<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-17" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-17"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>FiberCop</organization>
      <address>
        <email>fabio.peruzzini@fibercop.com</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="December" day="22"/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 120?>

<t>This document explores the applicability of the Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration (POI)
within the context of IP/MPLS and optical internetworking. It examines
the YANG data models defined by the IETF that enable an ACTN-based
deployment architecture and highlights specific scenarios pertinent
to Service Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology scenario (packet over optical), particularly
emphasising the Multi-Domain Service Coordinator to Provisioning
Network Controller Interface (MPI) within the ACTN architecture</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The full automation of management and control for Service Providers'
transport  networks, spanning IP/MPLS, optical, and microwave
technologies, is crucial to addressing customer demands for high-bandwidth
applications, such as ultra-fast  mobile broadband for 5G and fiber
connectivity services. The Abstraction and  Control of TE Networks (ACTN)
architecture and interfaces enable the automation  and efficient
operation of complex optical and IP/MPLS networks using standardized
interfaces and data models. This approach supports a broad spectrum of
network services that can be requested by upper-layer applications,
meeting diverse  service-level requirements from a network perspective,
such as physical diversity, latency, bandwidth, and topology.</t>
      <t>Packet Optical Integration (POI) represents an advanced application of
traffic engineering. In wide-area networks, packet networks based on the
Internet Protocol (IP), often augmented with Multiprotocol Label
Switching (MPLS) or Segment Routing  (SR), are typically implemented over
an optical transport network utilizing Dense Wavelength Division
Multiplexing (DWDM), occasionally with an optional Optical Transport
Network (OTN) layer.</t>
      <t>There are significant technical differences between the packet and optical technologies
(e.g., routers versus optical switches) and their associated network engineering
and planning approaches (e.g., inter-domain peering optimization in IP
networks versus managing physical impairments in DWDM systems or
operating on vastly different time scales). Additionally, customer
requirements often differ between packet and optical networks, and it is
common for Service Providers to use different vendors for each domain. As
a result, the operation of these complex packet and optical networks is
often siloed, as each technology domain requires specialized skill sets.</t>
      <t>As a consequence, in many existing network deployments, packet and optical networks are engineered and operated independently.</t>
      <t>This separation is inefficient for several reasons.
Firstly, integrating packet and optical
networks can significantly reduce capital expenditures (CAPEX) and
operational expenditures (OPEX).
Secondly, multi-technology topology insights can optimize troubleshooting (e.g., alarm correlation) and enhance network operation (e.g., coordination of maintenance events). Additionally, detailed inventory and planning information can also improve service assurance quality, such as detecting constraint violations or lack of resource diversity.
Thirdly, multi-technology traffic engineering enables more efficient use of
available network capacity (e.g., coordination of restoration).
Furthermore, provisioning workflows can be simplified or automated across
layers, facilitating capabilities such as bandwidth-on-demand and
streamlined maintenance activities.</t>
      <t>The ACTN framework facilitates seamless integration of packet and optical
networks across multiple technologies and vendors.
This is achieved through separated Provisioning Network Controllers (PNCs) for both packet and optical domains,
which hide the complexities of the technical differences between the packet and optical technologies while
providing sufficient abstract information that allows the Multi-Domain Service Coordinator (MDSC)
to provide multi-layer coordination between packet and optical networks.</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using
Resource Reservation Protocol (RSVP) Traffic Engineering (TE)-based or SR
-TE-based, forwarding plane mechanisms.</t>
      <t>This document outlines key scenarios for Packet Optical Integration (POI)
from the perspective of the packet service layer and highlights the
necessary coordination between packet and optical layers to enhance POI
deployment and operation. These scenarios emphasize multi-domain packet
networks functioning as clients of optical networks.</t>
      <t>This document analyzes the scenario in which packet networks support
multi-domain TE paths. The optical networks may
consist of a DWDM network, an OTN network (without a DWDM layer), or a
multi-layer OTN/DWDM network. Additionally, DWDM networks can be either
fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the degree of standardization and identifying potential
gaps are crucial for evaluating the feasibility of integrating packet and
optical DWDM domains (with an optional OTN layer) from an end-to-end,
multi-vendor service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from Customer Edge (CE) to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>Per <xref target="RFC8309"/>, a network service provides
Connectivity between customer sites and the Internet or between
customer sites across the operator's network and across
the Internet. In the context of this document, a network service
is enabled by Provider Edge (PE) to PE configuration, including
both the network service layer (VRFs, RT import/export policies
configuration) and the network transport layer (e.g., RSVP-TE
Label Switched Paths (LSPs)). This includes the configuration
(on the PE side) of the interface towards the CE (e.g., VLAN, IP
address, routing protocol, etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>Short for "switching technology domain", defined as "region" in
<xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control
domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>Part of the network under the control of a single PNC instance. It is
subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Optical PNC (O-PNC):</dt>
          <dd>
            <t>A PNC controlling an optical network domain.</t>
          </dd>
          <dt>Packet PNC (P-PNC):</dt>
          <dd>
            <t>A PNC controlling a packet network domain.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A bidirectional link interface, as defined in <xref section="3.6.1" sectionFormat="of" target="RFC4397"/>.</t>
          </dd>
          <dt>makeLink:</dt>
          <dd>
            <t>A bidirectional data link, as defined in <xref section="3.5.1" sectionFormat="of" target="RFC4397"/>.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>A link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>A link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers, supported by two cross-technology Ethernet links
interconnected through an optical tunnel.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link connecting an Ethernet interface on an IP router to an
Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers within the same P-PNC domain, supported by two
cross-technology Ethernet links interconnected through an optical tunnel.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document examines various deployment scenarios for Packet and
Optical Integration (POI), where the ACTN hierarchy is implemented to
manage a multi-technology, multi-domain network comprising two optical
domains and two packet domains, as illustrated in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, as defined in <xref target="RFC8453"/>, is utilized to manage
this multi-technology, multi-domain network. In this topology, each
Packet PNC (P-PNC) is responsible for controlling its respective packet
domain, while each Optical PNC (O-PNC) is tasked with managing its
optical domain. The packet domains controlled by the P-PNCs can represent
Autonomous Systems (ASes), as defined in <xref target="RFC1930"/>, or Interior
Gateway Protocol (IGP) areas within the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The Multi-Domain Service Coordinator (MDSC) is responsible for
orchestrating the entire multi-domain, multi-technology network,
encompassing both packet and optical domains. A standardized interface,
the Multi-Domain Service Coordinator to Provisioning Network Controller
Interface (MPI), enables the MDSC to interact with various Provisioning
Network Controllers (O-PNCs and P-PNCs).</t>
      <t>The MPI interface provides the MDSC with an abstracted topology,
concealing technology-specific details of the network and selectively
hiding topology information based on the chosen abstraction policy. The
level of abstraction is determined by the configuration parameters of the
P-PNC and O-PNC, such as offering potential connectivity information
between any Provider Edge (PE) and Border Router (BR) within a packet
network.</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries of the packet and optical domains are
congruent. In other words, each optical domain exclusively supports
connectivity between IP routers within a single packet domain.</t>
        </li>
        <li>
          <t>There are no physical links directly connecting optical domains.
Inter-domain physical links exist only under the following conditions:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links
within this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Scenarios using coherent optical interfaces on the IP routers are outside the scope of this document.</t>
      <t>This document analyzes scenarios in which all multi-technology IP links
supported by the optical network are intra-domain (intra-AS/intra-area),
such as PE-BR, PE-P, BR-P, and P-P IP links. Consequently, inter-domain
IP links are always single-technology connections, supported by
single-technology Ethernet links between physically adjacent IP routers.</t>
      <t>As described in <xref target="RFC7424"/>, in order to increase the bandwidth between two adjacent routers, multiple Ethernet links can be setup between adjacent routers using either Link Aggregation Groups (LAGs) <xref target="IEEE_802.1AX"/> or Equal Cost Multi-Path (ECMP) <xref target="RFC2991"/>.</t>
      <t>Therefore, if inter-domain links between optical domains exist, they
would be utilized to support multi-domain optical services, which fall
outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated
ROADM function with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or
without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for coordinating multiple
packet and optical domains in a multi-domain, multi-technology
environment. It facilitates multi-layer and multi-domain L2/L3 VPN
network services as requested by the OSS/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service-related and network-related functions are combined into a
single, monolithic implementation. This implementation manages
end-customer service requests received through the Customer MDSC
Interface (CMI) and adapts the corresponding network models. An example
of this architecture is illustrated in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation may opt to separate the service-related and
network-related functions into distinct functional entities, as outlined
in <xref target="RFC8309"/> and Section 4.2 of <xref target="RFC8453"/>. In this approach, the
MDSC is decomposed into a top-level Service Orchestrator, which
interfaces with the customer through the Customer MDSC Interface (CMI),
and a Network Orchestrator, which interfaces southbound with the PNCs.
The interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation may choose to split the MDSC functions into a
"higher-level MDSC" (MDSC-H) and "lower-level MDSCs" (MDSC-Ls). The
MDSC-H is responsible for multi-technology coordination across packet and
optical domains, while the MDSC-Ls handle domain-specific coordination.
Specifically, an Optical MDSC-L manages multi-domain coordination between
the O-PNCs, and a Packet MDSC-L manages multi-domain coordination between
the P-PNCs. This approach is illustrated, for example, in Figure 9 of
<xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An alternative implementation may choose to integrate the MDSC and
P-PNC functions in a single entity.</t>
          </li>
        </ol>
        <t>In current service provider network deployments, the MDSC's Northbound
Interface (NBI) typically connects to an OSS/Orchestration layer rather
than a CNC. In this scenario, the MDSC is limited to performing Network
Orchestration functions, as described in <xref target="RFC8309"/> (point 2 above).
Consequently, the MDSC handles network service requests received from the
OSS and/or Orchestration.</t>
        <t>The functionality of the OSS and/or Orchestration layer, as well as its
interface with the MDSC, is typically operator-specific and falls outside
the scope of this draft. Therefore, this document assumes that the OSS
and/or Orchestration layer requests the MDSC to provision L2/L3 VPN
network services through mechanisms not covered in this document.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS and/or Orchestration  layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates these workflows to perform multi-layer and
multi-domain optimizations and/or maintenance activities (e.g., rerouting
LSPs and their associated services when a resource, such as a fiber, is
placed in maintenance mode during a maintenance window). Unlike service
fulfilment, these workflows are not triggered by a network service
provisioning request from the OSS or Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document examines use cases in which multi-layer coordination is
initiated by a network service request from the OSS and/or Orchestration
layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke
multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one
spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-Labeled Unicast (BGP-LU) (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document explores inter-domain TE options where the TE tunnel model,
as defined in <xref target="I-D.ietf-teas-yang-te"/>, applies at the MPI for both
intra-domain and inter-domain TE configurations. The assessment of
alternative options is beyond the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms are employed for inter-domain TE path
stitching. In the case of inter-domain SR-TE, a Segment Identifier (SID)
is used in Segment Routing (SR) to define a segment (a portion of the
path) within a network. A binding SID, a special type of SID, acts as a
reference to a precomputed SR policy or path.</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> employs technology-specific
local protection mechanisms, such as Fast Reroute (FRR) for MPLS-TE or
Topology Independent Loop-Free Alternate (TI-LFA) for SR-TE. These
mechanisms operate with an awareness of the multi-technology TE path
properties, such as the Shared Risk Link Group (SRLG) path properties defined in <xref target="RFC8001"/>.</t>
            </li>
          </ul>
          <t>For inter-domain TE paths, it is assumed that each packet domain in
<xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> employs the same TE technology. The
stitching between two domains is achieved using inter-domain TE
mechanisms.</t>
          <t>In this scenario, a key function of the MDSC is to identify the
multi-domain and multi-layer TE paths for carrying L2/L3 VPN traffic
between PEs in different packet domains. The MDSC then relays this
information to the P-PNCs to ensure that the forwarding tables of the PEs
(e.g., VRF) are correctly configured, allowing the L2/L3 VPN traffic to
be routed over the designated multi-domain and multi-layer TE paths.</t>
          <t>The selection of the TE path should consider both the TE requirements and
the binding requirements of the L2/L3 VPN network service.</t>
          <t>In general, the binding requirements for a network service (e.g., L2/L3 VPN)
depend on the the service isolation requirements (e.g., as discussed in <xref section="8" sectionFormat="of" target="RFC9543"/>)
and can be categorized into three main cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The L2/L3 VPN is bound to a set of dedicated TE tunnels, which neither
share resources with other services, nor compete for bandwidth with
other tunnels, ensuring deterministic latency performance.</t>
            </li>
            <li>
              <t>The L2/L3 VPN is bound to a set of dedicated TE tunnels, which can
compete for bandwidth with other tunnels.</t>
            </li>
            <li>
              <t>The L2/L3 VPN is bound to a set of TE tunnels which can be shared with other services.</t>
            </li>
            <li>
              <t>The customer does not require isolation and may request a VPN service
where the associated tunnels are shared across multiple VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document examines scenarios in which a single TE path is used to
carry VPN traffic between PEs. Scenarios involving multiple parallel TE
paths for load-balancing VPN traffic between PEs are possible but are
beyond the scope of this document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When establishing a new TE path, the MDSC is responsible for coordinating
the path computation across multiple layers and domains.</t>
          <t>Based on the MDSC's knowledge of the underlying network topology and
configuration, there are three possible approaches for multi-layer and multi-domain path
computation:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC maintains an abstracted
TE topology view of all its packet and optical underlying domains.  </t>
              <t>
In this case, the MDSC lacks sufficient TE topology information to
perform multi-layer/multi-domain path computation. It delegates the
P-PNCs and O-PNCs to compute local paths within their respective
domains, then uses the returned information to compute the optimal
multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue for the P-PNC, as it lacks the ability
to perform single-domain/multi-layer path computation. It cannot
retrieve topology information from the O-PNCs or delegate optical path
computation to the O-PNCs. A possible solution is to include a CNC
function within the P-PNC to request the MDSC for multi-domain
optical path computation, as shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could involve relying on the MDSC recursive hierarchy,
as defined in Section 4.1 of <xref target="RFC8453"/>, where each IP and optical
domain pair has a "lower-level MDSC" (MDSC-L) for multi-layer
correlation, and a "higher-level MDSC" (MDSC-H) for multi-domain
coordination.  </t>
              <t>
In this case, the MDSC-H obtains an abstract view of the underlying
multi-layer domain topologies from its MDSC-L. Each MDSC-L gets the
full IP domain topology from the P-PNC and an abstracted view of the
optical domain topology from its O-PNC. Topology abstraction occurs
at the MPIs between MDSC-L and O-PNC, as well as between MDSC-L and
MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC can then only perform multi-domain/single-layer path
computation for the packet layer, where the path can be computed
optimally for the two packet domains.  </t>
              <t>
The MDSC must still need to delegate the O-PNCs to perform local path
computation within their domains. It uses the information from the
O-PNCs and its TE topology view of the multi-domain packet layer to
perform multi-layer/multi-domain path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such a case, the MDSC has all the information needed to perform
multi-domain/multi-layer path computation without relying on PNCs.  </t>
              <t>
This approach, however, may present scalability issues. As discussed
in
Section 2.2 of <xref target="I-D.ietf-teas-yang-path-computation"/>, performing
path
computation for optical networks in the MDSC is particularly
challenging,
as optimal paths also depend on vendor-specific optical attributes,
which may vary across domains if provided by different vendors.</t>
            </li>
          </ol>
          <t>This document examines scenarios where the MDSC adopts the partial
summarization approach to enable multi-domain and multi-layer path
computation.</t>
          <t>Typically, O-PNCs are responsible for optical path computation within
their respective domains. When setting up a network service, they must
consider connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may impact the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>,
used by the O-PNC for optical path computation, are not exposed at the
MPI and therefore are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an
IGP area or an Autonomous System (AS) within the same operator network,
is controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for establishing TE paths between any two PEs
or BRs within their controlled domains, as requested by the MDSC. They
also provide topology information to the MDSC to enable efficient
network coordination.</t>
        <t>For example, in inter-domain SR-TE, setting up a bidirectional
SR-TE path from PE13 in Domain 1 to PE23 in Domain 2, as shown in
<xref target="fig-vpn-path"/>, requires the MDSC to coordinate the following actions:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1: Push a SID list to PE13, including the Binding SID
associated with the SR-TE path in Domain 2, with PE23 as the target
destination (forward direction).</t>
          </li>
          <li>
            <t>P-PNC2: Push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1, with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are responsible for the
following:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer, single-domain local TE path computation,
when requested by the MDSC, between two PEs (for single-domain
end-to-end TE path) or between PEs and BRs for an inter-domain TE
path selected by the MDSC.</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
for the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting a new TE path setup, the MDSC provides the P-PNCs
with the explicit path to be created or modified. In other words, the
MDSC communicates the complete list of nodes involved in the path
(strict mode). The P-PNC is then responsible for setting up the
explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide the P-PNC
with a loose path and per-domain TE constraints. The P-PNC can then
select the complete path within its domain.</t>
        <t>In this case, the P-PNC must signal back to the MDSC which path it has chosen, allowing the MDSC to track relevant resource utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC
touches PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two
paths with the same topology metric, e.g., BR21 - P24 - PE23 and
BR21 - BR22 - PE23, but with different loads. It may prefer to steer
traffic on the latter as it is less loaded.</t>
        <t>For the purposes of this document, it is assumed that the MDSC always
provides the explicit list of all hops to the P-PNCs to set up or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination
is handled by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>Provide the MDSC with an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation when requested by
the MDSC;</t>
          </li>
          <li>
            <t>Perform optical tunnel set up when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by the O-PNC to perform intra-domain topology
discovery and path setup are typically vendor-specific and outside
the scope of this document.</t>
        <t>Depending on the optical network type, TE topology abstraction, path
computation, and path setup can be single-layer (either OTN or DWDM)
or multi-layer OTN/DWDM. In the latter case, multi-layer coordination
between the OTN and DWDM layers is handled by the O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all MPI
interfaces between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation from <xref target="RFC7951"/>, is assumed to be used at these
interfaces. Additionally, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to comply with the Network Management Datastore
Architecture (NMDA) from <xref target="RFC8342"/>, are assumed to be used at
these MPI and MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models applicable to the Packet
and Optical MPIs. Some of these YANG data models may be optional,
depending on the specific network configuration detailed in
<xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module
defined in <xref target="RFC8525"/> is used to allow the MDSC to discover the
set of YANG modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology"
YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>, which augments the TE
Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the
"ietf-flexi-grid-topology" YANG module of
<xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid, and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC can use the following client signal YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service"
YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the
"ietf-eth-tran-service" YANG module of
<xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet"
YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the
generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments
the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of
<xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface. The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are key extensions enabling the use of
PCE/PCEP for ACTN.</t>
        <t>Since PCEP supports path computation in both packet and optical
networks, it is well-suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> outlines H-PCE applicability for
inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that PCEP can be used in conjunction with the YANG data models
described in the rest of this document. Depending on whether ACTN is
deployed in a greenfield or brownfield, two options are possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface to each PNC to
discover all TE information and request TE tunnels. It may perform
full multi-layer path computation or delegate path computation to
the underlying PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. We need only one type of
interface (RESTCONF) and use the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a
single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MSDC needs to discover the underlying PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of the equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest-level link termination points (LTPs) in
the topology view and corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and
<xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM node).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for
MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the
ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layer alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example, a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in
<xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs,
the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: once CBR client LTP is
reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>
for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is
reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the
O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is
reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X
and Y are
used to associate the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In the case of a multi-layer DWDM/OTN network domain, multi-layer
intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in
<xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based
or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>,
associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link, and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in
<xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used to report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of
<xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship
between the IP network
topology and the MPLS-TE network topology depend on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links,
inter-domain
Ethernet links or access links, as described in detail in
<xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as Link Layer Discover Protocol LLDP
<xref target="IEEE_802.1AB"/>, which are outside the scope of this document, and
reported at the MPIs within the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>We assume that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet
technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a
gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/>
should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in
one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an an IP domain and an adjacent
optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an
inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are
discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>A more detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of
<xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other link discovery options are possible but not described in this
document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the
encoding of the plug-id namespace and the specific LLDP information
reported within the plug-id value, such as the Chassis ID and Port ID
mandatory TLVs, is implementation-specific and needs to be consistent
across all PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers, making it more viable for
inter-domain Ethernet links. For cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable when
possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>,
and the optical nodes snoop the LLDP packets received from the local
Ethernet interface and report the extracted information, such as the
Chassis ID, Port ID, and System Name TLVs, to the O-PNCs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and do not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching
the plug-id values of the two LTPs reported by adjacent O-PNC and
P-PNCs. In case LLDP snooping is used, the P-PNC reports the LLDP
information sent by the corresponding Ethernet interface on the IP
router, while the O-PNC reports the LLDP information received by the
corresponding Ethernet interface on the optical node, e.g., between
LTP 5-0 on PE13 and LTP 7-0 on NE11, as shown in
<xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating
a cross-technology Ethernet link is reported by an O-PNC in the
Ethernet topology, the OTN topology model, or both, depending on the
type of corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet
links is based solely on the LLDP information sent by the Ethernet
interfaces of the routers and snooped by the Ethernet interfaces of
the optical nodes. Therefore, the MDSC can discover these links even
before optical paths, supporting overlay multi-technology IP links,
are set up.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link supporting an
inter-domain IP link by matching the plug-id values of the two
Ethernet LTPs reported by adjacent P-PNCs. The P-PNCs report the
LLDP information being sent and received from the corresponding
Ethernet interfaces, e.g., between Ethernet LTP 3-1 on BR11 and
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology
Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface
on an IP router terminates a cross-technology Ethernet link or an
inter-domain Ethernet link, it must report at the MPI two Ethernet
LTPs representing the same Ethernet interface, e.g., both Ethernet
LTP 3-0 and Ethernet LTP 3-1, supported by LTP 3-0, as shown in
<xref target="fig-inter-domain-link"/>.</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) represents the physical adjacency between
the Ethernet interface on an IP router and the Ethernet interface on
its physically adjacent node. This node can be either an IP router
(in the case of a single-technology Ethernet link) or an optical node
(in the case of a cross-technology Ethernet link). Therefore, as
described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information sent
by the corresponding Ethernet interface on the IP router, such as
{BR11,3} and {BR21,4} plug-id values reported by the Ethernet LTP
3-0 on BR11 and the Ethernet LTP 4-0 on BR21, as shown in
<xref target="fig-inter-domain-link"/>.</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g.,
LTP 3-0 in BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to
discover the logical adjacency between Ethernet interfaces on IP routers,
which can be either single-technology or multi-technology. Therefore,
the P-PNC reports, within the plug-id attribute of this LTP, the LLDP
information sent and received by the corresponding Ethernet interface
on the IP router, such as the {BR11,3,BR21,4} plug-id values reported
by the Ethernet LTP 3-1 on BR11 and the Ethernet LTP 4-1 on BR21, as
shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in the case of inter-domain Ethernet links,
the MDSC cannot discover, using the LLDP information reported in the
plug-id attributes, the physical adjacency between two Ethernet
interfaces on physically adjacent IP routers, because these plug-id
values do not match, such as the {BR11,3} and {BR21,4} plug-id values
shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms outside the scope of this document, that the Ethernet
interfaces on the IP routers either terminate a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit to report the physical Ethernet LTPs when it
knows, through mechanisms outside the scope of this document, that
the corresponding Ethernet interfaces terminate inter-domain Ethernet
links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs supported by the two Ethernet LTPs terminating an inter-domain
Ethernet link, discovered as described in
<xref target="ip-inter-domain-link-discovery"/>,
e.g., between IP LTP 3-2 on BR21 and IP LTP 4-2 on BR22, supported
respectively by Ethernet LTP 3-1 on BR11 and Ethernet LTP 4-1 on BR21,
as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting
multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in
<xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The Ethernet interface 5 on the P13 router is terminating two Ethernet
abstract links:</t>
        <ul spacing="normal">
          <li>
            <t>The multi-technology intra-domain Ethernet link between logical
Ethernet LTP 5-1 on PE13 and the logical Ethernet LTP 6-1 on BR11;</t>
          </li>
          <li>
            <t>The cross-technology Ethernet link, which is supporting that
multi-technology intra-domain Ethernet link, between the physical
Ethernet LTPs 5-0 on PE13 and the physical Ethernet LTP 7-0 on the
optical NE11.</t>
          </li>
        </ul>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in
<xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the
multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0
on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in
<xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology
intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels
support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in the case of intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency between
two Ethernet interfaces on physically adjacent IP routers, because
the plug-id values do not match, such as {PE13,1} and {P16,2}, as shown
in <xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical
intra-domain Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0
on P16, as shown in <xref target="fig-intra-domain-link"/>, if it knows a priori,
using mechanisms outside the scope of this document, that all Ethernet
interfaces on the IP routers terminate either a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
through mechanisms outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of LAG groups within its
domain and report each intra-domain LAG as an Ethernet bundle link
within the Ethernet topology exposed at the MPI.</t>
        <t>This is done by bundling multiple single-domain Ethernet links, as
shown in <xref target="fig-lag"/>. For example, the Ethernet bundled link between
Ethernet LTP 5-1 on BR21 and Ethernet LTP 6-1 on P24 is built from
the Ethernet links set up respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and
multi-technology intra-domain LAG links are the same, with the only
difference being whether the bundled links are single-technology or
multi-technology.</t>
        <t>However, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document, as they do not imply cross-technology
coordination
between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the
P-PNC to discover the configuration of LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>It is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP can be
configured on a LAG group (Aggregated Port) and/or on any number of its
LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP
session
configured at LAG member (Aggregation Port)level and another one for
the LLDP session configured at LAG group (Aggregated Port)level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in
<xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP
session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the
multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined
in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry
the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>The are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and
<xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but have not enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>;, and
that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 has not enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay
optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
          </ul>
        </li>
        <li>
          <t>a new multi-domain TE path needs to be setup between PE13 and
PE23, e.g., either because existing TE paths between PE13 and
PE23 are not able to meet the TE and binding requirements of
the L2/L3 VPN service or because there is no TE path between
PE13 and PE23.</t>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial
summarization, the MDSC will use the TE topology information provided
by the P-PNCs and the results of the path computation requests sent to
the O-PNCs, as described in <xref target="optical-path-computation"/>, to compute
the multi-layer/multi-domain path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When setting up the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration needed to realize the requested
network service across the appropriate optical and packet domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in
<xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of ECMP, between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to set up a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain the
new TE path to use the underlay optical tunnel setup between BR21 and
P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to set up the requested path and returns
the information needed for multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC2, knowing the node and adjacency SIDs
assigned within its domain, can install the proper SR policy or
hierarchical policies within BR21 and return to the MDSC the binding
SID assigned to this policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to set up a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain the new TE path
to use the underlay optical tunnel setup between PE13 and BR11,
specifying which inter-domain link should be used to send traffic to
BR21 and the information for multi-domain TE path stitching, as
described in <xref target="te-path-discovery"/> (e.g., in inter-domain SR-TE, the
binding SID assigned by P-PNC2 to the corresponding SR policy in BR21).
The P-PNC1 properly configures the routers within its domain to set up
the requested path and the multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC1, knowing the node and adjacency SIDs
assigned within its domain and the PE SID assigned by P-PNC1 to the
inter-domain link between BR11 and BR21, along with the binding SID
assigned by P-PNC2, installs the proper policy or policies within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, set up or modified,
the MDSC can request both P-PNCs to configure the L3VPN and its binding
with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, optical path
computation is usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate single-domain optical path computation to the O-PNC.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/>,
and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its underlay
optical tunnel. Therefore, the properties of an optical path between
two optical TTPs, as computed by the O-PNC, can be used by the MDSC to
infer the properties of the associated multi-layer single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two
options to request an O-PNC to perform optical path computation: either
via a "compute-only" TE tunnel path, using the generic TE tunnel YANG
data model defined in <xref target="I-D.ietf-teas-yang-te"/>, or via the path
computation RPC defined in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one
relationship between a multi-technology intra-domain IP link and its
underlay optical tunnel.</t>
        <t>Therefore, to set up a new multi-technology intra-domain IP link,
the MDSC requires the O-PNC to set up the optical tunnel (using either
the WDM Tunnel model or the OTN Tunnel model, if optional OTN switching
is supported) within the optical network and steer client traffic
between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based transport)
or the Transparent CBR Client Signal Model (for transparent transport).</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request O-PNC1 to set up an optical tunnel between optical
TTPs (7) on NE11 and (8) on NE12 and steer client traffic over this
tunnel between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of
<xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been set up and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, outside
the scope of this document, are used between the adjacency of the two
IP routers' ports, the P-PNC can automatically discover the underlay
multi-technology single-domain Ethernet link set up by the MDSC and
report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if no automatic discovery mechanisms are used, the MDSC
can configure this multi-technology single-domain Ethernet link at
the MPI of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., LTP 5-1 on
PE13 and 6-1 on BR11, as shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been
configured by the MDSC or discovered by the P-PNC, the corresponding
multi-technology single-domain IP link can also be configured either
by the MDSC or the P-PNC.</t>
        <t>This document assumes that the IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology
single-domain Ethernet link is either discovered by the P-PNC or
configured by the MDSC at the MPI. However, if LAG is supported, the
P-PNC lacks enough information to determine whether the discovered or
configured multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs, and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All other configuration is
provided by the P-PNC.</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request P-PNC1 to set up a multi-technology single-domain
IP link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11, supported
by the multi-technology single-domain Ethernet link between ETH LTP
5-1 on PE13 and ETH LTP 6-1 on BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain
IP link and, once finished, reports it to the MDSC within the IP
topology exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates a new Ethernet bundled link at the MPI (using the
bundled-link container defined in <xref target="RFC8795"/>), bundling the
multi-technology single-domain Ethernet link(s) being created, as
described above.</t>
          <t>When a new LAG link is created, it is recommended to configure the
minimum number of active member links required to consider the LAG
link as up. For example, a LAG link with three members can be
considered up when only one member link fails and down when at least
two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>
and is identified as a gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to set up an Ethernet bundled link between Ethernet LTP 5-1 on
BR21 and Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between Ethernet LTP 1-1 on BR21 and
Ethernet LTP 2-1 on P24.</t>
          <t>It is also worth noting that the MDSC needs to create the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just configured Ethernet
bundled link, following the same procedure described in
<xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP
5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates the configuration of an existing Ethernet bundled link at the
MPI, adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as up
may also need to be updated.</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to add the multi-technology single-domain Ethernet link set up
between Ethernet LTP 3-1 on BR21 and Ethernet LTP 4-1 on P24 to the
existing Ethernet bundle link set up between Ethernet LTP 5-1 on node
BR21 and Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also update
the bandwidth information of the multi-technology single-domain IP link
supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties
of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC
and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to
ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This document assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the
<xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to set it up,
properly specifying the path constraints, such as the explicit path,
to ensure the P-PNC sets up a TE path that meets the end-to-end TE
and binding constraints and uses the optical tunnels set up by the
MDSC to support this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of
both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the
<xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the
P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model
supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms.
For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case
of MPLS-TE domain or the TI-LFA local protection, as defined in
<xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The
mechanisms to request the configuration TI-LFA local protection for SR-TE
paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG
models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection
configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of
MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain
IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services, and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list
of TE tunnel(s) that should be used to forward L2/L3 VPN traffic
between the two PEs terminating the listed TE tunnel(s). If the list
contains more than one TE tunnel for the same pair of PEs, these TE
tunnels are used to load balance the associated L2/L3 VPN traffic
between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic between multiple TE
tunnels for the same PE pair in a way other than load balancing is
identified as a gap requiring further work and is outside the scope
of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document shows that the IETF YANG models
described in <xref target="yang"/> provide useful support for Packet Optical Integration
(POI) scenarios for resource discovery (network topology, service,
tunnels, and network inventory discovery), as well as for supporting
multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>The following gaps were identified that may need to be addressed by
the relevant IETF Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;.</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in
<xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks:
this gap has been
identified in <xref target="optical-path-computation"/> and the solution in
<xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between a common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links
and the
UNI topology discover mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of
<xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that being
able to use WSON and Flexi-grid topology models together (through
multi-inheritance) is not only useful for mixed fixed-grid and
flexible-grid DWDM network topologies but also the only viable option
for a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would also support optical tunnel setup in the case
of a mixed CWDM and DWDM network topology.</t>
      <t>Although not analyzed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs enhancement
to support scenarios where multiple parallel TE paths are used in
load-balancing to carry traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to
discover the intra-domain Ethernet and IP links. While LLDP provides
valuable information for network management and troubleshooting, it also
presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP
packets could be captured using a packet sniffer. An attacker can
leverage this information to gain insights into the network topology,
device types, and configurations, which could be used for further
attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device
types, software versions, and network configuration details. This might
help an attacker identify vulnerable devices or configurations that can
be exploited to gain unauthorized access or escalate privileges within
the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device,
they could manipulate LLDP information to advertise false device
information, leading to potential misconfigurations or trust
relationships being exploited. This can disrupt network operations or
redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP
packets, an attacker could overwhelm network devices or management
systems, potentially leading to a denial of service where legitimate
network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other
network devices. Potentially, this might lead to incorrect network
mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for
authenticating the source of LLDP messages, which means that devices
accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement
several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing
untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who
can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify
unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known
vulnerabilities that could be exploited through information gathered via
LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for
automating the management and control of multi-layer Service Providers'
transport networks, combining the optical and microwave transport layer
with the packet (IP/MPLS) layer to create a more efficient and scalable
network infrastructure. This approach is particularly beneficial for
Service Providers and large enterprises dealing with high bandwidth
demands and looking for cost-effective ways to expand their networks.
However, integrating these two traditionally separate network layers
involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of
integration between the packet and optical layers is critical.
Furthermore, this includes determining whether to pursue a loose
integration (keeping layers distinct but coordinated) or a tight
integration (combining layers more closely, potentially at the hardware
level) coordinated via the MDSC. Accurate forecasting and planning will
also be essential to ensure that the integrated ACTN infrastructure can
handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various
vendors. Ensuring that packet and optical devices can interoperate
seamlessly and the PNCs can manage them is crucial for a successful
integration. The Service Provider must also check with the vendors to
ensure they support the IETF-based technologies outlined in this
document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require
comprehensive monitoring solutions that can provide visibility to the
PNCs across both packet and optical layers. Identifying and diagnosing
issues may become more complex with integrated layers. Telemetry data may
also be required to collect lower-layer networking health and consider
network and service performance. This topic is further discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient,
including considerations for automatic protection switching and fast
reroute mechanisms that span both layers. Fault isolation and recovery
may become more challenging, as issues in one layer can have cascading
effects on the other. Effective fault management strategies must be in
place to quickly identify and rectify such issues. This topic is further
discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths, and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="2" month="November" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-40"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="11" month="August" year="2025"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-25"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="15" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-10"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="17" month="March" year="2025"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-18"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-06"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="1" month="December" year="2025"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-24"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="July" year="2025"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-16"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu Shah" initials="H." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-03"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu Shah" initials="H." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC4397">
          <front>
            <title>A Lexicography for the Interpretation of Generalized Multiprotocol Label Switching (GMPLS) Terminology within the Context of the ITU-T's Automatically Switched Optical Network (ASON) Architecture</title>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>Generalized Multiprotocol Label Switching (GMPLS) has been developed by the IETF to facilitate the establishment of Label Switched Paths (LSPs) in a variety of data plane technologies and across several architectural models. The ITU-T has specified an architecture for the control of Automatically Switched Optical Networks (ASON).</t>
              <t>This document provides a lexicography for the interpretation of GMPLS terminology within the context of the ASON architecture.</t>
              <t>It is important to note that GMPLS is applicable in a wider set of contexts than just ASON. The definitions presented in this document do not provide exclusive or complete interpretations of GMPLS concepts. This document simply allows the GMPLS terms to be applied within the ASON context. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4397"/>
          <seriesInfo name="DOI" value="10.17487/RFC4397"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7424">
          <front>
            <title>Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks</title>
            <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="A. Ghanwani" initials="A." surname="Ghanwani"/>
            <author fullname="N. So" initials="N." surname="So"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Demands on networking infrastructure are growing exponentially due to bandwidth-hungry applications such as rich media applications and inter-data-center communications. In this context, it is important to optimally use the bandwidth in wired networks that extensively use link aggregation groups and equal-cost multipaths as techniques for bandwidth scaling. This document explores some of the mechanisms useful for achieving this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7424"/>
          <seriesInfo name="DOI" value="10.17487/RFC7424"/>
        </reference>
        <reference anchor="RFC2991">
          <front>
            <title>Multipath Issues in Unicast and Multicast Next-Hop Selection</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next-hop should be used for a given data packet. This memo summarizes current practices, problems, and solutions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2991"/>
          <seriesInfo name="DOI" value="10.17487/RFC2991"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for a Wavelength Switched Optical Network (WSON), while it is known
   as Impairment-Aware Routing and Spectrum Assignment (IA-RSA) for a
   Spectrum Switched Optical Network (SSON).

   This document provides a YANG data model for the impairment-aware TE
   topology in optical networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-20"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8001">
          <front>
            <title>RSVP-TE Extensions for Collecting Shared Risk Link Group (SRLG) Information</title>
            <author fullname="F. Zhang" initials="F." role="editor" surname="Zhang"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="C. Margaria" initials="C." surname="Margaria"/>
            <author fullname="M. Hartley" initials="M." surname="Hartley"/>
            <author fullname="Z. Ali" initials="Z." surname="Ali"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides extensions for Resource Reservation Protocol - Traffic Engineering (RSVP-TE), including GMPLS, to support automatic collection of Shared Risk Link Group (SRLG) information for the TE link formed by a Label Switched Path (LSP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8001"/>
          <seriesInfo name="DOI" value="10.17487/RFC8001"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="12" month="October" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-18"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE-centric Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes how profiles of the Topology YANG data model,
   defined in RFC8795, can be used to address applications in Traffic
   Engineering aware (TE-aware) deployments, irrespective of whether
   they are TE-centric or not.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-04"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="12" month="February" year="2025"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="14" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-11"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-06"/>
        </reference>
        <reference anchor="I-D.poidt-teas-actn-poi-assurance">
          <front>
            <title>Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) for Packet Optical Integration (POI) service assurance</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Paolo Volpato" initials="P." surname="Volpato">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Prasenjit Manna" initials="P." surname="Manna">
              <organization>Cisco</organization>
            </author>
            <date day="26" month="February" year="2025"/>
            <abstract>
              <t>   This document extends the analysis of the applicability of
   Abstraction and Control of TE Networks (ACTN) architecture to Packet
   Optical Integration (POI) to cover multi-layer service assurance
   scenarios.  Specifically, the ACTN architecture enables the detection
   and handling of different failures that may happen either at the
   optical or the packet layer.  It is assumed that the underlying
   transport optical network carries end-to-end IP services such as
   L2VPN or L3VPN connectivity services, with specific Service Level
   Agreement (SLA) requirements.

   Existing IETF protocols and data models are identified for each
   multi-layer (packet over optical) service assurance scenario with a
   specific focus on the MPI (Multi-Domain Service Coordinator to
   Provisioning Network Controllers Interface) in the ACTN architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-poidt-teas-actn-poi-assurance-05"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2629?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Acess, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can
request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually
operator-specific, typically it would be using a RESTCONF/YANG interface
with a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between
the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in
<xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and
<xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from a
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model
<xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must reroute IP traffic before the events takes place. It should
be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the
link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after
checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port
with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has
been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since a IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the tranponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are
vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not
provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>The authors would like to thank Young Lee for his valuable input on the initial discusssions which have triggered this work as well as for his contribution to the first drafts of this document.</t>
      <t>The authors would like to thank Adrian Farrel for his review and comments to this document.</t>
      <t>Previous versions of document were prepared using
2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Zheng" fullname="Yanlei Zheng">
        <organization>China Unicom</organization>
        <address>
          <email>zhengyanlei@chinaunicom.cn</email>
        </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Nvidia</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
