<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-nmrg-network-digital-twin-arch-07" category="info" consensus="true" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Network Digital Twin Concept">Network Digital Twin: Concepts and Reference Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-07"/>
    <author fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Hongwei Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>yanghongwei@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Xiaodong Duan">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>duanxiaodong@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Diego Lopez">
      <organization>Telefonica I+D</organization>
      <address>
        <postal>
          <city>Seville</city>
          <country>Spain</country>
        </postal>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <author fullname="Antonio Pastor">
      <organization>Telefonica I+D</organization>
      <address>
        <postal>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>antonio.pastorperales@telefonica.com</email>
      </address>
    </author>
    <author fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Christian Jacquenet">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>christian.jacquenet@orange.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="26"/>
    <area>IRTF</area>
    <workgroup>Network Management</workgroup>
    <keyword>Emulation</keyword>
    <keyword>Simulation</keyword>
    <keyword>What-if scenario</keyword>
    <keyword>optimization</keyword>
    <keyword>service delivery</keyword>
    <keyword>automation</keyword>
    <keyword>model</keyword>
    <keyword>data-driven management</keyword>
    <keyword>data models</keyword>
    <keyword>closed-loop</keyword>
    <keyword>assurance</keyword>
    <keyword>fulfillment</keyword>
    <abstract>
      <?line 254?>

<t>Digital Twin technology has been seen as a rapid adoption technology
in Industry 4.0. The application of Digital Twin technology in the
networking field is meant to develop various rich network applications,
realize efficient and cost-effective data-driven network management,
and accelerate network innovation.</t>
      <t>This document presents an overview of the concepts of Digital Twin Network,
provides the basic definitions and a reference architecture, lists a set of
application scenarios, and discusses such technology's benefits and key
challenges.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Management Research Group mailing list (nmrg@irtf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmrg"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/cheneyzhoucheng/network-digital-twin"/>.</t>
    </note>
  </front>
  <middle>
    <?line 267?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The rapid expansion of network scale and the increasing demands on these networks
necessitate their dynamic adaptation to customer needs, presenting significant
challenges for network operators. Network operation and maintenance are becoming
increasingly complex due to the advanced nature of the networks and the sophisticated
services they provide. Consequently, introducing innovations in network technologies,
management, and operations is becoming more challenging due to the high risk of
disrupting existing services and the elevated costs of trials without reliable
emulation platforms.</t>
      <t>A Digital Twin is a real-time digital representation of a physical entity. It features
virtual-reality interrelation and real-time interaction, iterative operation and process
optimization, and full life-cycle, comprehensive data-driven network infrastructure.
Digital twins have gained widespread recognition in academic publications and are now
being widely adopted for Industry 4.0 use cases.  The reader may refer to <xref target="concept"/> for
more details,.</t>
      <t>A digital twin for networks can be created by applying Digital Twin technologies to
networks, resulting in a virtual replica of real network facilities (emulation). A
Network Digital Twin (NDT) is an advanced platform for network emulation, serving as a tool
for scenario planning, impact analysis, and change management. Unlike conventional
network simulation, it features an interactive virtual-real mapping and a data-driven
approach to establish closed-loop network automation.</t>
      <t>Integrating a Network Digital Twin into network management allows engineers to assess,
model, and refine optimization strategies under real conditions but in a risk-free environment.
This ensures that only the most effective changes are implemented in the real network, following
thorough validation and control checks. Moreover, a network digital twin captures and aggregates
critical data for analyzing the root causes of network failures, anomalies, vulnerabilities, etc.
It also offers a sandbox for testing hypotheses, exercising mitigation scenarios, and validating
data-driven insights without affecting end-users.</t>
      <t>Through the real-time data interaction between the real network and its twin network(s),
the Network Digital Twin (NDT) platform will provide the data for NDT-based applications
and network designers to achieve greater simplification, automation, resilience testing
("what-if scenarios"), and full life-cycle operation and infrastructure maintenance.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="acronyms-and-abbreviations">
        <name>Acronyms and Abbreviations</name>
        <t>IBN:  Intent-Based Networking</t>
        <t>AI:   Artificial Intelligence</t>
        <t>CI/CD:  Continuous Integration/Continuous Delivery</t>
        <t>ML:  Machine Learning</t>
        <t>OAM:  Operations, Administration, and Maintenance</t>
      </section>
      <section anchor="definitions">
        <name>Definitions</name>
        <t>This document makes use of the following terms:</t>
        <dl>
          <dt>Digital Twin:</dt>
          <dd>
            <t>Digital counterpart of a physical system (twin) that captures
its attributes, behavior, and interactions and is (continually)
updated with the latter's performance, maintenance, and health
status data throughout the physical system's life cycle.</t>
          </dd>
          <dt>Network Digital Twin:</dt>
          <dd>
            <t>A digital representation that is used in the context of
Networking and whose physical counterpart is a data network
(e.g., provider network or enterprise network).  This is also
called, digital twin for networks. See more in <xref target="def"/>.</t>
          </dd>
          <dt>Physical Network:</dt>
          <dd>
            <t>Object, system, process, software, or environment that the
digital twin is designed to replicate and represent
virtually.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="concept">
      <name>Introduction of Concepts</name>
      <section anchor="background-of-digital-twin">
        <name>Background of Digital Twin</name>
        <t>The concept of the "twin" dates to the National Aeronautics and Space
Administration (NASA) Apollo program in the 1970s, where a replica of
space vehicles on Earth was built to mirror the condition of the
equipment during the mission <xref target="Rosen2015"/>.</t>
        <t>In 2003, Digital Twin was attributed to John Vickers by Michael
Grieves in his Product Lifecycle Management (PLM) course as "virtual
digital representation equivalent to physical products"
<xref target="Grieves2014"/>.  Digital twin can be defined as a virtual instance of
a physical system (twin) that is continually updated with the
latter's performance, maintenance, and health status data throughout
the physical system's life cycle <xref target="Madni2019"/>.  By providing a living
copy of physical system, digital twins bring numerous advantages,
such as accelerated business processes, enhanced productivity, and
faster innovation with reduced costs.  So far, digital twin has been
successfully applied in the fields of intelligent manufacturing,
smart city, or complex system operation and maintenance to help with
not only object design and testing, but also management aspects
<xref target="Tao2019"/>.</t>
        <t>Compared with 'digital model' and 'digital shadow', the key difference
of 'digital twin' is the direction of data between the physical and virtual
systems <xref target="Fuller2020"/>. Typically, when using a digital twin, the (twin)
system is generated. Then a partial or full synchronization of data flows in
both directions between physical and digital components, so that control data
can be sent, and changes between systems' physical and digital objectives are
automatically represented. This behavior is unlike a 'digital model' or 'digital
shadow', which are usually synchronized manually, lacking control data, and
might not have integrated a full cycle of data.</t>
        <t>At present (2024), there is no unified definition of digital twin
framework.  The industry, scientific research institutions, and
standards developing organizations are trying to define a general or
domain-specific framework of digital twin.  <xref target="Natis-Gartner2017"/>
proposed that building a digital twin of a physical entity requires
four key elements: model, data, monitoring, and uniqueness.
<xref target="Tao2019"/> proposed a five-dimensional framework of digital twin {PE,
VE, SS, DD, CN}, in which PE represents physical entity, VE
represents virtual entity, SS represents service, DD represents twin
data, and CN represents the connection between various components.
<xref target="ISO-2021"/> issued a draft standard for digital twin manufacturing
system, and proposed a reference framework including data collection
domain, device control domain, digital twin domain, and user domain.</t>
      </section>
      <section anchor="digital-twin-for-networks">
        <name>Digital Twin for Networks</name>
        <t>Communication networks provide a solid foundation for implementing
various 'digital twin' applications.  At the same time, in the face
of increasing business types, scale and complexity, a network itself
also needs to use digital twin technology to seek enhanced and
optimized solutions compared to relying solely on the real network.
The motivation for Network Digital Twin can somehow be traced back to
some earlier concepts, such as "shadow MIB", inductive modeling
techniques, parallel systems, etc.  Since 2017, the application of
digital twin technology in the field of communication networks has
gradually been researched as illustrated by the (non-exhaustive) list
of examples that are listed hereafter.</t>
        <t>Within academia, <xref target="Dong2019"/> established the digital twin of 5G mobile
edge computing (MEC) network, used the twin offline to train the
resource allocation optimization and normalized energy-saving
algorithm based on reinforcement learning, and then updated the
scheme to MEC network.  <xref target="Dai2020"/> established a digital twin edge
network for mobile edge computing system, in which a twin edge server
is used to evaluate the state of entity server, and the twin mobile
edge computing system provides data for training offloading strategy.
<xref target="Nguyen2021"/> discusses how to deploy a digital twin for complex 5G
networks.  <xref target="Hong2021"/> presents a digital twin platform towards
automatic and intelligent management for data center networks, and
then proposes a simplified the workflows of network service
management.  <xref target="Dai2022"/> gives the concept of digital twin and proposes
an digital twin-enabled vehicular edge computing (VEC) network, where
digital twin can enable adaptive network management via the two-
closed loops between physical VEC networks and digital twins.  In
addition, international workshops dedicated to digital twin in
networking field have already appeared, such as IEEE DTPI 2021&amp;2022-
Digital Twin Network Online Session <xref target="DTPI2021"/>, <xref target="DTPI2022"/>, and IEEE
NOMS 2022 - TNT workshop <xref target="TNT2022"/>.</t>
        <t>Although the application of digital twin technology in networking has
started, the research of digital twin for networks technology is
still in its infancy.  Current applications focus on specific
scenarios (such as network optimization), where Network Digital Twin
is just used as a network simulation tool to solve the problem of
network operation and maintenance.  Combined with the characteristics
of digital twin technology and its application in other industries,
this document believes that Network Digital Twin can be regarded as
an indispensable part of the overall network system and provides a
general architecture involving the whole life cycle of a "real"
(typically, physical) network in the future, serving the application
of network innovative technologies such as network planning, construction,
maintenance and optimization, improving the automation and intelligence
level of the network.</t>
      </section>
    </section>
    <section anchor="def">
      <name>Characteristics of Network Digital Twin</name>
      <t>So far, there is no standard definition for characteristic of "network
digital twin" within the networking industry. This document introduces five
key elements (i.e., data, models, mapping, interfaces, and logic) to characterize
the Network Digital Twin. These five elements can be integrated into a network
management system to analyze, diagnose, emulate, and control the real network.
To that aim, a real-time and interactive mapping is required between the real
network and its virtual twin network.  Whether a Digital Twin supports all or
a subset of the functions above (i.e., analyze, diagnose, emulate, and control)
is deployment-specific.</t>
      <t>Referring to the characteristics of digital twins in other industries and the
characteristics of networking itself, the digital twin network should involve
at least five key elements: data, mapping, models, interfaces, and logic, as
shown in <xref target="kelem"/>. This provides the information to the application or entity
that consumes the information to analyze, diagnose, or control.</t>
      <figure anchor="kelem">
        <name>Key Elements of Network Digital Twin</name>
        <artwork align="center"><![CDATA[
+-------------------------------------------------+
|                     Logic:                      |
|  Analyze, Diagnose, Optimize, Control, Emulate  |
|                                                 |
+-------------------------------------------------+
 |          |                          |         |
 |  +-------------+            +--------------+  |
 |  |             |            |              |  |
 |  |  Mapping    |------------|  Interface   |  |
 |  |             |            |              |  |
 |  +-------------+            +--------------+  |
 |          |                          |         |
 |          |                          |         |
 |          | +----------------------+ |         |
 |          | | Network Digital Twin | |         |
 |          | +----------------------+ |         |
 |          |                          |         |
+------------+                        +-----------+
|            |                        |           |
|   Models   |                        |   Data    |
|            |------------------------|           |
+------------+                        +-----------+

]]></artwork>
      </figure>
      <dl>
        <dt>Data:</dt>
        <dd>
          <t>A Network Digital Twin should maintain historical data and/or
  real-time data (configuration data, operational state data,
  topology data, trace data, metric data, process data, etc.) about
  its real-world twin (i.e. real network) that are required by the
  models to represent and understand the states and behaviors of the
  real-world twin.</t>
        </dd>
        <dt/>
        <dd>
          <t>The data is characterized as the single source of "truth" and
  populated in the data repository, which provides timely and
  accurate data service support for building various models.</t>
        </dd>
        <dt>Models:</dt>
        <dd>
          <t>Models provide a basis for  emulating changes in the configuration,
  state or use of network elements and resources, providing information on
  how the real network operates and generating reasoning data that may be
  utilized in operational decision-making.</t>
        </dd>
        <dt/>
        <dd>
          <t>Various types of models including service models, data models, dataset models,
  transfer matrices, knowledge graphs etc.can be used to represent the real network
  assets and their behaviours, and composed to emulate network changes and behaviours,
  serving the analysis needs of various use case-based network applications.</t>
        </dd>
        <dt>Interfaces:</dt>
        <dd>
          <t>Standardized interfaces ensure the interoperability of network digital
  twin with real network operations systems. There are two major types of interfaces:
</t>
          <ul spacing="normal">
            <li>
              <t>The interface between the Network Digital Twin platform and the real network
infrastructure, directly or through an associated operations (i.e. planning,
control, management) system.</t>
            </li>
            <li>
              <t>The interface between Network Digital Twin platform and operations applications
that consume the information provided by the NDT.</t>
            </li>
          </ul>
        </dd>
        <dt/>
        <dd>
          <t>The former provides real-time data collection from the real network. The latter helps
  in delivering application requests to the Network Digital Twin platform and exposing
  the various platform capabilities to applications.</t>
        </dd>
        <dt>Mapping:</dt>
        <dd>
          <t>Used to identify the digital twin and the underlying entities and establish
  a real-time interactive relation between the real network and the twin network or
  between two twin networks. The mapping can be:</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>One to one (pairing, vertical): Synchronize between a real network and its virtual twin
    network with continuous flows.</t>
        </li>
        <li>
          <t>One to many (coupling, horizontal): Synchronize among virtual twin networks with
    occasional data exchange.</t>
        </li>
      </ul>
      <t>Such mappings provide a good visibility of actual status, making the digital twin suitable
  to analyze and understand what is going on in the real network. It also allows using the
  digital twin to optimize the performance and maintenance of the real network.</t>
      <t>The Network Digital Twin, constructed based on the four core technology elements, can provide
  crucial emulation-driven information to support analysis, diagnosis, and control of the real
  network, through its whole life cycle, with the help of optimization algorithms, management
  methods, and expert knowledge.</t>
      <t>The Network Digital Twin environment and its elements must be controlled and driven to support
  required  behaviors in use, e.g., to provide:</t>
      <ul spacing="normal">
        <li>
          <t>repeatability: that is the capacity to replicate network conditions on-demand.</t>
        </li>
        <li>
          <t>reproducibility: i.e., the ability to replay successions of events, possibly under
    controlled variations.</t>
        </li>
      </ul>
      <t>and "the mirroring pace and scope" should be controlled for a given twin usage.</t>
      <ul empty="true">
        <li>
          <t>Note: Real-time interaction is not always mandatory for all NDT use cases. For example, when
  assessing some configuration changes or emulating some innovative techniques, the digital twin
  can behave as an isolated simulation platform without the need of real-time telemetry data. It
  might be useful to have interactive mapping capability so that the validated changes can be evaluated
  under real network conditions whenever required by the testers. Whether real-time interaction between
  virtual and real network is mandatory is a configurable parameter. Adequate validation guards have to
  be enforced at both twin and physical network. Enabling real-time interaction in Network Digital Twin
  is a catalyst to achieving autonomous networks or self-driven network.</t>
        </li>
      </ul>
      <dl>
        <dt>Logic:</dt>
        <dd>
          <t>Network digital twin facilitates optimal resource allocation and configuration, enhancing
  efficiency and performance. They enable comprehensive troubleshooting maintenance and control by
  diagnosing issues in the digital twin. Moreover, Network Digital Twins play a crucial role in planning
  and deployment, allowing for the simulation of new designs and configurations to anticipate their effects
  before implementation.</t>
        </dd>
      </dl>
    </section>
    <section anchor="benefits-of-network-digital-twin">
      <name>Benefits of Network Digital Twin</name>
      <t>Network digital twin can help enabling closed-loop network management
across the entire lifecycle, from deployment and emulation, to
visualized assessment, physical deployment, and continuous
verification.  By doing so, network operators and end-users to some
extent, as allowed by specific application interfaces, can maintain a
global, systemic, and consistent view of the network.  Also, network
operators and/or enterprise user can safely exercise the enforcement
of network planning policies, deployment procedures, etc., without
jeopardizing the daily operation of the real network.</t>
      <t>The main difference between Network Digital Twin and simulation platforms
is the use of interactive virtual-real mapping to support integration of
model (e.g., emulation) based analysis in real network operations environments,
up to and including closed loops for network operations automation. Simulation
platforms can be considered as a predecessor of the Network Digital Twin, one example of such
a simulation platform is network simulator <xref target="NS-3"/>, which can be seen as
a variant of Network Digital Twin but with low fidelity and lacking
for interactive interfaces to the real network.  Compared with those
classical approaches, key benefits of Network Digital Twin can be
summarized as follows:</t>
      <ol group="bar" spacing="normal" type="(%c)"><li>
          <t>Using real-time data to establish high fidelity twins, the
 effectiveness of network simulation is higher; then the
 simulation cost will be relatively low.</t>
        </li>
        <li>
          <t>The impact and risk on running networks is low when automatically
applying configuration/policy changes after the full analysis and
required verifications (e.g., service impact analysis) within the
twin network.</t>
        </li>
        <li>
          <t>The faults of the real network can be automatically captured by
analyzing real-time data, then the correction strategy can be
distributed to the real network elements after conducting
adequate analysis within the twins to complete the closed-loop
automatic fault repair.</t>
        </li>
      </ol>
      <t>The following subsections further elaborate such benefits in details.</t>
      <section anchor="optimized-network-total-cost-of-operation">
        <name>Optimized Network Total Cost of Operation</name>
        <t>Large scale networks are complex to operate.  Since there is no
effective platform for simulation, network optimization designs have
to be tested on the real network at the cost of jeopardizing its
daily operation and possibly degrading the quality of the services
supported by the network.  Such assessment greatly increases network
operator's Operational Expenditure (OPEX) budgets too.</t>
        <t>With a Network Digital Twin platform, network operators can safely
emulate candidate optimization solutions before deploying them on the
real network.  In addition, operator's OPEX on the real network
deployment will be greatly decreased accordingly at the cost of the
complexity of the assessment and the resources involved.</t>
      </section>
      <section anchor="optimized-decision-making">
        <name>Optimized Decision Making</name>
        <t>Traditional network operation and management mainly focus on
deploying and managing running services, but hardly support
predictive maintenance techniques.</t>
        <t>Network digital twin can combine data acquisition, big data
processing, and AI-based modeling to assess the status of the network,
but also to predict future trends, and better organize predictive
maintenance.  The ability to reproduce network behaviors under
various conditions facilitates the corresponding assessment of the
various evolution options as often as required.</t>
      </section>
      <section anchor="safer-assessment-of-innovative-network-capabilities">
        <name>Safer Assessment of Innovative Network Capabilities</name>
        <t>Testing a new feature in an operational network is not only complex,
but also extremely risky.  Service impact analysis is required to be
adequately achieved prior to effective activation of a new feature.</t>
        <t>Network digital twin can greatly help assessing innovative network
capabilities without jeopardizing the daily operation of the real
network.  In addition, it helps researchers to explore network
innovation (e.g., new network protocols, network AI/ML applications)
efficiently, and network operators to deploy new technologies quickly
with lower risks.  Take AI/ ML application as example, it is a
conflict between the continuous high reliability requirement (i.e.,
99.999%) and the slow learning speed or phase-in learning steps of
AI/ML algorithms.  With Network Digital Twin, AI/ML can complete the
learning and training with the sufficient data before deploying the
model in the real network.  This would encourage more network AI
innovations in future networks.</t>
      </section>
      <section anchor="privacy-and-regulatory-compliance">
        <name>Privacy and Regulatory Compliance</name>
        <t>The requirements on data confidentiality and privacy on network
providers increase the complexity of network management, as decisions
made by computation logics such as an SDN controller may rely upon
the packet payloads.  As a result, the improvement of data-driven
management requires complementary techniques that can provide a
strict control based upon security mechanisms to guarantee data
privacy protection and regulatory compliance.  This may range from
flow identification (using the archetypal five-tuple of addresses,
ports and protocol) to techniques requiring some degree of payload
inspection, all of them considered suitable to be associated to an
individual person, and hence requiring strong protection and/or data
anonymization mechanisms.</t>
        <t>With strong modeling capability provided by the Network Digital Twin,
very limited real data (if at all) will be needed to achieve similar
or even higher level of data-driven intelligent analysis.  This way,
a lower demand of sensitive data will permit to satisfy privacy
requirements and simplify the use of privacy-preserving techniques
for data-driven operation.</t>
      </section>
      <section anchor="customized-network-operation-training">
        <name>Customized Network Operation Training</name>
        <t>Network architectures can be complex, and their operation requires
expert personnel.  Network digital twin offers an opportunity to
train staff for customized networks and specific user needs.  Two
salient examples are the application of new network architectures and
protocols or the use of "cyber-ranges" to train security experts in
threat detection and mitigation.</t>
      </section>
    </section>
    <section anchor="challenges-to-build-a-network-digital-twin">
      <name>Challenges to Build a Network Digital Twin</name>
      <t>According to <xref target="Hu2021"/>, the main challenges in building and maintaining
digital twins can be summarized as the following five aspects:</t>
      <ul spacing="normal">
        <li>
          <t>Data acquisition and processing</t>
        </li>
        <li>
          <t>High-fidelity modeling</t>
        </li>
        <li>
          <t>Real-time, communication between the virtual and the real twins</t>
        </li>
        <li>
          <t>Unified development platform and tools</t>
        </li>
        <li>
          <t>Environmental coupling technologies</t>
        </li>
      </ul>
      <t>Compared with other industrial fields, digital twin in networking field has
its unique characteristics. On the one hand, network elements and system have
higher level of digitalization, which implies that data acquisition and
virtual-real communication are relatively easy to achieve. On the other hand,
there are various different types of network elements and topologies in the
network field; and the network size is characterized by the number of nodes and
links in it but the network size growth pace can not meet the service needs,
especially in the deployment of end to end service which spans across multiple
administrative domains. So, the construction of a digital twin network system
needs to consider the following major challenges:</t>
      <dl>
        <dt>Large-scale challenge:</dt>
        <dd>
          <t>A digital twin of large-scale networks will significantly increase the complexity
of data acquisition and storage and the design and implementation of relevant models.</t>
        </dd>
        <dt/>
        <dd>
          <t>The requirements of the software and hardware of the Network Digital Twin system
will be even more constrained. Therefore, efficient and low cost tools in various
fields should be required. Take data as an example, massive network data can help
achieve more accurate models. However, the cost of virtual-real communication and
data storage becomes extremely expensive, especially in the multi- domain data-driven
network management case, therefore efficient tools on data collection and data
compression methods must be used.</t>
        </dd>
        <dt>Interoperability:</dt>
        <dd>
          <t>Due to the inconsistency of technical implementations and the
heterogeneity of vendor-adopted technologies, it is difficult to establish a unified
digital twin network system with a common technology in a network domain.
Therefore, it is needed firstly to propose a unified architecture of network digital
twin, in which all components and functionalities are clear to all stakeholders; then
define standardized and unified interfaces to connect all network twins via ensuring
necessary compatibility.</t>
        </dd>
        <dt>Data modeling difficulties:</dt>
        <dd>
          <t>Based on large-scale network data, data modeling should
not only focus on ensuring the accuracy of model functions, but also has to consider
the flexibility and scalability to compose and extend as required to support large
scale and multi-purpose applications.  Balancing these requirements further increases
the complexity of building efficient and hierarchical functional data models. As an
optional solution, straightforwardly clone the real network using virtualized resources
is feasible to build the twin network when the network scale is relatively small. However,
it will be of unaffordable resource cost for larger scale networks. In this case, network
modeling using mathematical abstraction or leveraging the AI algorithms will be more
suitable solutions.</t>
        </dd>
        <dt>Real-time requirements:</dt>
        <dd>
          <t>Network services normally have real-time requirements, and the
processing of model simulation and verification through a digital network twin will
introduce service latency. Meanwhile, the real-time requirements will further impose
performance requirements on the system software and hardware. However, given the nature
of distributed systems and propagation delays, keeping Network Digital Twins in sync or
auto-sync between real network and Network Digital Twin is challenging.</t>
        </dd>
        <dt/>
        <dd>
          <t>Changes to the digital object automatically drive changes in the real object can be even
challenging. To address these requirements, the function and process of the data model
need to be based on automated processing mechanism under various network application
scenarios. On the one hand, it is needed to design a simplified process to reduce the
time cost for tasks in network twin as much as possible; on the other hand, it is
recommended to define the real-time requirements of different applications, and then
match the corresponding computing resources and suitable solutions as needed to complete
the task processing in the twin.</t>
        </dd>
        <dt>Security risks:</dt>
        <dd>
          <t>A Network Digital Twin has to synchronize all or subset of the data
related to involved real networks in real time, which inevitably augments the attack
surface, with a higher risk of information leakage, in particular. On one hand, it
is mandatory to design more secure data mechanism leveraging legacy data protection
methods and innovative technologies such as block chain. On the other hand, the system
design can limit the data (especially raw data) requirement for building digital twin
network, leveraging innovative modeling technologies such as federal learning.</t>
        </dd>
      </dl>
      <t>To address the above listed challenges, it is important to agree on a unified
architecture of Network Digital Twin, which defines the main functional components
and interfaces (<xref target="arch"/>). Then, relying upon such an architecture, it is required
to continue researching on the key enabling technologies including data acquisition,
data storage, data modeling, interface standardization, and security assurance.</t>
    </section>
    <section anchor="arch">
      <name>NDT Functional Components</name>
      <t>Based on the definition of the key Network Digital Twin
elements introduced in <xref target="def"/>, a Network Digital Twin
architecture is depicted in <xref target="arc"/>.</t>
      <figure anchor="arc">
        <name>Reference Architecture of Network Digital Twin</name>
        <artwork align="center"><![CDATA[
           +---------------------------------------------------------+
           |                        Instance of Network Digital Twin |
           |  +--------+   +------------------------+   +--------+   |
           |  |        |   | Service Mapping Models |   |        |   |
   input   |  |        |   |  +------------------+  |   |        |   |  output
interfaces |  | Data   +--->  |Functional Models |  +---> Digital|   | interfaces
  -------> |  | Repo-  |   |  +-----+-----^------+  |   | Twin   |   |------>
           |  | sitory |   |        |     |         |   | Network|   |
           |  |        |   |  +-----v-----+------+  |   |  Mgmt  |   |
           |  |        <---+  |  Basic Models    |  <---+        |   |
           |  |        |   |  +------------------+  |   |        |   |
           |  +--------+   +------------------------+   +--------+   |
           +---------------------------------------------------------+

]]></artwork>
      </figure>
      <t>Section 4 describes functional characteristics or elements of NDT in four principal classes:
data, models, interfaces, and mappings.</t>
      <t>This section describes the important functional components of NDTs - reflecting
these functional elements - in greater detail. It also briefly describes how an NDT consisting of these
components may be used in operations systems to deliver the various functional NDT use cases.</t>
      <t>The core functional components of an NDT may be posited as follows:
a Data Repository component, a Service Mapping Models component, and an NDT Management
component. These key components might be placed within one single network administrative domain and provide
service to the operations applications (e.g., SDN controllers, network emulation applications) within that
domain or in other network administrative domains. They may be also placed in each network administrative
domain and coordinate among each other to provide services to operations applications. One or multiple NDT
instances may be maintained and operated in service of a given real network.</t>
      <t>The Data Repository component is responsible for collecting and storing network data. It collects and
updates the real-time operational and instrumentation data of the various network elements through
the appropriate real network-facing input interfaces (e.g., data collection interface and intent interface), as well as from
other operations system components. It also provides data services (e.g., fast retrieval, concurrent conflict handling,
batch service) through appropriate output interfaces (e.g., query interface ) to a Service
Mapping Models component.</t>
      <t>Service Mapping Models complete data modeling, and provide data or other functional model instances
supporting various network applications. Models include two major types, basic and functional models:</t>
      <t>o  Basic models refer to network element models and network topology models used to reflect the
   basic configuration, environment information, operational state, link topology, etc. of the network
   and its elements.</t>
      <t>o  Functional models refer to various data or other models used to generate information supporting
   network analysis, emulation, diagnosis, prediction, assurance, etc. The functional models can be
   constructed and expanded in various ways: by network type; there can be models serving single or
   multiple network domains; by function type. Functional models and the information they generate
   can relate to state monitoring, traffic analysis, security exercise, fault diagnosis, quality
   assurance and various network lifecycle management goal - such as planning, construction, maintenance,
   optimization and operation. Functional models can also be divided into general models and
   special-purpose models. Multiple models can be combined to create a model for more specific application
   scenarios. New applications might need new functional models that do not yet exist. If a new model is
   needed, the Service Mapping Models subsystem may help to create new models based on data retrieved from
   the Data Repository.</t>
      <t>The Network Digital Twin Management component manages the NDT operation and its subcomponents to useful
effect, serving applications that require and make use of the information generated by the NDT. It manages
the session-based operation of the NDT, managing the life-cycle of these operations under the direction of
associated applications; it monitors the performance and resource consumption of the NDT (including individual models)
and controls various operational aspects of the NDT, including topology management, configuration management, performance
management, and security management.</t>
      <t>The "real network" – the physical counter-part of an NDT - can be a mobile access network, a transport network,
a mobile core, a backbone, etc. The real network can also be a data center network, a campus enterprise network,
an industrial Internet of Things (IoT), etc.
The real network can span across a single network administrative domain or multiple network administrative domains.
It can include both physical entities and some virtual entities (e.g., vSwitches), which together carry
traffic and provide actual network services.
All or subset of network elements in the real network deliver network data, directly or through other systems, to
the NDT, through appropriate input interfaces. Network elements may receive control inputs, through specific output interfaces,
from operations systems in which NDTs play a role. The input and output interfaces might vary as a function of the specific NDT use case. The number of input interfaces or output interfaces are also determined by specific NDT use cases.
This document focuses on the IETF related real network such as IP bearer network and data center network.</t>
    </section>
    <section anchor="a-sample-ndt-realization">
      <name>A Sample NDT Realization</name>
      <t>Considerable industry work and research has focused on automation-supporting
network systems. For example, <xref target="ETSI-GS-ZSM-002"/> describes a framework
architecture for network automation. It uses so-called management services as
a fundamental conceptual unit of currency, and describes the enablement of
automation use cases through composition and extensions of such
management services. For example, a closed-loop might be represented as a
composition of appropriate data, analytics, intelligence/decision, and
orchestration/control services.</t>
      <t>The role and utility of NDT may be represented architecturally by following
similar principles, e.g., <xref target="ETSI-GS-ZSM-015"/> or <xref target="RFC8969"/>. As described in Section 7, an
NDT instantiation encompasses models, data, mapping, and interfaces. These
components then work in composition with other functions or services
to deliver an overall functional architecture matching specific NDT use cases.</t>
      <t>For example: an NDT instance may be used as a core element of an intent-drive network controller.
In such a case, an "outer" closed-loop (or, intent-assurance closed-loop) would detect
gaps between target service objectives set by intents and actual observed service characteristics,
find and proposed candidate mitigation solutions to soften the observed deviation, and drive the enforcement of the mitigation in the network.
Finding such mitigations would rely on multiple "inner loops" that include an NDT: for example,
prospective solutions would be proposed, their impacts on services evaluated by the
NDT acting as a "sandbox" in virtual space, and the process might be iterated until
a satisfactory solution is found. At that point, the selected mitigation is passed
to the outer loop for actuation.</t>
      <t>Many automation use cases may be thought of as following a similar pattern: a solution
corresponding to some kind of optimization criteria is found through iteration in virtual
space using an NDT instance; the solution is then placed at the disposal of other, active
components of the operations system. However, all use cases involving NDTs can be
represented as some composition of the core data/modeling functions, and appropriate other
functions/services.</t>
      <figure anchor="arc-detail">
        <name>Example of Detailed NDT Architecure</name>
        <artwork align="center"><![CDATA[
  +--------------------------------------------------------------+
  |                                                              |
  |                 Service Demand Generators                    |
  |                                                              |
  +-----------+-------------------------------------------^------+
              |                                           |
          Service Intents                         Intents Report
              |                                           |
              V                                           |
  +-------------------------------------------------------+------+
  |                                                              |
  |  +-------------+                                             |
  |  |             |                      Network Controller     |
  |  |   Intent    |                                             |
  |  | Translation |                                             |
  |  |             |                                             |
  |  +---+---------+                                             |
  |      |                                                       |
  |      |                                      Outer Loop       |
  |      |      +----------------------------------------------+ |
  |      |      |                                              | |
  |      |      |   +---------------------------------------+  | |
  |      |      |   |               Inner Loop              |  | |
  |      |      |   | +------------------------------------||  | |
  |      |      |   | |   +----------------------------+   ||  | |
  |      |      |   | |   |           NDT              |   ||  | |
  |      V      V   | |   |+------+ +-------+  +------+|   ||  | |
  |+------------+-+ | +-> || Data | | Models|  | NDT  |+---+|  | |
  ||              | |     ||      | |       |  | Mgmt ||    |  | |
  || Service Data | |     |+------+ +-------+  +------+|    |  | |
  ||   vs. Intents| |     |                            |    |  | |
  ||              | |     +----------------------------+    |  | |
  |+--------------+ +---------------------------------------+  | |
  |                            |        +----------------+     | |
  |                            |        |                |     | |
  |                            |        |  Orchestration |     | |
  |                            +----->  |     Control    +-----+ |
  |                                     +----------------+       |
  |                                                              |
  +-----------^-------------------------------------+------------+
              |                                     |
              |Data Collection               Control|
              |                                     |
  +-----------+-------------------------------------V------------+
  |                                                              |
  |                   Physical Netework                          |
  |                                                              |
  +--------------------------------------------------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="enabling-technologies-to-build-network-digital-twin">
      <name>Enabling Technologies to Build Network Digital Twin</name>
      <t>This section briefly describes several key enabling technologies to
build digital twin work system, based on the challenges and the
reference architecture described in above sections.  Actually, each
enabling technology is worth of deep researching respectively and
separately.</t>
      <section anchor="data-collection-and-data-services">
        <name>Data Collection and Data Services</name>
        <t>Data collection technology is the foundation of building data
repository for Network Digital Twin. Target driven mode should be
adopted for data collection from heterogeneous data sources. The
type, frequency and data collection method shall meet the requirements
of the Network Digital Twin application. Whenever building network
models for a specific network application, the required data can be
efficiently obtained from the data repository.</t>
        <t>Diverse existing tools and methods (e.g., SNMP, NETCONF <xref target="RFC6241"/>,
IPFIX <xref target="RFC7011"/>, and telemetry <xref target="RFC9232"/>) can be used to collect
different type of network data.  YANG data models and associated
mechanisms defined in <xref target="RFC8639"/><xref target="RFC8641"/> enable subscriber-specific
subscriptions to a publisher's event streams.  Such mechanisms can be
used by subscriber applications to request for a continuous and
customized stream of updates from a YANG datastore.  Moreover, some
innovative methods (e.g., sketch-based measurement) can be used to
acquire more complex network data, such as network performance data.
Furthermore, data transformation and aggregation capabilities can be
used to improve the applicability on network modelling.  Toward
building data repository for a digital twin system, data collection
tools and methods should be as lightweight as possible, so as to
reduce the volume of required network equipment resources, and
meaningful so it can be useful.  Several solutions related to data
collection are work-in-progress in IETF/IRTF, e.g., adaptive
subscription <xref target="I-D.ietf-netconf-adaptive-subscription"/>, efficient data
collection <xref target="I-D.zcz-nmrg-digitaltwin-data-collection"/>, and contextual
information <xref target="I-D.claise-opsawg-collected-data-manifest"/>.</t>
        <t>Data repository works to effectively store large-scale and heterogeneous
network data and provide data and services to build various network models.
So, it is also necessary to study technologies regarding data services
including fast search, batch- data handling, conflict avoidance, data access
interfaces, etc.</t>
      </section>
      <section anchor="network-modeling">
        <name>Network Modeling</name>
        <t>The basic network element models and topology models help generate
virtual twin of the network according to the network element
configuration, operation data, network topology relationship, link
state and other network information.  Then the operation status can
be monitored and displayed, and the network configuration change and
optimization strategy can be pre-verified.</t>
        <t>For small scale network, network simulating tools (e.g., <xref target="NS-3"/>,
<xref target="Mininet"/>, etc.) and emulating tools (e.g., <xref target="EVE-NG"/>, <xref target="GNS-3"/>) can be
used to build basic network models.  By using the packet processing
capability of virtual network element, such tools can quickly verify
the functions of the control plane and data plane. However, this modeling
method also has many limitations, including high resource consumption, poor
performance analysis ability, and poor scalability. Mathematical abstraction
methods can be used for large-scale networks to build basic network models
efficiently. Knowledge graph, network calculus, and formal verification can
be candidate methods. Some relevant research has emerged in recent years,
such as <xref target="Hong2021"/>, <xref target="G2-SIGCOMM"/>, and <xref target="DNA-2022"/>. Moving forward, improving
the extensibility and accuracy of the models represents a significant challenge.</t>
        <t>As an example, the theory of bottleneck structures introduced in
<xref target="G2-SIGCOMM"/>, <xref target="G2-SIGMETRICS"/> can be used to construct a mathematical
model of the network (see also
<xref target="I-D.giraltyellamraju-alto-bsg-requirements"/> for more info). A bottleneck
structure is a computational graph that efficiently captures the topology, the
routing and flow properties of the network. The graph embeds the latent
relationships that exist between bottlenecks and the application flows in a
distributed system, providing an efficient mathematical framework to compute
the ripple effects of perturbations (e.g., a flow arriving or departing from
the system, or the dynamic change in the capacity of a wireless link, among
others). Because these perturbations are mathematical derivatives of the
communication system, bottleneck structures can be used to compute optimized
network configurations, providing a natural engineering sandbox for building
network models. One of the key advantages of bottleneck structures is that
they can be used to compute (symbolically or numerically) key performance
indicators of the network (e.g., expected flow throughput, projected flow
completion time) without using computationally intensive simulators.
This capability can be especially useful when building a digital twin or
a large-scale network, potentially saving orders or magnitude in computational
resources in comparison to simulation or emulation-based approaches.</t>
        <t>The functional model aims to realize the dynamic evolution of network
performance evaluation and intelligent decision-making. Data-driven
AI/ML algorithms will play a great role in building complex network
functional models. As a research hotspot in recent years, many successful
cases have been demonstrated, such as <xref target="RouteNet"/>, <xref target="MimicNet"/>, etc.
In the future, in addition to improving the generalization ability and
interpretability of AI models, there is also a need to focus on how to improve
the real-time and interactivity of model reasoning based on data and
control in Network Digital Twin layer.</t>
      </section>
      <section anchor="network-visualization">
        <name>Network Visualization</name>
        <t>It is the internal requirement of the Network Digital Twin system to
use network visibility technology to visually present the data and model
in the network twin with high fidelity and intuitively reflect the
interactive mapping between the real network entity and the network twin.
Network visibility technology can help users understand the internal
structure of the network and mine valuable information hidden in the
network.</t>
        <t>Network Visibility can use algorithms such as hierarchical layout,
heuristic layout or force-oriented layout (or a combination of
several algorithms) for topology layout.  The related topology
data can be acquired using solutions provided in <xref target="RFC8345"/>,
<xref target="RFC8346"/>, <xref target="RFC8944"/>, etc.  Meanwhile, Network Digital Twin system
can select different interaction methods or combinations of
interaction methods to realize the visual dynamic interaction mapping
of virtual and real networks.  The data query technology, such as
SPARQL, can express queries across diverse data sources,
whether the data is stored natively as RDF or viewed as RDF via
middleware.</t>
      </section>
      <section anchor="interfaces">
        <name>Interfaces</name>
        <t>Based on the reference architecture, there are three types of
interfaces on building a Network Digital Twin system:</t>
        <ol group="bar" spacing="normal" type="(%c)"><li>
            <t>Network-facing interfaces are twin interfaces between the real
 network and its twin entity.  They are responsible for
 information exchange between real network and network digital
 twin.  The candidate interfaces can be SNMP, NETCONF, etc.</t>
          </li>
          <li>
            <t>Application-facing interfaces are Application-facing interfaces
 between the Network Digital Twin and applications.  They are
 responsible for information exchange between Network Digital Twin
 and network applications.  The lightweight and extensible
 <xref target="RESTFul"/> interface can be the candidate northbound interface.</t>
          </li>
          <li>
            <t>Internal interfaces are within Network Digital Twin layer.  They
are responsible for information exchange between the three
subsystems: Data Repository, Service Mapping Models, and Digital
Twin Network Management.  These interfaces should be of high-
speed, high-efficiency and high-concurrency.  The candidate
interfaces or protocols can be XMPP <xref target="RFC7622"/> or
HTTP/3.0 <xref target="RFC9114"/>.</t>
          </li>
        </ol>
        <t>All these interfaces are recommended to be open and standardized so
as to avoid either hardware or software vendor lock and achieve
interoperability. Besides the interfaces listed above, some new interfaces
or protocols can be created to better serve digital twin network system.</t>
      </section>
      <section anchor="twinning-management">
        <name>Twinning Management</name>
        <t>Twinning management is the key to the efficient deployment and
potential value of Network Digital Twin systems in production networks.
Twinning management technology inputs all information and data from each
step of the network business into the constructed model by constructing
digital threads for optimization, prediction, and guidance. Then, the
implementation results are analyzed to see if they meet expectations,
and any actions are fed back to form a closed loop. Twinning management
involves various network components (e.g., controller, orchestrator)
and domains (security, for example) from end to end, including, but
not limited to, the following main technologies:</t>
        <ul spacing="normal">
          <li>
            <t>Orchestration of twins: Manage and organize multiple twin
  model instances, including the creation, deletion, storage,
  version control, and deployment of model instances, and arrange
  required modeling resources as needed to maximize resource
  utilization efficiency.</t>
          </li>
          <li>
            <t>Collaboration Management: Coordinate multiple participants, such
  as network administrators, data scientists, security teams, etc.,
  to ensure the accuracy and real-time performance of the twins.
  Involve collaborative tools, workflow design, data sharing, and
  permission control to promote cooperation and information sharing
  among all parties.</t>
          </li>
          <li>
            <t>Conflict Detection and Resolution: Identify and address conflicts,
  including user intents, access control policies, or multiple
  applications interacting within the digtial twin network system.
  Conflict detection and resolution techniques may use various mechanisms,
  such as rule-based policies, role-based access control, or dynamic conflict
  resolution algorithms (e.g., <xref target="Pradeep2022"/> and <xref target="Zheng2022"/>).</t>
          </li>
          <li>
            <dl>
              <dt>Energy-Efficient Twinning:</dt>
              <dd>
                <t>Focus on energy efficiency in digital twin
network system. It includes monitoring and optimizing the energy
consumption of both network equipment and digital twin system operation,
reducing the energy expenditure of network operation, and achieving the
goal of a green (energy efficient) network.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="interaction-with-intent-based-networking-ibn">
      <name>Interaction with Intent-Based Networking (IBN)</name>
      <t>Intent-based, means that users can input their abstract 'intent'
to the network, instead of detailed policies or configurations on
the network devices. <xref target="RFC9315"/> clarifies the concept of "Intent"
and provides an overview of IBN functionalities. The key characteristic
of an IBN system is that user intent can be assured automatically via
continuously adjust policies and validate real-time situations.</t>
      <t>IBN can be envisaged in a Network Digital Twin context to show how
Network Digital Twin improves the efficiency of deploying network
innovation. Several rounds of adjustment and validation can be emulated
on the digital twin platform instead of directly impacting real network
during the testing phase. Therefore, the digital twin network can be an
important enabler platform for implementing IBN systems and fostering
their deployment.</t>
    </section>
    <section anchor="sample-application-scenarios">
      <name>Sample Application Scenarios</name>
      <t>Network digital twin can be applied to solve different problems in
network management and operation.</t>
      <section anchor="human-training">
        <name>Human Training</name>
        <t>The usual approach to network OAM with procedures applied by humans
is open to errors in all these procedures, whigh impact network
availability and resilience.  Response procedures and actions for
most relevant operational requests and incidents are commonly defined
to reduce errors to a minimum. The progressive automation of these
procedures, such as predictive control or closed-loop management,
reduce the faults and response time, but still, there is the need of
a human-in-the-loop for multiple actions. These processes are not
intuitive and require training to learn how to respond.</t>
        <t>The use of Network Digital Twin for this purpose in different network
management activities will improve the operators performance.  One
common example is cybersecurity incident handling, where "cyber-
range" exercises are executed periodically to train security
practitioners.  Network digital twin will offer realistic
environments, fitted to the real production networks.</t>
      </section>
      <section anchor="machine-learning-training">
        <name>Machine Learning Training</name>
        <t>Machine learning requires data and their context to be available in
order to be applied. A common approach in the network management
environment has been to simulate or import data in a specific environment
(the ML developer lab), where they are used to train the selected model,
while later, when the model is deployed in production, re-train or adjust
to the production environment context. This demands a specific adaption
period.</t>
        <t>Network digital twin simplifies the complete ML lifecycle development
by providing a realistic environment, including network topologies,
to generate the data required in a well-aligned context.  Dataset
generated belongs to the Network Digital Twin and not to the
production network, allowing information access by third parties,
without impacting data privacy.</t>
      </section>
      <section anchor="devops-oriented-certification">
        <name>DevOps-Oriented Certification</name>
        <t>The potential application of CI/CD models network management
operations increases the risk associated to the deployment of
non-validated updates, which conflicts with the goal of the
certification requirements applied by network service providers.
A solution for addressing these certification requirements is to
verify the specific impacts of updates on service assurance and
Service Level Agreements (SLAs) using a Network Digital Twin
environment replicating the network particularities as a previous
step to production release.</t>
        <t>Network digital twin control functional block supports such dynamic
mechanisms required by DevOps procedures.</t>
      </section>
      <section anchor="network-fuzzing">
        <name>Network Fuzzing</name>
        <t>Network management dependency on programmability increases systems
complexity.  The behavior of new protocol stacks, API parameters, and
interactions among complex software components are examples that
imply higher risk to errors or vulnerabilities in software and
configuration.</t>
        <t>Network digital twin allows to apply fuzzing testing techniques on
a twin network environment, with interactions and conditions similar
to the production network, permitting the identification of
vulnerabilities, bugs and zero-day attacks before production delivery.</t>
      </section>
      <section anchor="network-inventory-management">
        <name>Network Inventory Management</name>
        <t>With the development of enterprise digitization, the number of enterprise
IoT devices, virtualized Cloud software inventory
components (e.g., virtual firewall), and network hardware inventory (e.g.,
switches or routers) also increases. The endpoints connected to an enterprise
network lack coherent modelling and lifecycle management because different
services are modelled, collected, processed, and stored separately. The same
category of network devices (including network endpoints) may be repeatedly
discovered, processed, and stored. Therefore, the inventory is difficult to
manage when tracked in different places without formal synchronization
procedures.</t>
        <t>Network digital twin management can be used as a means to ensure consistent
representation and reporting of inventory component types. In doing so, the
enforcement of security policies and assessments will be further simplified.
Such an approach will ease the implementation of a unified control strategy
for all inventory component types connected to an enterprise network. It also
makes actors on assets more accountable for breaching their compliance promises.
Special care should be considered to protect the inventory data since it may
gather privacy-sensitive information.</t>
        <t>The network inventory management for twins or various inventory components
can be used, for example, to exercise the implication of End of Life (EoL),
dependency, and hardware dependency "what-if" scenarios.</t>
      </section>
    </section>
    <section anchor="research-perspectives-a-summary">
      <name>Research Perspectives: A Summary</name>
      <t>Research on Network Digital Twin has just started. This document
presents an overview of the Network Digital Twin concepts and reference
architecture. As digital twin technology develops, further investigation
of Network Digital Twin scenarios, requirements, architecture, and key
enabling technologies should be investigated by the industry to accelerate
the implementation and deployment of digital twin network.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes concepts and definitions of NDT.
As this document presents system architecture, the following security
considerations are abstract and generic, i.e., they provide mainly
principles, guidelines or requirements. However, the implementation and
deployment of NDT will need to carefully investigate
the following security considerations, which may be categorized into
different aspects:</t>
      <ul spacing="normal">
        <li>
          <t>Data Management</t>
        </li>
      </ul>
      <dl>
        <dt>Synchronization:</dt>
        <dd>
          <t>Synchronizing the data between the real and twin
networks may increase the risk of sensitive data and information leakage.</t>
        </dd>
        <dt>Data Access:</dt>
        <dd>
          <t>Strict control and security mechanisms must be provided and
enabled to prevent data leaks. Also, appropriate access rights must be provisioned to prevent unauthorized entities to access sensitive data (e.g., logging data used for legal data retention).</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Data Security and Privacy Protection.</t>
        </li>
      </ul>
      <dl>
        <dt>Confidentiality:</dt>
        <dd>
          <t>Ensuring that sensitive data used in the digital twin
is protected from unauthorized access. This includes encrypting data
both at rest and in transit.</t>
        </dd>
        <dt>Integrity:</dt>
        <dd>
          <t>Ensuring that the data used in and produced by the digital
twin is accurate and unaltered. This can be achieved through cryptographic
hash functions and other integrity verification methods.</t>
        </dd>
        <dt>Access Control:</dt>
        <dd>
          <t>Implementing strict access control measures ensures that
only authorized users can access, modify, or interact with the digital
twin. This includes using multi-factor authentication (MFA) and
role-based access control (RBAC).</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>System Security</t>
        </li>
      </ul>
      <dl>
        <dt>Authentication and Authorization:</dt>
        <dd>
          <t>Ensuring robust authentication and
authorization mechanisms to prevent unauthorized access to the digital
twin environment.</t>
        </dd>
        <dt>Vulnerability Management:</dt>
        <dd>
          <t>Regularly auditing, updating, and patching the digital
twin software and underlying infrastructure to mitigate vulnerabilities.</t>
        </dd>
        <dt>Monitoring and Logging:</dt>
        <dd>
          <t>Implementing comprehensive logging and
monitoring to detect and respond to security incidents in real-time.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Network Security</t>
        </li>
      </ul>
      <dl>
        <dt>Segmentation:</dt>
        <dd>
          <t>Isolating the NDT environment from the
main operational network to limit the potential impact of a security breach.</t>
        </dd>
        <dt>Encryption:</dt>
        <dd>
          <t>Encrypting network communications to prevent interception and
eavesdropping.</t>
        </dd>
      </dl>
      <t>Access Control List: Deploying
, e.g., firewalls and IDS/IPS with appropriate policies to protect the NDT from external
and internal threats.</t>
      <ul spacing="normal">
        <li>
          <t>Operational Security</t>
        </li>
      </ul>
      <dl>
        <dt>System Access:</dt>
        <dd>
          <t>Data verification, model validation, and mapping operations
between the real and digital counterpart networks by authenticated and
authorized users only.</t>
        </dd>
        <dt>Secure Development Practices:</dt>
        <dd>
          <t>Ensuring the NDT software is
developed following secure coding practices to minimize vulnerabilities.</t>
        </dd>
        <dt>Incident Response:</dt>
        <dd>
          <t>Having a well-defined incident response plan (e.g., playbooks) to address
and mitigate any security incidents quickly.</t>
        </dd>
        <dt>Regular Audits and Assessments:</dt>
        <dd>
          <t>Conduct security audits and risk assessments
to identify and address potential security gaps.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Resilience and Reliability</t>
        </li>
      </ul>
      <dl>
        <dt>Redundancy:</dt>
        <dd>
          <t>Implementing redundancy and failover mechanisms ensures the
digital twin remains operational during and after a security/failure incident.</t>
        </dd>
        <dt>Backup and Recovery:</dt>
        <dd>
          <t>Regularly back up NDT data and have a robust
recovery plan to restore operations in case of data loss or corruption.</t>
        </dd>
      </dl>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no requests to IANA.</t>
    </section>
    <section anchor="open-issues">
      <name>Open issues</name>
      <t>Refer to:
<eref target="https://github.com/cheneyzhoucheng/network-digital-twin/issues">https://github.com/cheneyzhoucheng/network-digital-twin/issues</eref>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="Dai2020">
        <front>
          <title>Deep Reinforcement Learning for Stochastic Computation Offloading in Digital Twin Networks</title>
          <author>
            <organization>IEEE Transactions on Industrial Informatics</organization>
          </author>
          <date year="2020" month="August"/>
        </front>
      </reference>
      <reference anchor="Dai2022">
        <front>
          <title>Adaptive Digital Twin for Vehicular Edge Computing and Networks</title>
          <author>
            <organization>Journal of Communications and Information Networks</organization>
          </author>
          <date year="2022" month="March"/>
        </front>
      </reference>
      <reference anchor="DNA-2022">
        <front>
          <title>Differential Network Analysis, USENIX Symposium on Networked Systems Design and Implementation</title>
          <author>
            <organization>NSDI 22</organization>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="Dong2019">
        <front>
          <title>Deep Learning for Hybrid 5G Services in Mobile Edge Computing Systems: Learn from a Digital Twin</title>
          <author>
            <organization>IEEE Transactions on Wireless Communications</organization>
          </author>
          <date year="2019" month="July"/>
        </front>
      </reference>
      <reference anchor="DTPI2021" target="https://www.dtpi.org/video/10">
        <front>
          <title>IEEE International Conference on Digital Twins and Parallel Intelligence - Digital Twin Network Session</title>
          <author>
            <organization/>
          </author>
          <date year="2021" month="July"/>
        </front>
      </reference>
      <reference anchor="DTPI2022" target="https://c.trvqd.com/#/television?id=1584825225713631235&amp;preview=2">
        <front>
          <title>IEEE International Conference on Digital Twins and Parallel Intelligence - Digital Twin Network Session</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
      </reference>
      <reference anchor="EVE-NG" target="https://www.eve-ng.net/">
        <front>
          <title>Emulated Virtual Environment Next Generation</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Fuller2020">
        <front>
          <title>Digital Twin: Enabling Technologies, Challenges and Open Research</title>
          <author>
            <organization>IEEE Access</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="G2-SIGCOMM">
        <front>
          <title>Designing data center networks using bottleneck structures</title>
          <author>
            <organization>ACM SIGCOMM</organization>
          </author>
          <date year="2021" month="August"/>
        </front>
      </reference>
      <reference anchor="G2-SIGMETRICS">
        <front>
          <title>On the Bottleneck Structure of Congestion-Controlled Networks</title>
          <author>
            <organization>ACM SIGMETRICS</organization>
          </author>
          <date year="2019" month="December"/>
        </front>
      </reference>
      <reference anchor="GNS-3" target="https://www.gns3.com/">
        <front>
          <title>Graphical Network Simulator-3, GNS3</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="NS-3" target="https://www.nsnam.org/">
        <front>
          <title>Network Simulator, NS-3</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Mininet" target="http://mininet.org/">
        <front>
          <title>Mninet: An Instant Virtual Network on your Laptop</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="Grieves2014" target="https://www.3ds.com/fileadmin/PRODUCTS-SERVICES/DELMIA/PDF/Whitepaper/DELMIA-APRISO-Digital-Twin-Whitepaper.pdf">
        <front>
          <title>Digital twin: Manufacturing excellence through virtual factory replication</title>
          <author>
            <organization/>
          </author>
          <date year="2003"/>
        </front>
      </reference>
      <reference anchor="Hong2021">
        <front>
          <title>NetGraph: An Intelligent Operated Digital Twin Platform for Data Center Networks</title>
          <author>
            <organization>ACM SIGCOMM 2021 Workshop on Network-Application Integration (NAI' 21)</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Hu2021">
        <front>
          <title>Digital twin: a state-of-the-art review of its enabling technologies, applications and challenges</title>
          <author>
            <organization>Journal of Intelligent Manufacturing and Special Equipment</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="ISO-2021" target="https://www.iso.org/standard/78743.html">
        <front>
          <title>Digital Twin manufacturing framework - Part 2: Reference architecture: ISO/CD 23247-2</title>
          <author>
            <organization>ISO</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Madni2019">
        <front>
          <title>Leveraging digital twin technology in model-based systems engineering</title>
          <author>
            <organization/>
          </author>
          <date year="2019" month="January"/>
        </front>
      </reference>
      <reference anchor="MimicNet">
        <front>
          <title>MimicNet: Fast Performance Estimates for Data Center Networks with Machine Learning</title>
          <author>
            <organization>ACM SIGCOMM 2021 Conference (SIGCOMM ’21)</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Natis-Gartner2017" target="https://www.gartner.com/en/documents/3645341">
        <front>
          <title>Innovation insight for digital twins - driving better IoT-fueled decisions</title>
          <author>
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Nguyen2021">
        <front>
          <title>Digital Twin for 5G and Beyond</title>
          <author>
            <organization>IEEE Communications Magazine</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
      </reference>
      <reference anchor="Pradeep2022">
        <front>
          <title>Conflict Detection and Resolution in IoT Systems: A Survey.  IoT 2022</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="February"/>
        </front>
      </reference>
      <reference anchor="RESTFul">
        <front>
          <title>RESTful Web APIs</title>
          <author>
            <organization>O'Reilly Media, Inc</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Rosen2015">
        <front>
          <title>About the importance of autonomy and DTs for the future of manufacturing</title>
          <author>
            <organization>IFAC-Papersonline</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="RouteNet">
        <front>
          <title>RouteNet:Leveraging Graph Neural Networks for network modeling and optimization in SDN</title>
          <author>
            <organization>IEEE Journal on Selected Areas in Communication (JSAC)</organization>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="Tao2019">
        <front>
          <title>Digital Twin in Industry: State-of-the-Art</title>
          <author>
            <organization>IEEE Transactions on Industrial Informatics</organization>
          </author>
          <date year="2019" month="April"/>
        </front>
      </reference>
      <reference anchor="TNT2022" target="https://noms2022.ieee-noms.org/ws4-1st-international-workshop-technologies-network-twins-tnt-2022">
        <front>
          <title>IEEE International workshop on Technologies for Network Twins</title>
          <author>
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Zheng2022">
        <front>
          <title>Intent Based Networking management with conflict detection and policy resolution in an enterprise network, Computer Networks, Volume 219</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="December"/>
        </front>
      </reference>
      <reference anchor="ETSI-GS-ZSM-002" target="https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/002/01.01.01_60/gs_ZSM002v010101p.pdf">
        <front>
          <title>Zero-touch network and Service Management (ZSM); Reference Architecture</title>
          <author>
            <organization/>
          </author>
          <date year="2019" month="August"/>
        </front>
      </reference>
      <reference anchor="ETSI-GS-ZSM-015" target="https://www.etsi.org/deliver/etsi_gr/ZSM/001_099/015/01.01.01_60/gr_ZSM015v010101p.pdf">
        <front>
          <title>Zero-touch network and Service Management (ZSM); Network Digital Twin</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="February"/>
        </front>
      </reference>
      <reference anchor="RFC8969">
        <front>
          <title>A Framework for Automating Service and Network Management with YANG</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="D. Lopez" initials="D." surname="Lopez"/>
          <author fullname="C. Xie" initials="C." surname="Xie"/>
          <author fullname="L. Geng" initials="L." surname="Geng"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
            <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8969"/>
        <seriesInfo name="DOI" value="10.17487/RFC8969"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC7011">
        <front>
          <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <author fullname="P. Aitken" initials="P." surname="Aitken"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="77"/>
        <seriesInfo name="RFC" value="7011"/>
        <seriesInfo name="DOI" value="10.17487/RFC7011"/>
      </reference>
      <reference anchor="RFC9232">
        <front>
          <title>Network Telemetry Framework</title>
          <author fullname="H. Song" initials="H." surname="Song"/>
          <author fullname="F. Qin" initials="F." surname="Qin"/>
          <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
          <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
          <author fullname="A. Wang" initials="A." surname="Wang"/>
          <date month="May" year="2022"/>
          <abstract>
            <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9232"/>
        <seriesInfo name="DOI" value="10.17487/RFC9232"/>
      </reference>
      <reference anchor="RFC8639">
        <front>
          <title>Subscription to YANG Notifications</title>
          <author fullname="E. Voit" initials="E." surname="Voit"/>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
          <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
          <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
          <date month="September" year="2019"/>
          <abstract>
            <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8639"/>
        <seriesInfo name="DOI" value="10.17487/RFC8639"/>
      </reference>
      <reference anchor="RFC8641">
        <front>
          <title>Subscription to YANG Notifications for Datastore Updates</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="E. Voit" initials="E." surname="Voit"/>
          <date month="September" year="2019"/>
          <abstract>
            <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8641"/>
        <seriesInfo name="DOI" value="10.17487/RFC8641"/>
      </reference>
      <reference anchor="I-D.ietf-netconf-adaptive-subscription">
        <front>
          <title>Adaptive Subscription to YANG Notification</title>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Wei Song" initials="W." surname="Song">
            <organization>Huawei</organization>
          </author>
          <author fullname="Peng Liu" initials="P." surname="Liu">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Qiufang Ma" initials="Q." surname="Ma">
            <organization>Huawei</organization>
          </author>
          <author fullname="Wei Wang" initials="W." surname="Wang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Zhixiong Niu" initials="Z." surname="Niu">
            <organization>Microsoft</organization>
          </author>
          <date day="11" month="September" year="2024"/>
          <abstract>
            <t>   This document defines a YANG data model and associated mechanism that
   enable adaptive subscription to YANG notifications.  The periodic
   update interval for the stream can be set adaptively.  Applying
   adaptive subscription allows publishers to adjust the subscription
   period dynamically based on pre-defined threshold for finer-grained
   network telemetry data sent to receivers.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-adaptive-subscription-06"/>
      </reference>
      <reference anchor="I-D.zcz-nmrg-digitaltwin-data-collection">
        <front>
          <title>Data Collection Requirements and Technologies for Digital Twin Network</title>
          <author fullname="Cheng Zhou" initials="C." surname="Zhou">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Danyang Chen" initials="D." surname="Chen">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Pedro Martinez-Julia" initials="P." surname="Martinez-Julia">
            <organization>NICT</organization>
          </author>
          <author fullname="Qiufang Ma" initials="Q." surname="Ma">
            <organization>Huawei</organization>
          </author>
          <date day="9" month="July" year="2023"/>
          <abstract>
            <t>   A Digital Twin Network is a virtual representation of a real network,
   which is meant to be used by a management system to analyze,
   diagnose, emulate, and then control the real network based on data,
   models, and interfaces.  The construction and state update of a
   Digital Twin Network require obtaining real-time information of the
   physical network it represents (i.e., telemetry data).  This document
   aims to describe the data collection requirements and provide data
   collection methods or tools to build the data repository for building
   and updating a digital twin network.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-zcz-nmrg-digitaltwin-data-collection-03"/>
      </reference>
      <reference anchor="I-D.claise-opsawg-collected-data-manifest">
        <front>
          <title>A Data Manifest for Contextualized Telemetry Data</title>
          <author fullname="Benoît Claise" initials="B." surname="Claise">
            <organization>Huawei</organization>
          </author>
          <author fullname="Jean Quilbeuf" initials="J." surname="Quilbeuf">
            <organization>Huawei</organization>
          </author>
          <author fullname="Diego Lopez" initials="D." surname="Lopez">
            <organization>Telefonica I+D</organization>
          </author>
          <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
            <organization>Telefonica I+D</organization>
          </author>
          <author fullname="Thomas Graf" initials="T." surname="Graf">
            <organization>Swisscom</organization>
          </author>
          <date day="10" month="March" year="2023"/>
          <abstract>
            <t>   Network elements use Model-driven Telemetry, and in particular YANG-
   Push, to continuously stream information, including both counters and
   state information.  This document documents the metadata that ensure
   that the collected data can be interpreted correctly.  This document
   specifies the Data Manifest, composed of two YANG data models (the
   Platform Manifest and the Data Collection Manifest.)  The Data
   Manifest must be streamed and stored along with the data, up to the
   collection and analytics system in order to keep the collected data
   fully exploitable by the data scientists.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-claise-opsawg-collected-data-manifest-06"/>
      </reference>
      <reference anchor="I-D.giraltyellamraju-alto-bsg-requirements">
        <front>
          <title>Supporting Bottleneck Structure Graphs in ALTO: Use Cases and Requirements</title>
          <author fullname="Jordi Ros-Giralt" initials="J." surname="Ros-Giralt">
            <organization>Qualcomm</organization>
          </author>
          <author fullname="Sruthi Yellamraju" initials="S." surname="Yellamraju">
            <organization>Qualcomm</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Y. Richard Yang" initials="Y. R." surname="Yang">
            <organization>Yale University</organization>
          </author>
          <author fullname="Kai Gao" initials="K." surname="Gao">
            <organization>Sichuan University</organization>
          </author>
          <date day="23" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes an extension to the base Application-Layer
   Traffic Optimization (ALTO) protocol to support bottleneck structures
   as an efficient representation of the state of a network.  Bottleneck
   structures are efficient computational graphs that allow network
   operators and application service providers to optimize application
   performance in a variety of communication problems including routing,
   flow control, flow scheduling, bandwidth prediction, and network
   slicing, among others.  This document introduces a new abstraction
   called Bottleneck Structure Graph (BSG) and the necessary
   requirements to integrate it into the ALTO standard.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-giraltyellamraju-alto-bsg-requirements-03"/>
      </reference>
      <reference anchor="RFC8345">
        <front>
          <title>A YANG Data Model for Network Topologies</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="J. Medved" initials="J." surname="Medved"/>
          <author fullname="R. Varga" initials="R." surname="Varga"/>
          <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
          <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
          <author fullname="X. Liu" initials="X." surname="Liu"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8345"/>
        <seriesInfo name="DOI" value="10.17487/RFC8345"/>
      </reference>
      <reference anchor="RFC8346">
        <front>
          <title>A YANG Data Model for Layer 3 Topologies</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="J. Medved" initials="J." surname="Medved"/>
          <author fullname="R. Varga" initials="R." surname="Varga"/>
          <author fullname="X. Liu" initials="X." surname="Liu"/>
          <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
          <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model for Layer 3 network topologies.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8346"/>
        <seriesInfo name="DOI" value="10.17487/RFC8346"/>
      </reference>
      <reference anchor="RFC8944">
        <front>
          <title>A YANG Data Model for Layer 2 Network Topologies</title>
          <author fullname="J. Dong" initials="J." surname="Dong"/>
          <author fullname="X. Wei" initials="X." surname="Wei"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
          <author fullname="A. Liu" initials="A." surname="Liu"/>
          <date month="November" year="2020"/>
          <abstract>
            <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8944"/>
        <seriesInfo name="DOI" value="10.17487/RFC8944"/>
      </reference>
      <reference anchor="RFC7622">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Address Format</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
          <date month="September" year="2015"/>
          <abstract>
            <t>This document defines the address format for the Extensible Messaging and Presence Protocol (XMPP), including support for code points outside the ASCII range. This document obsoletes RFC 6122.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7622"/>
        <seriesInfo name="DOI" value="10.17487/RFC7622"/>
      </reference>
      <reference anchor="RFC9114">
        <front>
          <title>HTTP/3</title>
          <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9114"/>
        <seriesInfo name="DOI" value="10.17487/RFC9114"/>
      </reference>
      <reference anchor="RFC9315">
        <front>
          <title>Intent-Based Networking - Concepts and Definitions</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
          <author fullname="L. Z. Granville" initials="L. Z." surname="Granville"/>
          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
          <date month="October" year="2022"/>
          <abstract>
            <t>Intent and Intent-Based Networking are taking the industry by storm. At the same time, terms related to Intent-Based Networking are often used loosely and inconsistently, in many cases overlapping and confused with other concepts such as "policy." This document clarifies the concept of "intent" and provides an overview of the functionality that is associated with it. The goal is to contribute towards a common and shared understanding of terms, concepts, and functionality that can be used as the foundation to guide further definition of associated research and engineering problems and their solutions.</t>
            <t>This document is a product of the IRTF Network Management Research Group (NMRG). It reflects the consensus of the research group, having received many detailed and positive reviews by research group participants. It is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9315"/>
        <seriesInfo name="DOI" value="10.17487/RFC9315"/>
      </reference>
    </references>
    <?line 1363?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to the NMRG participants for their comments and reviews.
Thanks to Quifang Ma, Laurent Ciavaglia, Jérôme
François, Jordi Paillissé, Luis Miguel Contreras Murillo, Alexander
Clemm, Qiao Xiang, Ramin Sadre, Pedro Martinez-Julia, Wei Wang,
Zongpeng Du, Peng Liu, and Albrecht Schwarz.</t>
      <t>Diego Lopez and Antonio Pastor were partly supported by the European
Commission under Horizon 2020 grant agreement no. 833685 (SPIDER),
and grant agreement no. 871808 (INSPIRE-5Gplus).</t>
      <t>Daniel King was partly supported by the UK Department for Science,
Innovation and Technology under the Future Open Networks Research
Challenge project TUDOR (Towards Ubiquitous 3D Open Resilient Network).</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Christopher Janz">
        <organization>Huawei</organization>
        <address>
          <email>christopher.janz@huawei.com</email>
        </address>
      </contact>
      <contact fullname="Daniel King">
        <organization>Lancaster University</organization>
        <address>
          <email>d.king@lancaster.ac.uk</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
