs to set up or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination
is handled by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>Provide the MDSC with an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation when requested by
the MDSC;</t>
          </li>
          <li>
            <t>Perform optical tunnel set up when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by the O-PNC to perform intra-domain topology
discovery and path setup are typically vendor-specific and outside
the scope of this document.</t>
        <t>Depending on the optical network type, TE topology abstraction, path
computation, and path setup can be single-layer (either OTN or DWDM)
or multi-layer OTN/DWDM. In the latter case, multi-layer coordination
between the OTN and DWDM layers is handled by the O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all MPI
interfaces between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation from <xref target="RFC7951"/>, is assumed to be used at these
interfaces. Additionally, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to comply with the Network Management Datastore
Architecture (NMDA) from <xref target="RFC8342"/>, are assumed to be used at
these MPI and MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models applicable to the Packet
and Optical MPIs. Some of these YANG data models may be optional,
depending on the specific network configuration detailed in
<xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module
defined in <xref target="RFC8525"/> is used to allow the MDSC to discover the
set of YANG modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology"
YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>, which augments the TE
Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the
"ietf-flexi-grid-topology" YANG module of
<xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid, and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC can use the following client signal YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service"
YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the
"ietf-eth-tran-service" YANG module of
<xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet"
YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the
generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments
the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of
<xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface. The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are key extensions enabling the use of
PCE/PCEP for ACTN.</t>
        <t>Since PCEP supports path computation in both packet and optical
networks, it is well-suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> outlines H-PCE applicability for
inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that PCEP can be used in conjunction with the YANG data models
described in the rest of this document. Depending on whether ACTN is
deployed in a greenfield or brownfield, two options are possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface to each PNC to
discover all TE information and request TE tunnels. It may perform
full multi-layer path computation or delegate path computation to
the underlying PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. We need only one type of
interface (RESTCONF) and use the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a
single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MSDC needs to discover the underlying PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of the equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest-level link termination points (LTPs) in
the topology view and corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and
<xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM node).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for
MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the
ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layer alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example, a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in
<xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs,
the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: once CBR client LTP is
reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>
for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is
reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the
O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is
reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X
and Y are
used to associate the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In the case of a multi-layer DWDM/OTN network domain, multi-layer
intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in
<xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based
or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>,
associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link, and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in
<xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used to report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of
<xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship
between the IP network
topology and the MPLS-TE network topology depend on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links,
inter-domain
Ethernet links or access links, as described in detail in
<xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as Link Layer Discover Protocol LLDP
<xref target="IEEE_802.1AB"/>, which are outside the scope of this document, and
reported at the MPIs within the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>We assume that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet
technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a
gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/>
should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in
one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an an IP domain and an adjacent
optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an
inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are
discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>A more detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of
<xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other link discovery options are possible but not described in this
document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the
encoding of the plug-id namespace and the specific LLDP information
reported within the plug-id value, such as the Chassis ID and Port ID
mandatory TLVs, is implementation-specific and needs to be consistent
across all PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers, making it more viable for
inter-domain Ethernet links. For cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable when
possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>,
and the optical nodes snoop the LLDP packets received from the local
Ethernet interface and report the extracted information, such as the
Chassis ID, Port ID, and System Name TLVs, to the O-PNCs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and do not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching
the plug-id values of the two LTPs reported by adjacent O-PNC and
P-PNCs. In case LLDP snooping is used, the P-PNC reports the LLDP
information sent by the corresponding Ethernet interface on the IP
router, while the O-PNC reports the LLDP information received by the
corresponding Ethernet interface on the optical node, e.g., between
LTP 5-0 on PE13 and LTP 7-0 on NE11, as shown in
<xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating
a cross-technology Ethernet link is reported by an O-PNC in the
Ethernet topology, the OTN topology model, or both, depending on the
type of corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet
links is based solely on the LLDP information sent by the Ethernet
interfaces of the routers and snooped by the Ethernet interfaces of
the optical nodes. Therefore, the MDSC can discover these links even
before optical paths, supporting overlay multi-technology IP links,
are set up.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link supporting an
inter-domain IP link by matching the plug-id values of the two
Ethernet LTPs reported by adjacent P-PNCs. The P-PNCs report the
LLDP information being sent and received from the corresponding
Ethernet interfaces, e.g., between Ethernet LTP 3-1 on BR11 and
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology
Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface
on an IP router terminates a cross-technology Ethernet link or an
inter-domain Ethernet link, it must report at the MPI two Ethernet
LTPs representing the same Ethernet interface, e.g., both Ethernet
LTP 3-0 and Ethernet LTP 3-1, supported by LTP 3-0, as shown in
<xref target="fig-inter-domain-link"/>.</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) represents the physical adjacency between
the Ethernet interface on an IP router and the Ethernet interface on
its physically adjacent node. This node can be either an IP router
(in the case of a single-technology Ethernet link) or an optical node
(in the case of a cross-technology Ethernet link). Therefore, as
described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information sent
by the corresponding Ethernet interface on the IP router, such as
{BR11,3} and {BR21,4} plug-id values reported by the Ethernet LTP
3-0 on BR11 and the Ethernet LTP 4-0 on BR21, as shown in
<xref target="fig-inter-domain-link"/>.</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g.,
LTP 3-0 in BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to
discover the logical adjacency between Ethernet interfaces on IP routers,
which can be either single-technology or multi-technology. Therefore,
the P-PNC reports, within the plug-id attribute of this LTP, the LLDP
information sent and received by the corresponding Ethernet interface
on the IP router, such as the {BR11,3,BR21,4} plug-id values reported
by the Ethernet LTP 3-1 on BR11 and the Ethernet LTP 4-1 on BR21, as
shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in the case of inter-domain Ethernet links,
the MDSC cannot discover, using the LLDP information reported in the
plug-id attributes, the physical adjacency between two Ethernet
interfaces on physically adjacent IP routers, because these plug-id
values do not match, such as the {BR11,3} and {BR21,4} plug-id values
shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms outside the scope of this document, that the Ethernet
interfaces on the IP routers either terminate a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit to report the physical Ethernet LTPs when it
knows, through mechanisms outside the scope of this document, that
the corresponding Ethernet interfaces terminate inter-domain Ethernet
links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs supported by the two Ethernet LTPs terminating an inter-domain
Ethernet link, discovered as described in
<xref target="ip-inter-domain-link-discovery"/>,
e.g., between IP LTP 3-2 on BR21 and IP LTP 4-2 on BR22, supported
respectively by Ethernet LTP 3-1 on BR11 and Ethernet LTP 4-1 on BR21,
as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting
multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in
<xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The Ethernet interface 5 on the P13 router is terminating two Ethernet
abstract links:
- The multi-technology intra-domain Ethernet link between logical
Ethernet LTP 5-1 on PE13 and the logical Ethernet LTP 6-1 on BR11;
- The cross-technology Ethernet link, which is supporting that
multi-technology intra-domain Ethernet link, between the physical
Ethernet LTPs 5-0 on PE13 and the physical Ethernet LTP 7-0 on the
optical NE11.</t>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in
<xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the
multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0
on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in
<xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology
intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels
support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in the case of intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency between
two Ethernet interfaces on physically adjacent IP routers, because
the plug-id values do not match, such as {PE13,1} and {P16,2}, as shown
in <xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical
intra-domain Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0
on P16, as shown in <xref target="fig-intra-domain-link"/>, if it knows a priori,
using mechanisms outside the scope of this document, that all Ethernet
interfaces on the IP routers terminate either a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
through mechanisms outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of LAG groups within its
domain and report each intra-domain LAG as an Ethernet bundle link
within the Ethernet topology exposed at the MPI.</t>
        <t>This is done by bundling multiple single-domain Ethernet links, as
shown in <xref target="fig-lag"/>. For example, the Ethernet bundled link between
Ethernet LTP 5-1 on BR21 and Ethernet LTP 6-1 on P24 is built from
the Ethernet links set up respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and
multi-technology intra-domain LAG links are the same, with the only
difference being whether the bundled links are single-technology or
multi-technology.</t>
        <t>However, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document, as they do not imply cross-technology
coordination
between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the
P-PNC to discover the configuration of LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>It is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP can be
configured on a LAG group (Aggregated Port) and/or on any number of its
LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP
session
configured at LAG member (Aggregation Port)level and another one for
the LLDP session configured at LAG group (Aggregated Port)level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in
<xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP
session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the
multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined
in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry
the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>The are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and
<xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but have not enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>;, and
that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 has not enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay
optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
            <li>
              <t>a new multi-domain TE path needs to be setup between PE13 and
 PE23, e.g., either because existing TE paths between PE13 and
 PE23 are not able to meet the TE and binding requirements of
 the L2/L3 VPN service or because there is no TE path between
 PE13 and PE23.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial
summarization, the MDSC will use the TE topology information provided
by the P-PNCs and the results of the path computation requests sent to
the O-PNCs, as described in <xref target="optical-path-computation"/>, to compute
the multi-layer/multi-domain path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When setting up the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration needed to realize the requested
network service across the appropriate optical and packet domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in
<xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of ECMP, between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to set up a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain the
new TE path to use the underlay optical tunnel setup between BR21 and
P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to set up the requested path and returns
the information needed for multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC2, knowing the node and adjacency SIDs
assigned within its domain, can install the proper SR policy or
hierarchical policies within BR21 and return to the MDSC the binding
SID assigned to this policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to set up a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain the new TE path
to use the underlay optical tunnel setup between PE13 and BR11,
specifying which inter-domain link should be used to send traffic to
BR21 and the information for multi-domain TE path stitching, as
described in <xref target="te-path-discovery"/> (e.g., in inter-domain SR-TE, the
binding SID assigned by P-PNC2 to the corresponding SR policy in BR21).
The P-PNC1 properly configures the routers within its domain to set up
the requested path and the multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC1, knowing the node and adjacency SIDs
assigned within its domain and the PE SID assigned by P-PNC1 to the
inter-domain link between BR11 and BR21, along with the binding SID
assigned by P-PNC2, installs the proper policy or policies within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, set up or modified,
the MDSC can request both P-PNCs to configure the L3VPN and its binding
with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, optical path
computation is usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate single-domain optical path computation to the O-PNC.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/>,
and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its underlay
optical tunnel. Therefore, the properties of an optical path between
two optical TTPs, as computed by the O-PNC, can be used by the MDSC to
infer the properties of the associated multi-layer single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two
options to request an O-PNC to perform optical path computation: either
via a "compute-only" TE tunnel path, using the generic TE tunnel YANG
data model defined in <xref target="I-D.ietf-teas-yang-te"/>, or via the path
computation RPC defined in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one
relationship between a multi-technology intra-domain IP link and its
underlay optical tunnel.</t>
        <t>Therefore, to set up a new multi-technology intra-domain IP link,
the MDSC requires the O-PNC to set up the optical tunnel (using either
the WDM Tunnel model or the OTN Tunnel model, if optional OTN switching
is supported) within the optical network and steer client traffic
between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based transport)
or the Transparent CBR Client Signal Model (for transparent transport).</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request O-PNC1 to set up an optical tunnel between optical
TTPs (7) on NE11 and (8) on NE12 and steer client traffic over this
tunnel between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of
<xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been set up and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, outside
the scope of this document, are used between the adjacency of the two
IP routers' ports, the P-PNC can automatically discover the underlay
multi-technology single-domain Ethernet link set up by the MDSC and
report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if no automatic discovery mechanisms are used, the MDSC
can configure this multi-technology single-domain Ethernet link at
the MPI of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., LTP 5-1 on
PE13 and 6-1 on BR11, as shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been
configured by the MDSC or discovered by the P-PNC, the corresponding
multi-technology single-domain IP link can also be configured either
by the MDSC or the P-PNC.</t>
        <t>This document assumes that the IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology
single-domain Ethernet link is either discovered by the P-PNC or
configured by the MDSC at the MPI. However, if LAG is supported, the
P-PNC lacks enough information to determine whether the discovered or
configured multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs, and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All other configuration is
provided by the P-PNC.</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request P-PNC1 to set up a multi-technology single-domain
IP link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11, supported
by the multi-technology single-domain Ethernet link between ETH LTP
5-1 on PE13 and ETH LTP 6-1 on BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain
IP link and, once finished, reports it to the MDSC within the IP
topology exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates a new Ethernet bundled link at the MPI (using the
bundled-link container defined in <xref target="RFC8795"/>), bundling the
multi-technology single-domain Ethernet link(s) being created, as
described above.</t>
          <t>When a new LAG link is created, it is recommended to configure the
minimum number of active member links required to consider the LAG
link as up. For example, a LAG link with three members can be
considered up when only one member link fails and down when at least
two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>
and is identified as a gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to set up an Ethernet bundled link between Ethernet LTP 5-1 on
BR21 and Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between Ethernet LTP 1-1 on BR21 and
Ethernet LTP 2-1 on P24.</t>
          <t>It is also worth noting that the MDSC needs to create the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just configured Ethernet
bundled link, following the same procedure described in
<xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP
5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates the configuration of an existing Ethernet bundled link at the
MPI, adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as up
may also need to be updated.</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to add the multi-technology single-domain Ethernet link set up
between Ethernet LTP 3-1 on BR21 and Ethernet LTP 4-1 on P24 to the
existing Ethernet bundle link set up between Ethernet LTP 5-1 on node
BR21 and Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also update
the bandwidth information of the multi-technology single-domain IP link
supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties
of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC
and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to
ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This document assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the
<xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to set it up,
properly specifying the path constraints, such as the explicit path,
to ensure the P-PNC sets up a TE path that meets the end-to-end TE
and binding constraints and uses the optical tunnels set up by the
MDSC to support this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of
both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the
<xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the
P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model
supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>[Editor's Note:] Add some text about the protection options (to
further discuss whether to put this text here or in
<xref target="multi-technology-link-setup"/>).</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms.
For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case
of MPLS-TE domain or the TI-LFA local protection, as defined in
<xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The
mechanisms to request the configuration TI-LFA local protection for SR-TE
paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG
models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection
configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of
MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain
IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services, and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list
of TE tunnel(s) that should be used to forward L2/L3 VPN traffic
between the two PEs terminating the listed TE tunnel(s). If the list
contains more than one TE tunnel for the same pair of PEs, these TE
tunnels are used to load balance the associated L2/L3 VPN traffic
between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic between multiple TE
tunnels for the same PE pair in a way other than load balancing is
identified as a gap requiring further work and is outside the scope
of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document shows that the IETF YANG models
described in <xref target="yang"/> provide useful support for Packet Optical Integration
(POI) scenarios for resource discovery (network topology, service,
tunnels, and network inventory discovery), as well as for supporting
multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>The following gaps were identified that may need to be addressed by
the relevant IETF Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;.</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in
<xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks:
this gap has been
identified in <xref target="optical-path-computation"/> and the solution in
<xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between a common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links
and the
UNI topology discover mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of
<xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that being
able to use WSON and Flexi-grid topology models together (through
multi-inheritance) is not only useful for mixed fixed-grid and
flexible-grid DWDM network topologies but also the only viable option
for a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would also support optical tunnel setup in the case
of a mixed CWDM and DWDM network topology.</t>
      <t>Although not analyzed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs enhancement
to support scenarios where multiple parallel TE paths are used in
load-balancing to carry traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to
discover the intra-domain Ethernet and IP links. While LLDP provides
valuable information for network management and troubleshooting, it also
presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP
packets could be captured using a packet sniffer. An attacker can
leverage this information to gain insights into the network topology,
device types, and configurations, which could be used for further
attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device
types, software versions, and network configuration details. This might
help an attacker identify vulnerable devices or configurations that can
be exploited to gain unauthorized access or escalate privileges within
the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device,
they could manipulate LLDP information to advertise false device
information, leading to potential misconfigurations or trust
relationships being exploited. This can disrupt network operations or
redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP
packets, an attacker could overwhelm network devices or management
systems, potentially leading to a denial of service where legitimate
network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other
network devices. Potentially, this might lead to incorrect network
mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for
authenticating the source of LLDP messages, which means that devices
accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement
several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing
untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who
can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify
unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known
vulnerabilities that could be exploited through information gathered via
LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for
automating the management and control of multi-layer Service Providers'
transport networks, combining the optical and microwave transport layer
with the packet (IP/MPLS) layer to create a more efficient and scalable
network infrastructure. This approach is particularly beneficial for
Service Providers and large enterprises dealing with high bandwidth
demands and looking for cost-effective ways to expand their networks.
However, integrating these two traditionally separate network layers
involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of
integration between the packet and optical layers is critical.
Furthermore, this includes determining whether to pursue a loose
integration (keeping layers distinct but coordinated) or a tight
integration (combining layers more closely, potentially at the hardware
level) coordinated via the MDSC. Accurate forecasting and planning will
also be essential to ensure that the integrated ACTN infrastructure can
handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various
vendors. Ensuring that packet and optical devices can interoperate
seamlessly and the PNCs can manage them is crucial for a successful
integration. The Service Provider must also check with the vendors to
ensure they support the IETF-based technologies outlined in this
document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require
comprehensive monitoring solutions that can provide visibility to the
PNCs across both packet and optical layers. Identifying and diagnosing
issues may become more complex with integrated layers. Telemetry data may
also be required to collect lower-layer networking health and consider
network and service performance. This topic is further discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient,
including considerations for automatic protection switching and fast
reroute mechanisms that span both layers. Fault isolation and recovery
may become more challenging, as issues in one layer can have cascading
effects on the other. Effective fault management strategies must be in
place to quickly identify and rectify such issues. This topic is further
discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-38"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-24"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-09"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-18"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="3" month="July" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-05"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="4" month="June" year="2025"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-23"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="4" month="February" year="2025"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-14"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-02"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7424">
          <front>
            <title>Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks</title>
            <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="A. Ghanwani" initials="A." surname="Ghanwani"/>
            <author fullname="N. So" initials="N." surname="So"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Demands on networking infrastructure are growing exponentially due to bandwidth-hungry applications such as rich media applications and inter-data-center communications. In this context, it is important to optimally use the bandwidth in wired networks that extensively use link aggregation groups and equal-cost multipaths as techniques for bandwidth scaling. This document explores some of the mechanisms useful for achieving this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7424"/>
          <seriesInfo name="DOI" value="10.17487/RFC7424"/>
        </reference>
        <reference anchor="RFC2991">
          <front>
            <title>Multipath Issues in Unicast and Multicast Next-Hop Selection</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next-hop should be used for a given data packet. This memo summarizes current practices, problems, and solutions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2991"/>
          <seriesInfo name="DOI" value="10.17487/RFC2991"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="11" month="April" year="2025"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for WSON, while it is known as Impairment-Aware Routing and Spectrum
   Assignment (IA-RSA) for SSON.

   This document provides a YANG data model for the impairment-aware TE
   topology in optical networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-18"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8001">
          <front>
            <title>RSVP-TE Extensions for Collecting Shared Risk Link Group (SRLG) Information</title>
            <author fullname="F. Zhang" initials="F." role="editor" surname="Zhang"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="C. Margaria" initials="C." surname="Margaria"/>
            <author fullname="M. Hartley" initials="M." surname="Hartley"/>
            <author fullname="Z. Ali" initials="Z." surname="Ali"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides extensions for Resource Reservation Protocol - Traffic Engineering (RSVP-TE), including GMPLS, to support automatic collection of Shared Risk Link Group (SRLG) information for the TE link formed by a Label Switched Path (LSP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8001"/>
          <seriesInfo name="DOI" value="10.17487/RFC8001"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-17"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>   This document describes how profiles of the Traffic Engineering (TE)
   Topology Model, defined in RFC8795, can be used to address
   applications beyond "Traffic Engineering".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-03"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="12" month="February" year="2025"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="21" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-06"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-05"/>
        </reference>
        <reference anchor="I-D.poidt-teas-actn-poi-assurance">
          <front>
            <title>Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) for Packet Optical Integration (POI) service assurance</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Paolo Volpato" initials="P." surname="Volpato">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Prasenjit Manna" initials="P." surname="Manna">
              <organization>Cisco</organization>
            </author>
            <date day="26" month="February" year="2025"/>
            <abstract>
              <t>   This document extends the analysis of the applicability of
   Abstraction and Control of TE Networks (ACTN) architecture to Packet
   Optical Integration (POI) to cover multi-layer service assurance
   scenarios.  Specifically, the ACTN architecture enables the detection
   and handling of different failures that may happen either at the
   optical or the packet layer.  It is assumed that the underlying
   transport optical network carries end-to-end IP services such as
   L2VPN or L3VPN connectivity services, with specific Service Level
   Agreement (SLA) requirements.

   Existing IETF protocols and data models are identified for each
   multi-layer (packet over optical) service assurance scenario with a
   specific focus on the MPI (Multi-Domain Service Coordinator to
   Provisioning Network Controllers Interface) in the ACTN architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-poidt-teas-actn-poi-assurance-05"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2703?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Acess, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can
request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually
operator-specific, typically it would be using a RESTCONF/YANG interface
with a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between
the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in
<xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and
<xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from a
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model
<xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must reroute IP traffic before the events takes place. It should
be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the
link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after
checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port
with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has
been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since a IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the tranponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are
vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not
provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>Previous versions of document were prepared using
2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Zheng" fullname="Yanlei Zheng">
        <organization>China Unicom</organization>
        <address>
          <email>zhengyanlei@chinaunicom.cn</email>
        </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="Y." surname="Lee" fullname="Young Lee">
        <organization>Sung Kyun Kwan University</organization>
        <address>
          <email>younglee.tx@gmail.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Nvidia</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
