<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-16" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-16"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>FiberCop</organization>
      <address>
        <email>fabio.peruzzini@fibercop.com</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="09"/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 120?>

<t>This document explores the applicability of the Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration (POI)
within the context of IP/MPLS and optical internetworking. It examines
the YANG data models defined by the IETF that enable an ACTN-based
deployment architecture and highlights specific scenarios pertinent
to Service Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology scenario (packet over optical), particularly
emphasising the Multi-Domain Service Coordinator to Provisioning
Network Controller Interface (MPI) within the ACTN architecture</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The full automation of management and control for Service Providers'
transport  networks, spanning IP/MPLS, optical, and microwave
technologies, is crucial to addressing customer demands for high-bandwidth
applications, such as ultra-fast  mobile broadband for 5G and fiber
connectivity services. The Abstraction and  Control of TE Networks (ACTN)
architecture and interfaces enable the automation  and efficient
operation of complex optical and IP/MPLS networks using standardized
interfaces and data models. This approach supports a broad spectrum of
network services that can be requested by upper-layer applications,
meeting diverse  service-level requirements from a network perspective,
such as physical diversity, latency, bandwidth, and topology.</t>
      <t>Packet Optical Integration (POI) represents an advanced application of
traffic engineering. In wide-area networks, packet networks based on the
Internet Protocol (IP), often augmented with Multiprotocol Label
Switching (MPLS) or Segment Routing  (SR), are typically implemented over
an optical transport network utilizing Dense Wavelength Division
Multiplexing (DWDM), occasionally with an optional Optical Transport
Network (OTN) layer.</t>
      <t>There are significant technical differences between the packet and optical technologies
(e.g., routers versus optical switches) and their associated network engineering
and planning approaches (e.g., inter-domain peering optimization in IP
networks versus managing physical impairments in DWDM systems or
operating on vastly different time scales). Additionally, customer
requirements often differ between packet and optical networks, and it is
common for Service Providers to use different vendors for each domain. As
a result, the operation of these complex packet and optical networks is
often siloed, as each technology domain requires specialized skill sets.</t>
      <t>As a consequence, in many existing network deployments, packet and optical networks are engineered and operated independently.</t>
      <t>This separation is inefficient for several reasons.
Firstly, integrating packet and optical
networks can significantly reduce capital expenditures (CAPEX) and
operational expenditures (OPEX).
Secondly, multi-technology topology insights can optimize troubleshooting (e.g., alarm correlation) and enhance network operation (e.g., coordination of maintenance events). Additionally, detailed inventory and planning information can also improve service assurance quality, such as detecting constraint violations or lack of resource diversity.
Thirdly, multi-technology traffic engineering enables more efficient use of
available network capacity (e.g., coordination of restoration).
Furthermore, provisioning workflows can be simplified or automated across
layers, facilitating capabilities such as bandwidth-on-demand and
streamlined maintenance activities.</t>
      <t>The ACTN framework facilitates seamless integration of packet and optical
networks across multiple technologies and vendors.
This is achieved through separated Provisioning Network Controllers (PNCs) for both packet and optical domains,
which hide the complexities of the technical differences between the packet and optical technologies while
providing sufficient abstract information that allows the Multi-Domain Service Coordinator (MDSC)
to provide multi-layer coordination between packet and optical networks.</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using
Resource Reservation Protocol (RSVP) Traffic Engineering (TE)-based or SR
-TE-based, forwarding plane mechanisms.</t>
      <t>This document outlines key scenarios for Packet Optical Integration (POI)
from the perspective of the packet service layer and highlights the
necessary coordination between packet and optical layers to enhance POI
deployment and operation. These scenarios emphasize multi-domain packet
networks functioning as clients of optical networks.</t>
      <t>This document analyzes the scenario in which packet networks support
multi-domain TE paths. The optical networks may
consist of a DWDM network, an OTN network (without a DWDM layer), or a
multi-layer OTN/DWDM network. Additionally, DWDM networks can be either
fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the degree of standardization and identifying potential
gaps are crucial for evaluating the feasibility of integrating packet and
optical DWDM domains (with an optional OTN layer) from an end-to-end,
multi-vendor service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from Customer Edge (CE) to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>The Provider Edge (PE) to PE configuration, including both the network
service layer (VRFs, RT import/export policies configuration) and the
network transport layer (e.g. RSVP-TE Label Switched Paths (LSPs). This
includes the configuration (on the PE side) of the interface towards the
CE (e.g. VLAN, IP address, routing protocol, etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>short for "switching technology domain", defined as "region" in
<xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control
domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>part of the network under the control of a single PNC instance. It is
subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A physical or logical entity that transmits and receives traffic.</t>
          </dd>
          <dt>Link:</dt>
          <dd>
            <t>An association between two interfaces that can exchange traffic
directly.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers, supported by two cross-technology Ethernet links
interconnected through an optical tunnel.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link connecting an Ethernet interface on an IP router to an
Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers within the same P-PNC domain, supported by two
cross-technology Ethernet links interconnected through an optical tunnel.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document examines various deployment scenarios for Packet and
Optical Integration (POI), where the ACTN hierarchy is implemented to
manage a multi-technology, multi-domain network comprising two optical
domains and two packet domains, as illustrated in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, as defined in <xref target="RFC8453"/>, is utilized to manage
this multi-technology, multi-domain network. In this topology, each
Packet PNC (P-PNC) is responsible for controlling its respective packet
domain, while each Optical PNC (O-PNC) is tasked with managing its
optical domain. The packet domains controlled by the P-PNCs can represent
Autonomous Systems (ASes), as defined in <xref target="RFC1930"/>, or Interior
Gateway Protocol (IGP) areas within the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The Multi-Domain Service Coordinator (MDSC) is responsible for
orchestrating the entire multi-domain, multi-technology network,
encompassing both packet and optical domains. A standardized interface,
the Multi-Domain Service Coordinator to Provisioning Network Controller
Interface (MPI), enables the MDSC to interact with various Provisioning
Network Controllers (O-PNCs and P-PNCs).</t>
      <t>The MPI interface provides the MDSC with an abstracted topology,
concealing technology-specific details of the network and selectively
hiding topology information based on the chosen abstraction policy. The
level of abstraction is determined by the configuration parameters of the
P-PNC and O-PNC, such as offering potential connectivity information
between any Provider Edge (PE) and Border Router (BR) within a packet
network.</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries of the packet and optical domains are
congruent. In other words, each optical domain exclusively supports
connectivity between IP routers within a single packet domain.</t>
        </li>
        <li>
          <t>There are no physical links directly connecting optical domains.
Inter-domain physical links exist only under the following conditions:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links
within this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Scenarios using coherent optical interfaces on the IP routers are outside the scope of this document.</t>
      <t>This document analyzes scenarios in which all multi-technology IP links
supported by the optical network are intra-domain (intra-AS/intra-area),
such as PE-BR, PE-P, BR-P, and P-P IP links. Consequently, inter-domain
IP links are always single-technology connections, supported by
single-technology Ethernet links between physically adjacent IP routers.</t>
      <t>As described in <xref target="RFC7424"/>, in order to increase the bandwidth between two adjacent routers, multiple Ethernet links can be setup between adjacent routers using either Link Aggregation Groups (LAGs) <xref target="IEEE_802.1AX"/> or Equal Cost Multi-Path (ECMP) <xref target="RFC2991"/>.</t>
      <t>Therefore, if inter-domain links between optical domains exist, they
would be utilized to support multi-domain optical services, which fall
outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated
ROADM function with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or
without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for coordinating multiple
packet and optical domains in a multi-domain, multi-technology
environment. It facilitates multi-layer and multi-domain L2/L3 VPN
network services as requested by the OSS/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service-related and network-related functions are combined into a
single, monolithic implementation. This implementation manages
end-customer service requests received through the Customer MDSC
Interface (CMI) and adapts the corresponding network models. An example
of this architecture is illustrated in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation may opt to separate the service-related and
network-related functions into distinct functional entities, as outlined
in <xref target="RFC8309"/> and Section 4.2 of <xref target="RFC8453"/>. In this approach, the
MDSC is decomposed into a top-level Service Orchestrator, which
interfaces with the customer through the Customer MDSC Interface (CMI),
and a Network Orchestrator, which interfaces southbound with the PNCs.
The interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation may choose to split the MDSC functions into a
"higher-level MDSC" (MDSC-H) and "lower-level MDSCs" (MDSC-Ls). The
MDSC-H is responsible for multi-technology coordination across packet and
optical domains, while the MDSC-Ls handle domain-specific coordination.
Specifically, an Optical MDSC-L manages multi-domain coordination between
the O-PNCs, and a Packet MDSC-L manages multi-domain coordination between
the P-PNCs. This approach is illustrated, for example, in Figure 9 of
<xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An alternative implementation may choose to integrate the MDSC and
P-PNC functions in a single entity.</t>
          </li>
        </ol>
        <t>In current service provider network deployments, the MDSC's Northbound
Interface (NBI) typically connects to an OSS/Orchestration layer rather
than a CNC. In this scenario, the MDSC is limited to performing Network
Orchestration functions, as described in <xref target="RFC8309"/> (point 2 above).
Consequently, the MDSC handles network service requests received from the
OSS and/or Orchestration.</t>
        <t>The functionality of the OSS and/or Orchestration layer, as well as its
interface with the MDSC, is typically operator-specific and falls outside
the scope of this draft. Therefore, this document assumes that the OSS
and/or Orchestration layer requests the MDSC to provision L2/L3 VPN
network services through mechanisms not covered in this document.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS and/or Orchestration  layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates these workflows to perform multi-layer and
multi-domain optimizations and/or maintenance activities (e.g., rerouting
LSPs and their associated services when a resource, such as a fiber, is
placed in maintenance mode during a maintenance window). Unlike service
fulfilment, these workflows are not triggered by a network service
provisioning request from the OSS or Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document examines use cases in which multi-layer coordination is
initiated by a network service request from the OSS and/or Orchestration
layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke
multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one
spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-Labeled Unicast (BGP-LU) (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document explores inter-domain TE options where the TE tunnel model,
as defined in <xref target="I-D.ietf-teas-yang-te"/>, applies at the MPI for both
intra-domain and inter-domain TE configurations. The assessment of
alternative options is beyond the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms are employed for inter-domain TE path
stitching. In the case of inter-domain SR-TE, a Segment Identifier (SID)
is used in Segment Routing (SR) to define a segment (a portion of the
path) within a network. A binding SID, a special type of SID, acts as a
reference to a precomputed SR policy or path.</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> employs technology-specific
local protection mechanisms, such as Fast Reroute (FRR) for MPLS-TE or
Topology Independent Loop-Free Alternate (TI-LFA) for SR-TE. These
mechanisms operate with an awareness of the multi-technology TE path
properties, such as the Shared Risk Link Group (SRLG) path properties defined in <xref target="RFC8001"/>.</t>
            </li>
          </ul>
          <t>For inter-domain TE paths, it is assumed that each packet domain in
<xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> employs the same TE technology. The
stitching between two domains is achieved using inter-domain TE
mechanisms.</t>
          <t>In this scenario, a key function of the MDSC is to identify the
multi-domain and multi-layer TE paths for carrying L2/L3 VPN traffic
between PEs in different packet domains. The MDSC then relays this
information to the P-PNCs to ensure that the forwarding tables of the PEs
(e.g., VRF) are correctly configured, allowing the L2/L3 VPN traffic to
be routed over the designated multi-domain and multi-layer TE paths.</t>
          <t>The selection of the TE path should consider both the TE requirements and
the binding requirements of the L2/L3 VPN network service.</t>
          <t>In general, the binding requirements for a network service (e.g., L2/L3
VPN) can be categorized into three main cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The customer is asking for VPN isolation to dynamically create
and bind tunnels to the service so that they are not shared by
other services (e.g. VPN).  </t>
              <t>
The level of isolation can be different:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>Hard isolation with deterministic latency implies that the L2/L3
VPN requires a set of dedicated TE tunnels. These tunnels neither
share resources with other services, nor compete for bandwidth with
other tunnels, ensuring deterministic latency performance.</t>
                </li>
                <li>
                  <t>Hard isolation but without deterministic characteristics</t>
                </li>
                <li>
                  <t>Soft isolation means the tunnels associated with L2/L3 VPN
are dedicated to that but can compete for bandwidth with
other tunnels.</t>
                </li>
              </ol>
            </li>
            <li>
              <t>The customer does not require isolation and may request a VPN service
where the associated tunnels are shared across multiple VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document examines scenarios in which a single TE path is used to
carry VPN traffic between PEs. Scenarios involving multiple parallel TE
paths for load-balancing VPN traffic between PEs are possible but are
beyond the scope of this document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When establishing a new TE path, the MDSC is responsible for coordinating
the path computation across multiple layers and domains.</t>
          <t>Based on the MDSC's knowledge of the underlying network topology and
configuration, there are three possible approaches for multi-layer and multi-domain path
computation:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC maintains an abstracted
TE topology view of all its packet and optical underlying domains.  </t>
              <t>
In this case, the MDSC lacks sufficient TE topology information to
perform multi-layer/multi-domain path computation. It delegates the
P-PNCs and O-PNCs to compute local paths within their respective
domains, then uses the returned information to compute the optimal
multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue for the P-PNC, as it lacks the ability
to perform single-domain/multi-layer path computation. It cannot
retrieve topology information from the O-PNCs or delegate optical path
computation to the O-PNCs. A possible solution is to include a CNC
function within the P-PNC to request the MDSC for multi-domain
optical path computation, as shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could involve relying on the MDSC recursive hierarchy,
as defined in Section 4.1 of <xref target="RFC8453"/>, where each IP and optical
domain pair has a "lower-level MDSC" (MDSC-L) for multi-layer
correlation, and a "higher-level MDSC" (MDSC-H) for multi-domain
coordination.  </t>
              <t>
In this case, the MDSC-H obtains an abstract view of the underlying
multi-layer domain topologies from its MDSC-L. Each MDSC-L gets the
full IP domain topology from the P-PNC and an abstracted view of the
optical domain topology from its O-PNC. Topology abstraction occurs
at the MPIs between MDSC-L and O-PNC, as well as between MDSC-L and
MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC can then only perform multi-domain/single-layer path
computation for the packet layer, where the path can be computed
optimally for the two packet domains.  </t>
              <t>
The MDSC must still need to delegate the O-PNCs to perform local path
computation within their domains. It uses the information from the
O-PNCs and its TE topology view of the multi-domain packet layer to
perform multi-layer/multi-domain path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such a case, the MDSC has all the information needed to perform
multi-domain/multi-layer path computation without relying on PNCs.  </t>
              <t>
This approach, however, may present scalability issues. As discussed
in
Section 2.2 of <xref target="I-D.ietf-teas-yang-path-computation"/>, performing
path
computation for optical networks in the MDSC is particularly
challenging,
as optimal paths also depend on vendor-specific optical attributes,
which may vary across domains if provided by different vendors.</t>
            </li>
          </ol>
          <t>This document examines scenarios where the MDSC adopts the partial
summarization approach to enable multi-domain and multi-layer path
computation.</t>
          <t>Typically, O-PNCs are responsible for optical path computation within
their respective domains. When setting up a network service, they must
consider connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may impact the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>,
used by the O-PNC for optical path computation, are not exposed at the
MPI and therefore are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an
IGP area or an Autonomous System (AS) within the same operator network,
is controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for establishing TE paths between any two PEs
or BRs within their controlled domains, as requested by the MDSC. They
also provide topology information to the MDSC to enable efficient
network coordination.</t>
        <t>For example, in inter-domain SR-TE, setting up a bidirectional
SR-TE path from PE13 in Domain 1 to PE23 in Domain 2, as shown in
<xref target="fig-vpn-path"/>, requires the MDSC to coordinate the following actions:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1: Push a SID list to PE13, including the Binding SID
associated with the SR-TE path in Domain 2, with PE23 as the target
destination (forward direction).</t>
          </li>
          <li>
            <t>P-PNC2: Push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1, with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are responsible for the
following:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer, single-domain local TE path computation,
when requested by the MDSC, between two PEs (for single-domain
end-to-end TE path) or between PEs and BRs for an inter-domain TE
path selected by the MDSC.</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
for the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting a new TE path setup, the MDSC provides the P-PNCs
with the explicit path to be created or modified. In other words, the
MDSC communicates the complete list of nodes involved in the path
(strict mode). The P-PNC is then responsible for setting up the
explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide the P-PNC
with a loose path and per-domain TE constraints. The P-PNC can then
select the complete path within its domain.</t>
        <t>In this case, the P-PNC must signal back to the MDSC which path it has chosen, allowing the MDSC to track relevant resource utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC
touches PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two
paths with the same topology metric, e.g., BR21 - P24 - PE23 and
BR21 - BR22 - PE23, but with different loads. It may prefer to steer
traffic on the latter as it is less loaded.</t>
        <t>For the purposes of this document, it is assumed that the MDSC always
provides the explicit list of all hops to the P-PNCs to set up or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination
is handled by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>Provide the MDSC with an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation when requested by
the MDSC;</t>
          </li>
          <li>
            <t>Perform optical tunnel set up when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by the O-PNC to perform intra-domain topology
discovery and path setup are typically vendor-specific and outside
the scope of this document.</t>
        <t>Depending on the optical network type, TE topology abstraction, path
computation, and path setup can be single-layer (either OTN or DWDM)
or multi-layer OTN/DWDM. In the latter case, multi-layer coordination
between the OTN and DWDM layers is handled by the O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all MPI
interfaces between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation from <xref target="RFC7951"/>, is assumed to be used at these
interfaces. Additionally, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to comply with the Network Management Datastore
Architecture (NMDA) from <xref target="RFC8342"/>, are assumed to be used at
these MPI and MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models applicable to the Packet
and Optical MPIs. Some of these YANG data models may be optional,
depending on the specific network configuration detailed in
<xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module
defined in <xref target="RFC8525"/> is used to allow the MDSC to discover the
set of YANG modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology"
YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>, which augments the TE
Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the
"ietf-flexi-grid-topology" YANG module of
<xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid, and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC can use the following client signal YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service"
YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the
"ietf-eth-tran-service" YANG module of
<xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet"
YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the
generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments
the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of
<xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface. The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are key extensions enabling the use of
PCE/PCEP for ACTN.</t>
        <t>Since PCEP supports path computation in both packet and optical
networks, it is well-suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> outlines H-PCE applicability for
inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that PCEP can be used in conjunction with the YANG data models
described in the rest of this document. Depending on whether ACTN is
deployed in a greenfield or brownfield, two options are possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface to each PNC to
discover all TE information and request TE tunnels. It may perform
full multi-layer path computation or delegate path computation to
the underlying PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. We need only one type of
interface (RESTCONF) and use the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a
single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MSDC needs to discover the underlying PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of the equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest-level link termination points (LTPs) in
the topology view and corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and
<xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM node).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for
MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the
ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layer alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example, a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in
<xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs,
the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: once CBR client LTP is
reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>
for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is
reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the
O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is
reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X
and Y are
used to associate the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In the case of a multi-layer DWDM/OTN network domain, multi-layer
intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in
<xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based
or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>,
associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link, and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in
<xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used to report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of
<xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship
between the IP network
topology and the MPLS-TE network topology depend on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links,
inter-domain
Ethernet links or access links, as described in detail in
<xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as Link Layer Discover Protocol LLDP
<xref target="IEEE_802.1AB"/>, which are outside the scope of this document, and
reported at the MPIs within the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>We assume that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet
technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a
gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/>
should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in
one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an an IP domain and an adjacent
optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an
inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are
discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>A more detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of
<xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other link discovery options are possible but not described in this
document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the
encoding of the plug-id namespace and the specific LLDP information
reported within the plug-id value, such as the Chassis ID and Port ID
mandatory TLVs, is implementation-specific and needs to be consistent
across all PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers, making it more viable for
inter-domain Ethernet links. For cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable when
possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>,
and the optical nodes snoop the LLDP packets received from the local
Ethernet interface and report the extracted information, such as the
Chassis ID, Port ID, and System Name TLVs, to the O-PNCs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and do not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching
the plug-id values of the two LTPs reported by adjacent O-PNC and
P-PNCs. In case LLDP snooping is used, the P-PNC reports the LLDP
information sent by the corresponding Ethernet interface on the IP
router, while the O-PNC reports the LLDP information received by the
corresponding Ethernet interface on the optical node, e.g., between
LTP 5-0 on PE13 and LTP 7-0 on NE11, as shown in
<xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating
a cross-technology Ethernet link is reported by an O-PNC in the
Ethernet topology, the OTN topology model, or both, depending on the
type of corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet
links is based solely on the LLDP information sent by the Ethernet
interfaces of the routers and snooped by the Ethernet interfaces of
the optical nodes. Therefore, the MDSC can discover these links even
before optical paths, supporting overlay multi-technology IP links,
are set up.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link supporting an
inter-domain IP link by matching the plug-id values of the two
Ethernet LTPs reported by adjacent P-PNCs. The P-PNCs report the
LLDP information being sent and received from the corresponding
Ethernet interfaces, e.g., between Ethernet LTP 3-1 on BR11 and
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology
Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface
on an IP router terminates a cross-technology Ethernet link or an
inter-domain Ethernet link, it must report at the MPI two Ethernet
LTPs representing the same Ethernet interface, e.g., both Ethernet
LTP 3-0 and Ethernet LTP 3-1, supported by LTP 3-0, as shown in
<xref target="fig-inter-domain-link"/>.</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) represents the physical adjacency between
the Ethernet interface on an IP router and the Ethernet interface on
its physically adjacent node. This node can be either an IP router
(in the case of a single-technology Ethernet link) or an optical node
(in the case of a cross-technology Ethernet link). Therefore, as
described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information sent
by the corresponding Ethernet interface on the IP router, such as
{BR11,3} and {BR21,4} plug-id values reported by the Ethernet LTP
3-0 on BR11 and the Ethernet LTP 4-0 on BR21, as shown in
<xref target="fig-inter-domain-link"/>.</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g.,
LTP 3-0 in BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to
discover the logical adjacency between Ethernet interfaces on IP routers,
which can be either single-technology or multi-technology. Therefore,
the P-PNC reports, within the plug-id attribute of this LTP, the LLDP
information sent and received by the corresponding Ethernet interface
on the IP router, such as the {BR11,3,BR21,4} plug-id values reported
by the Ethernet LTP 3-1 on BR11 and the Ethernet LTP 4-1 on BR21, as
shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in the case of inter-domain Ethernet links,
the MDSC cannot discover, using the LLDP information reported in the
plug-id attributes, the physical adjacency between two Ethernet
interfaces on physically adjacent IP routers, because these plug-id
values do not match, such as the {BR11,3} and {BR21,4} plug-id values
shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms outside the scope of this document, that the Ethernet
interfaces on the IP routers either terminate a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit to report the physical Ethernet LTPs when it
knows, through mechanisms outside the scope of this document, that
the corresponding Ethernet interfaces terminate inter-domain Ethernet
links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs supported by the two Ethernet LTPs terminating an inter-domain
Ethernet link, discovered as described in
<xref target="ip-inter-domain-link-discovery"/>,
e.g., between IP LTP 3-2 on BR21 and IP LTP 4-2 on BR22, supported
respectively by Ethernet LTP 3-1 on BR11 and Ethernet LTP 4-1 on BR21,
as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting
multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in
<xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The Ethernet interface 5 on the P13 router is terminating two Ethernet
abstract links:
- The multi-technology intra-domain Ethernet link between logical
Ethernet LTP 5-1 on PE13 and the logical Ethernet LTP 6-1 on BR11;
- The cross-technology Ethernet link, which is supporting that
multi-technology intra-domain Ethernet link, between the physical
Ethernet LTPs 5-0 on PE13 and the physical Ethernet LTP 7-0 on the
optical NE11.</t>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in
<xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the
multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0
on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in
<xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology
intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels
support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in the case of intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency between
two Ethernet interfaces on physically adjacent IP routers, because
the plug-id values do not match, such as {PE13,1} and {P16,2}, as shown
in <xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical
intra-domain Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0
on P16, as shown in <xref target="fig-intra-domain-link"/>, if it knows a priori,
using mechanisms outside the scope of this document, that all Ethernet
interfaces on the IP routers terminate either a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
through mechanisms outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of LAG groups within its
domain and report each intra-domain LAG as an Ethernet bundle link
within the Ethernet topology exposed at the MPI.</t>
        <t>This is done by bundling multiple single-domain Ethernet links, as
shown in <xref target="fig-lag"/>. For example, the Ethernet bundled link between
Ethernet LTP 5-1 on BR21 and Ethernet LTP 6-1 on P24 is built from
the Ethernet links set up respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and
multi-technology intra-domain LAG links are the same, with the only
difference being whether the bundled links are single-technology or
multi-technology.</t>
        <t>However, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document, as they do not imply cross-technology
coordination
between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the
P-PNC to discover the configuration of LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>It is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP can be
configured on a LAG group (Aggregated Port) and/or on any number of its
LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP
session
configured at LAG member (Aggregation Port)level and another one for
the LLDP session configured at LAG group (Aggregated Port)level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in
<xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP
session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the
multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined
in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry
the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>The are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and
<xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but have not enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>;, and
that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 has not enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay
optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
            <li>
              <t>a new multi-domain TE path needs to be setup between PE13 and
 PE23, e.g., either because existing TE paths between PE13 and
 PE23 are not able to meet the TE and binding requirements of
 the L2/L3 VPN service or because there is no TE path between
 PE13 and PE23.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial
summarization, the MDSC will use the TE topology information provided
by the P-PNCs and the results of the path computation requests sent to
the O-PNCs, as described in <xref target="optical-path-computation"/>, to compute
the multi-layer/multi-domain path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When setting up the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration needed to realize the requested
network service across the appropriate optical and packet domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in
<xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of ECMP, between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to set up a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain the
new TE path to use the underlay optical tunnel setup between BR21 and
P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to set up the requested path and returns
the information needed for multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC2, knowing the node and adjacency SIDs
assigned within its domain, can install the proper SR policy or
hierarchical policies within BR21 and return to the MDSC the binding
SID assigned to this policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to set up a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain the new TE path
to use the underlay optical tunnel setup between PE13 and BR11,
specifying which inter-domain link should be used to send traffic to
BR21 and the information for multi-domain TE path stitching, as
described in <xref target="te-path-discovery"/> (e.g., in inter-domain SR-TE, the
binding SID assigned by P-PNC2 to the corresponding SR policy in BR21).
The P-PNC1 properly configures the routers within its domain to set up
the requested path and the multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC1, knowing the node and adjacency SIDs
assigned within its domain and the PE SID assigned by P-PNC1 to the
inter-domain link between BR11 and BR21, along with the binding SID
assigned by P-PNC2, installs the proper policy or policies within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, set up or modified,
the MDSC can request both P-PNCs to configure the L3VPN and its binding
with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, optical path
computation is usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate single-domain optical path computation to the O-PNC.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/>,
and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its underlay
optical tunnel. Therefore, the properties of an optical path between
two optical TTPs, as computed by the O-PNC, can be used by the MDSC to
infer the properties of the associated multi-layer single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two
options to request an O-PNC to perform optical path computation: either
via a "compute-only" TE tunnel path, using the generic TE tunnel YANG
data model defined in <xref target="I-D.ietf-teas-yang-te"/>, or via the path
computation RPC defined in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one
relationship between a multi-technology intra-domain IP link and its
underlay optical tunnel.</t>
        <t>Therefore, to set up a new multi-technology intra-domain IP link,
the MDSC requires the O-PNC to set up the optical tunnel (using either
the WDM Tunnel model or the OTN Tunnel model, if optional OTN switching
is supported) within the optical network and steer client traffic
between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based transport)
or the Transparent CBR Client Signal Model (for transparent transport).</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request O-PNC1 to set up an optical tunnel between optical
TTPs (7) on NE11 and (8) on NE12 and steer client traffic over this
tunnel between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of
<xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been set up and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, outside
the scope of this document, are used between the adjacency of the two
IP routers' ports, the P-PNC can automatically discover the underlay
multi-technology single-domain Ethernet link set up by the MDSC and
report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if no automatic discovery mechanisms are used, the MDSC
can configure this multi-technology single-domain Ethernet link at
the MPI of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., LTP 5-1 on
PE13 and 6-1 on BR11, as shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been
configured by the MDSC or discovered by the P-PNC, the corresponding
multi-technology single-domain IP link can also be configured either
by the MDSC or the P-PNC.</t>
        <t>This document assumes that the IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology
single-domain Ethernet link is either discovered by the P-PNC or
configured by the MDSC at the MPI. However, if LAG is supported, the
P-PNC lacks enough information to determine whether the discovered or
configured multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs, and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All other configuration is
provided by the P-PNC.</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request P-PNC1 to set up a multi-technology single-domain
IP link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11, supported
by the multi-technology single-domain Ethernet link between ETH LTP
5-1 on PE13 and ETH LTP 6-1 on BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain
IP link and, once finished, reports it to the MDSC within the IP
topology exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates a new Ethernet bundled link at the MPI (using the
bundled-link container defined in <xref target="RFC8795"/>), bundling the
multi-technology single-domain Ethernet link(s) being created, as
described above.</t>
          <t>When a new LAG link is created, it is recommended to configure the
minimum number of active member links required to consider the LAG
link as up. For example, a LAG link with three members can be
considered up when only one member link fails and down when at least
two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>
and is identified as a gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to set up an Ethernet bundled link between Ethernet LTP 5-1 on
BR21 and Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between Ethernet LTP 1-1 on BR21 and
Ethernet LTP 2-1 on P24.</t>
          <t>It is also worth noting that the MDSC needs to create the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just configured Ethernet
bundled link, following the same procedure described in
<xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP
5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates the configuration of an existing Ethernet bundled link at the
MPI, adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as up
may also need to be updated.</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to add the multi-technology single-domain Ethernet link set up
between Ethernet LTP 3-1 on BR21 and Ethernet LTP 4-1 on P24 to the
existing Ethernet bundle link set up between Ethernet LTP 5-1 on node
BR21 and Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also update
the bandwidth information of the multi-technology single-domain IP link
supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties
of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC
and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to
ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This document assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the
<xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to set it up,
properly specifying the path constraints, such as the explicit path,
to ensure the P-PNC sets up a TE path that meets the end-to-end TE
and binding constraints and uses the optical tunnels set up by the
MDSC to support this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of
both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the
<xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the
P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model
supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>[Editor's Note:] Add some text about the protection options (to
further discuss whether to put this text here or in
<xref target="multi-technology-link-setup"/>).</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms.
For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case
of MPLS-TE domain or the TI-LFA local protection, as defined in
<xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The
mechanisms to request the configuration TI-LFA local protection for SR-TE
paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG
models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection
configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of
MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain
IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services, and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list
of TE tunnel(s) that should be used to forward L2/L3 VPN traffic
between the two PEs terminating the listed TE tunnel(s). If the list
contains more than one TE tunnel for the same pair of PEs, these TE
tunnels are used to load balance the associated L2/L3 VPN traffic
between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic between multiple TE
tunnels for the same PE pair in a way other than load balancing is
identified as a gap requiring further work and is outside the scope
of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document shows that the IETF YANG models
described in <xref target="yang"/> provide useful support for Packet Optical Integration
(POI) scenarios for resource discovery (network topology, service,
tunnels, and network inventory discovery), as well as for supporting
multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>The following gaps were identified that may need to be addressed by
the relevant IETF Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;.</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in
<xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks:
this gap has been
identified in <xref target="optical-path-computation"/> and the solution in
<xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between a common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links
and the
UNI topology discover mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of
<xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that being
able to use WSON and Flexi-grid topology models together (through
multi-inheritance) is not only useful for mixed fixed-grid and
flexible-grid DWDM network topologies but also the only viable option
for a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would also support optical tunnel setup in the case
of a mixed CWDM and DWDM network topology.</t>
      <t>Although not analyzed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs enhancement
to support scenarios where multiple parallel TE paths are used in
load-balancing to carry traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to
discover the intra-domain Ethernet and IP links. While LLDP provides
valuable information for network management and troubleshooting, it also
presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP
packets could be captured using a packet sniffer. An attacker can
leverage this information to gain insights into the network topology,
device types, and configurations, which could be used for further
attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device
types, software versions, and network configuration details. This might
help an attacker identify vulnerable devices or configurations that can
be exploited to gain unauthorized access or escalate privileges within
the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device,
they could manipulate LLDP information to advertise false device
information, leading to potential misconfigurations or trust
relationships being exploited. This can disrupt network operations or
redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP
packets, an attacker could overwhelm network devices or management
systems, potentially leading to a denial of service where legitimate
network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other
network devices. Potentially, this might lead to incorrect network
mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for
authenticating the source of LLDP messages, which means that devices
accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement
several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing
untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who
can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify
unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known
vulnerabilities that could be exploited through information gathered via
LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for
automating the management and control of multi-layer Service Providers'
transport networks, combining the optical and microwave transport layer
with the packet (IP/MPLS) layer to create a more efficient and scalable
network infrastructure. This approach is particularly beneficial for
Service Providers and large enterprises dealing with high bandwidth
demands and looking for cost-effective ways to expand their networks.
However, integrating these two traditionally separate network layers
involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of
integration between the packet and optical layers is critical.
Furthermore, this includes determining whether to pursue a loose
integration (keeping layers distinct but coordinated) or a tight
integration (combining layers more closely, potentially at the hardware
level) coordinated via the MDSC. Accurate forecasting and planning will
also be essential to ensure that the integrated ACTN infrastructure can
handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various
vendors. Ensuring that packet and optical devices can interoperate
seamlessly and the PNCs can manage them is crucial for a successful
integration. The Service Provider must also check with the vendors to
ensure they support the IETF-based technologies outlined in this
document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require
comprehensive monitoring solutions that can provide visibility to the
PNCs across both packet and optical layers. Identifying and diagnosing
issues may become more complex with integrated layers. Telemetry data may
also be required to collect lower-layer networking health and consider
network and service performance. This topic is further discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient,
including considerations for automatic protection switching and fast
reroute mechanisms that span both layers. Fault isolation and recovery
may become more challenging, as issues in one layer can have cascading
effects on the other. Effective fault management strategies must be in
place to quickly identify and rectify such issues. This topic is further
discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-38"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="11" month="August" year="2025"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-25"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-09"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-18"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="3" month="July" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-05"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="4" month="June" year="2025"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-23"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="July" year="2025"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-16"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu Shah" initials="H." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-03"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu Shah" initials="H." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7424">
          <front>
            <title>Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks</title>
            <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="A. Ghanwani" initials="A." surname="Ghanwani"/>
            <author fullname="N. So" initials="N." surname="So"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Demands on networking infrastructure are growing exponentially due to bandwidth-hungry applications such as rich media applications and inter-data-center communications. In this context, it is important to optimally use the bandwidth in wired networks that extensively use link aggregation groups and equal-cost multipaths as techniques for bandwidth scaling. This document explores some of the mechanisms useful for achieving this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7424"/>
          <seriesInfo name="DOI" value="10.17487/RFC7424"/>
        </reference>
        <reference anchor="RFC2991">
          <front>
            <title>Multipath Issues in Unicast and Multicast Next-Hop Selection</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next-hop should be used for a given data packet. This memo summarizes current practices, problems, and solutions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2991"/>
          <seriesInfo name="DOI" value="10.17487/RFC2991"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for a Wavelength Switched Optical Network (WSON), while it is known
   as Impairment-Aware Routing and Spectrum Assignment (IA-RSA) for a
   Spectrum Switched Optical Network (SSON).

   This document provides a YANG data model for the impairment-aware TE
   topology in optical networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-19"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8001">
          <front>
            <title>RSVP-TE Extensions for Collecting Shared Risk Link Group (SRLG) Information</title>
            <author fullname="F. Zhang" initials="F." role="editor" surname="Zhang"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="C. Margaria" initials="C." surname="Margaria"/>
            <author fullname="M. Hartley" initials="M." surname="Hartley"/>
            <author fullname="Z. Ali" initials="Z." surname="Ali"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides extensions for Resource Reservation Protocol - Traffic Engineering (RSVP-TE), including GMPLS, to support automatic collection of Shared Risk Link Group (SRLG) information for the TE link formed by a Label Switched Path (LSP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8001"/>
          <seriesInfo name="DOI" value="10.17487/RFC8001"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-17"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>   This document describes how profiles of the Traffic Engineering (TE)
   Topology Model, defined in RFC8795, can be used to address
   applications beyond "Traffic Engineering".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-03"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="12" month="February" year="2025"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-08"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-06"/>
        </reference>
        <reference anchor="I-D.poidt-teas-actn-poi-assurance">
          <front>
            <title>Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) for Packet Optical Integration (POI) service assurance</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Paolo Volpato" initials="P." surname="Volpato">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Prasenjit Manna" initials="P." surname="Manna">
              <organization>Cisco</organization>
            </author>
            <date day="26" month="February" year="2025"/>
            <abstract>
              <t>   This document extends the analysis of the applicability of
   Abstraction and Control of TE Networks (ACTN) architecture to Packet
   Optical Integration (POI) to cover multi-layer service assurance
   scenarios.  Specifically, the ACTN architecture enables the detection
   and handling of different failures that may happen either at the
   optical or the packet layer.  It is assumed that the underlying
   transport optical network carries end-to-end IP services such as
   L2VPN or L3VPN connectivity services, with specific Service Level
   Agreement (SLA) requirements.

   Existing IETF protocols and data models are identified for each
   multi-layer (packet over optical) service assurance scenario with a
   specific focus on the MPI (Multi-Domain Service Coordinator to
   Provisioning Network Controllers Interface) in the ACTN architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-poidt-teas-actn-poi-assurance-05"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2699?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Acess, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can
request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually
operator-specific, typically it would be using a RESTCONF/YANG interface
with a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between
the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in
<xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and
<xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from a
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model
<xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must reroute IP traffic before the events takes place. It should
be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the
link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after
checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port
with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has
been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since a IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the tranponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are
vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not
provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>The authors would like to thank Young Lee for his valuable input on the initial discusssions which have triggered this work as well as for his contribution to the first drafts of this document.</t>
      <t>Previous versions of document were prepared using
2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Zheng" fullname="Yanlei Zheng">
        <organization>China Unicom</organization>
        <address>
          <email>zhengyanlei@chinaunicom.cn</email>
        </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Nvidia</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
