<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xwcd-neotec-ns-models-telcocloud-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Telcocloud Network Management">Applicability of IETF-Defined Service and Network Data Models for Telcocloud Network Management</title>
    <seriesInfo name="Internet-Draft" value="draft-xwcd-neotec-ns-models-telcocloud-00"/>
    <author fullname="Chongfeng Xie">
      <organization>China Telecom</organization>
      <address>
        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>
    <author fullname="Bo Wu">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author fullname="Nabeel Cocker">
      <organization>Red Hat</organization>
      <address>
        <email>ncocker@redhat.com</email>
      </address>
    </author>
    <author fullname="Linda Dunbar">
      <organization>Futurewei</organization>
      <address>
        <email>ldunbar@futurewei.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Operations and Management</area>
    <workgroup>onions</workgroup>
    <keyword>Automation</keyword>
    <keyword>Telcom Cloud</keyword>
    <keyword>Network Operation</keyword>
    <keyword>Network Topology</keyword>
    <abstract>
      <?line 60?>

<t>This document describes how the various data models that are
produced in the IETF can be combined in the context of Telco  Cloud service delivery.</t>
      <t>Specifically, this document describes the communication of a Network Orchestrator and Cloud orchestrator for the realization of
optimized Telco Cloud services to implement inter-dc reachability and
connectivity services.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IETF has produced several YANG data models that are instrumental
for automating the provisioning and delivery of connectivity
services.  An overview of these data models and a framework that
describes how these various modules can be used together are
described in <xref target="RFC8969"/>.</t>
      <t>This document adopts the rationale of <xref target="RFC8969"/>, but with a focus on
the network coordination with Telco  Cloud services.</t>
      <t>The document also identifies some gaps related to existing models.</t>
      <t>The document outlines an architecture and communication process
of Network Orchestrators and Cloud orchestrators.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>This document assumes that the reader is familiar with the contents
of <xref target="RFC6241"/>, <xref target="RFC7950"/>, and <xref target="RFC8309"/> as it uses terms from those RFCs.</t>
      <t>This document uses the term "network model" as defined in Section 2.1
of <xref target="RFC8969"/>.</t>
    </section>
    <section anchor="a-reference-architecture-of-telco-cloud-network-coordination">
      <name>A Reference Architecture of Telco Cloud Network Coordination</name>
      <t>In some implementation, Cloud Orchestrator and Network Orchestrator
are only associated with their own respective services. That is, Cloud Orchestrator is
responsible for data center (DC) services, such as application,
compute, and/or storage services within the DC, while network
 Orchestrator plans and deploys connections based on planed inter-DC
traffic demands.</t>
      <t>In certain scenarios, such as the <xref target="ETSI-GS-NFV-IFA-032"/> cross-site connectivity service interfaces definition,
to support cloud-based cross-data center (DC) scaling, the NFV cloud platform can leverage network-exposed API interfaces to dynamically collect underlay
WAN network status and establish/update inter-DC connections. The architecture option is shown in the figure below.</t>
      <figure>
        <name>Coordination of Network Resources for the Cloud Service Provisioning</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="384" width="512" viewBox="0 0 512 384" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 16,176 L 16,304" fill="none" stroke="black"/>
              <path d="M 24,32 L 24,112" fill="none" stroke="black"/>
              <path d="M 24,240 L 24,272" fill="none" stroke="black"/>
              <path d="M 32,192 L 32,224" fill="none" stroke="black"/>
              <path d="M 56,192 L 56,272" fill="none" stroke="black"/>
              <path d="M 88,208 L 88,240" fill="none" stroke="black"/>
              <path d="M 128,208 L 128,240" fill="none" stroke="black"/>
              <path d="M 144,120 L 144,200" fill="none" stroke="black"/>
              <path d="M 160,32 L 160,112" fill="none" stroke="black"/>
              <path d="M 160,176 L 160,216" fill="none" stroke="black"/>
              <path d="M 160,232 L 160,304" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,112" fill="none" stroke="black"/>
              <path d="M 344,176 L 344,216" fill="none" stroke="black"/>
              <path d="M 344,232 L 344,304" fill="none" stroke="black"/>
              <path d="M 360,120 L 360,192" fill="none" stroke="black"/>
              <path d="M 368,208 L 368,240" fill="none" stroke="black"/>
              <path d="M 392,208 L 392,240" fill="none" stroke="black"/>
              <path d="M 488,176 L 488,304" fill="none" stroke="black"/>
              <path d="M 504,32 L 504,112" fill="none" stroke="black"/>
              <path d="M 24,32 L 160,32" fill="none" stroke="black"/>
              <path d="M 336,32 L 504,32" fill="none" stroke="black"/>
              <path d="M 168,64 L 328,64" fill="none" stroke="black"/>
              <path d="M 24,112 L 160,112" fill="none" stroke="black"/>
              <path d="M 336,112 L 504,112" fill="none" stroke="black"/>
              <path d="M 16,176 L 136,176" fill="none" stroke="black"/>
              <path d="M 368,176 L 488,176" fill="none" stroke="black"/>
              <path d="M 32,192 L 56,192" fill="none" stroke="black"/>
              <path d="M 88,208 L 128,208" fill="none" stroke="black"/>
              <path d="M 368,208 L 392,208" fill="none" stroke="black"/>
              <path d="M 40,224 L 64,224" fill="none" stroke="black"/>
              <path d="M 128,224 L 312,224" fill="none" stroke="black"/>
              <path d="M 336,224 L 368,224" fill="none" stroke="black"/>
              <path d="M 32,240 L 56,240" fill="none" stroke="black"/>
              <path d="M 88,240 L 128,240" fill="none" stroke="black"/>
              <path d="M 368,240 L 392,240" fill="none" stroke="black"/>
              <path d="M 32,272 L 56,272" fill="none" stroke="black"/>
              <path d="M 16,304 L 160,304" fill="none" stroke="black"/>
              <path d="M 344,304 L 488,304" fill="none" stroke="black"/>
              <path d="M 144,320 L 224,320" fill="none" stroke="black"/>
              <path d="M 264,320 L 312,320" fill="none" stroke="black"/>
              <path d="M 336,320 L 360,320" fill="none" stroke="black"/>
              <path d="M 40,224 C 31.16936,224 24,231.16936 24,240" fill="none" stroke="black"/>
              <path d="M 32,240 C 23.16936,240 16,247.16936 16,256" fill="none" stroke="black"/>
              <path d="M 32,240 C 23.16936,240 16,232.83064 16,224" fill="none" stroke="black"/>
              <path d="M 32,272 C 23.16936,272 16,279.16936 16,288" fill="none" stroke="black"/>
              <path d="M 32,272 C 23.16936,272 16,264.83064 16,256" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="368,192 356,186.4 356,197.6" fill="black" transform="rotate(90,360,192)"/>
              <polygon class="arrowhead" points="336,64 324,58.4 324,69.6" fill="black" transform="rotate(0,328,64)"/>
              <polygon class="arrowhead" points="176,64 164,58.4 164,69.6" fill="black" transform="rotate(180,168,64)"/>
              <polygon class="arrowhead" points="152,200 140,194.4 140,205.6" fill="black" transform="rotate(90,144,200)"/>
              <g class="text">
                <text x="56" y="52">Cloud</text>
                <text x="368" y="52">Network</text>
                <text x="452" y="52">Orchestrator</text>
                <text x="84" y="68">Orchestrator</text>
                <text x="32" y="84">(</text>
                <text x="64" y="84">Telco</text>
                <text x="112" y="84">Cloud</text>
                <text x="188" y="84">IETF</text>
                <text x="272" y="84">Service&amp;Network</text>
                <text x="376" y="84">(Provider</text>
                <text x="448" y="84">Network</text>
                <text x="92" y="100">Orchestration)</text>
                <text x="204" y="100">Data</text>
                <text x="268" y="100">models/API</text>
                <text x="412" y="100">Orchestration)</text>
                <text x="152" y="180">-</text>
                <text x="352" y="180">-</text>
                <text x="44" y="212">NF</text>
                <text x="148" y="212">.1</text>
                <text x="244" y="212">192.0.2.0/31</text>
                <text x="356" y="212">.0</text>
                <text x="76" y="228">..</text>
                <text x="108" y="228">DCGW</text>
                <text x="380" y="228">PE</text>
                <text x="228" y="244">VLAN</text>
                <text x="264" y="244">100</text>
                <text x="40" y="260">APP</text>
                <text x="420" y="276">Provider</text>
                <text x="44" y="292">DC</text>
                <text x="88" y="292">Network</text>
                <text x="416" y="292">Network</text>
                <text x="136" y="324">|</text>
                <text x="244" y="324">AC</text>
                <text x="368" y="324">|</text>
                <text x="32" y="372">Legend:</text>
                <text x="88" y="372">DCGW:</text>
                <text x="124" y="372">DC</text>
                <text x="168" y="372">Gateway</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
  +----------------+                     +--------------------+
  | Cloud          |                     |Network Orchestrator|
  | Orchestrator   |<------------------->|                    |
  |( Telco Cloud   | IETF Service&Network|(Provider Network   |
  | Orchestration) |   Data models/API   |  Orchestration)    |
  +----------------+                     +--------------------+
                 |                          |
                 |                          |
                 |                          |
 +---------------|-+                      +-|---------------+
 | +--+          v |                      | v               |
 | |NF+   +----+ .1|    192.0.2.0/31      |.0+--+           |
 | +--+...+DCGW+-----------------------  ----+PE|           |
 |+---+   +----+   |      VLAN 100        |  +--+           |
 ||APP|            |                      |                 |
 |+---+            |                      |     Provider    |
 |  DC Network     |                      |     Network     |
 +-----------------+                      +-----------------+
                |----------- AC -------  ----|


Legend: DCGW: DC Gateway
]]></artwork>
        </artset>
      </figure>
      <t>This NFV cloud architecture option implies that the Cloud Orchestrator operates with network-awareness.
The Network Orchestrator exposes the interfaces to provide pre-planned bandwidth and dynamic connections. The Cloud Orchestrator can then dynamically control and manage the capacity and network connections between WANs of inter-DC.
As suggested in <xref target="ETSI-GR-NFV-SOL-017"/>, The candidate IETF interfaces between Network Orchestrator and Cloud Orchestrator are outlined in the table below:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Network Function Requirements</th>
            <th align="left">IETF YANG Models</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">Multi-site Connectivity</td>
            <td align="left">- L3SM <xref target="RFC8299"/><br/>- L3NM <xref target="RFC9182"/><br/>- L2SM <xref target="RFC8466"/><br/>- L2NM <xref target="RFC9291"/><br/>- RFC9543 NSS YANG Model<br/>- <eref target="https://datatracker.ietf.org/doc/I-D.ietf-teas-ietf-network-slice-nbi/">I-D.ietf-teas-ietf-network-slice-nbi</eref><br/>- AC Service YANG Model <eref target="https://datatracker.ietf.org/doc/I-D.ietf-opsawg-teas-attachment-circuit/">I-D.ietf-opsawg-teas-attachment-circuit</eref></td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">Capacity Management</td>
            <td align="left">- Service Attachment Point <xref target="RFC9408"/><br/>- TE Service Mapping <xref target="I-D.ietf-teas-te-service-mapping-yang"/><br/>- TE Topology <xref target="RFC8975"/><br/>- TE Tunnel <xref target="I-D.ietf-teas-yang-te"/><br/>- SR Policy <xref target="I-D.ietf-spring-sr-policy-yang"/></td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">Fault Management</td>
            <td align="left">- Alarm Management <xref target="RFC8632"/></td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">Performance Management</td>
            <td align="left">- Network and VPN Service PM <xref target="RFC9375"/></td>
          </tr>
        </tbody>
      </table>
      <t>However, this NFVO architecture option cannot meet the emerging needs of telecom cloud applications because it is difficult to plan bandwidth between large-scale edge DCs and enterprise sites.
For example, AI-based video analysis and AI-driven knowledge reasoning will be deployed in edge data centers,
which are characterized by a large number of deployments and significant variations in resource capabilities.
Combined with the diversity of enterprise sites, the new telecom cloud needs fast, private, and reliable connections between site-to-site, site-to-cloud, or cloud-to-cloud endpoints.</t>
      <t>A potential alternative architecture option involves centralized scheduling of cloud
and network resources to coordinate their integration, enabling rapid
deployment of network services and applications such as SD-WAN, SASE,
and other edge cloud services. This approach ensures agile allocation of cloud resources and
optimization of WAN network resources to meet dynamic demand.</t>
      <figure>
        <name>Alternative Architecture of the Cloud Service Provisioning</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="592" width="440" viewBox="0 0 440 592" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 24,256 L 24,288" fill="none" stroke="black"/>
              <path d="M 24,352 L 24,400" fill="none" stroke="black"/>
              <path d="M 64,176 L 64,208" fill="none" stroke="black"/>
              <path d="M 104,48 L 104,80" fill="none" stroke="black"/>
              <path d="M 128,208 L 128,256" fill="none" stroke="black"/>
              <path d="M 128,288 L 128,352" fill="none" stroke="black"/>
              <path d="M 128,408 L 128,488" fill="none" stroke="black"/>
              <path d="M 216,256 L 216,288" fill="none" stroke="black"/>
              <path d="M 216,352 L 216,400" fill="none" stroke="black"/>
              <path d="M 224,88 L 224,168" fill="none" stroke="black"/>
              <path d="M 256,432 L 256,480" fill="none" stroke="black"/>
              <path d="M 264,272 L 264,336" fill="none" stroke="black"/>
              <path d="M 296,464 L 296,512" fill="none" stroke="black"/>
              <path d="M 312,208 L 312,272" fill="none" stroke="black"/>
              <path d="M 312,336 L 312,432" fill="none" stroke="black"/>
              <path d="M 336,48 L 336,80" fill="none" stroke="black"/>
              <path d="M 368,432 L 368,456" fill="none" stroke="black"/>
              <path d="M 376,272 L 376,336" fill="none" stroke="black"/>
              <path d="M 400,176 L 400,208" fill="none" stroke="black"/>
              <path d="M 408,464 L 408,512" fill="none" stroke="black"/>
              <path d="M 104,48 L 336,48" fill="none" stroke="black"/>
              <path d="M 104,80 L 336,80" fill="none" stroke="black"/>
              <path d="M 64,176 L 400,176" fill="none" stroke="black"/>
              <path d="M 64,208 L 400,208" fill="none" stroke="black"/>
              <path d="M 24,256 L 216,256" fill="none" stroke="black"/>
              <path d="M 264,272 L 376,272" fill="none" stroke="black"/>
              <path d="M 24,288 L 216,288" fill="none" stroke="black"/>
              <path d="M 264,336 L 376,336" fill="none" stroke="black"/>
              <path d="M 24,352 L 216,352" fill="none" stroke="black"/>
              <path d="M 24,400 L 216,400" fill="none" stroke="black"/>
              <path d="M 256,432 L 368,432" fill="none" stroke="black"/>
              <path d="M 296,464 L 408,464" fill="none" stroke="black"/>
              <path d="M 256,480 L 288,480" fill="none" stroke="black"/>
              <path d="M 8,496 L 208,496" fill="none" stroke="black"/>
              <path d="M 296,512 L 408,512" fill="none" stroke="black"/>
              <g class="text">
                <text x="148" y="68">Customer</text>
                <text x="216" y="68">Service</text>
                <text x="288" y="68">Requester</text>
                <text x="184" y="116">Service</text>
                <text x="272" y="116">(e.g.Edge</text>
                <text x="336" y="116">Cloud</text>
                <text x="400" y="116">services,</text>
                <text x="192" y="132">API</text>
                <text x="344" y="132">SD-WANs,SASE)</text>
                <text x="120" y="196">Telco</text>
                <text x="168" y="196">Super</text>
                <text x="224" y="196">Service</text>
                <text x="308" y="196">Orchestrator</text>
                <text x="160" y="244">Network</text>
                <text x="208" y="244">API</text>
                <text x="336" y="244">Cloud</text>
                <text x="376" y="244">API</text>
                <text x="72" y="276">Network</text>
                <text x="156" y="276">Orchestrator</text>
                <text x="320" y="292">Cloud</text>
                <text x="80" y="308">Network</text>
                <text x="324" y="308">Orchestrator</text>
                <text x="68" y="324">YANG</text>
                <text x="72" y="340">Model</text>
                <text x="72" y="372">Network</text>
                <text x="148" y="372">Controller</text>
                <text x="68" y="388">(Overlay</text>
                <text x="112" y="388">&amp;</text>
                <text x="160" y="388">Underlay)</text>
                <text x="84" y="436">Device</text>
                <text x="84" y="452">Models</text>
                <text x="300" y="452">DC</text>
                <text x="320" y="452">1</text>
                <text x="348" y="484">DC-N</text>
                <text x="88" y="516">WAN</text>
                <text x="144" y="516">Network</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[

            +----------------------------+
            | Customer Service Requester |
            +----------------------------+
                           |
                   Service | (e.g.Edge Cloud services,
                      API  |        SD-WANs,SASE)
                           |
                           |
       +-----------------------------------------+
       |    Telco Super Service Orchestrator     |
       +-------+----------------------+----------+
               |                      |
               |Network API           |Cloud API
  +------------+----------+           |
  |  Network Orchestrator |     +-----+-------+
  +------------+----------+     |    Cloud    |
      Network  |                | Orchestrator|
      YANG     |                |             |
      Model    |                +-----+-------+
  +------------+----------+           |
  |  Network Controller   |           |
  | (Overlay & Underlay)  |           |
  +-----------------------+           |
               |                      |
       Device  |               +------+------+
       Models  |               |    DC 1     |
               |               |    +-------------+
               |               +----|    DC-N     |
--------------------------          |             |
         WAN  Network               +-------------+




]]></artwork>
        </artset>
      </figure>
      <t>This proposed telco cloud reference architecture is an open framework to allow for multiple
vendor Network Orchestrators and multiple vendor Cloud
Orchestrators. The goal is to enable standard data models or APIs to provide those services.</t>
    </section>
    <section anchor="telco-cloud-service-requirements">
      <name>Telco Cloud Service Requirements</name>
      <section anchor="optimized-scenarios-of-telco-cloud-service-placement">
        <name>Optimized Scenarios of Telco Cloud Service Placement</name>
        <section anchor="example-of-overlay-network-and-cloud-service-placement">
          <name>Example of Overlay Network and Cloud Service Placement</name>
          <t>The diagram below illustrates a telco cloud network example connecting multiple data centers (DCs) and
enterprise CEs. Multiple data centers are shown, each potentially
hosting different services or applications. For instance, DC-1 is
directly linked to gateway GW2A and GW2B, suggesting it may host
critical applications or services that require high availability.
Various DC gateways are deployed to manage traffic flow towards
Data Centers or Application instances.
Two CE1 devices are connected to PE5A and PE5B respectively,
indicating the start points for customer traffic entering the provider's network.
There are several Provider Edge devices (PE5A, PE5B, etc.) which serve
as entry and exit points for traffic moving between the customer and the provider's network.
The Border routers (BRs) facilitates the transfer of data across different parts of the network.
They connect the access/aggregation layer to the core network.</t>
          <figure>
            <name>Coordination of Network Resources for the Cloud Service Provisioning</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="688" width="600" viewBox="0 0 600 688" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,64 L 8,96" fill="none" stroke="black"/>
                  <path d="M 8,160 L 8,192" fill="none" stroke="black"/>
                  <path d="M 8,240 L 8,304" fill="none" stroke="black"/>
                  <path d="M 8,336 L 8,400" fill="none" stroke="black"/>
                  <path d="M 40,64 L 40,96" fill="none" stroke="black"/>
                  <path d="M 40,160 L 40,192" fill="none" stroke="black"/>
                  <path d="M 80,240 L 80,304" fill="none" stroke="black"/>
                  <path d="M 80,336 L 80,400" fill="none" stroke="black"/>
                  <path d="M 104,64 L 104,96" fill="none" stroke="black"/>
                  <path d="M 104,160 L 104,192" fill="none" stroke="black"/>
                  <path d="M 104,256 L 104,288" fill="none" stroke="black"/>
                  <path d="M 104,352 L 104,384" fill="none" stroke="black"/>
                  <path d="M 104,464 L 104,640" fill="none" stroke="black"/>
                  <path d="M 112,32 L 112,56" fill="none" stroke="black"/>
                  <path d="M 112,104 L 112,152" fill="none" stroke="black"/>
                  <path d="M 112,200 L 112,248" fill="none" stroke="black"/>
                  <path d="M 112,296 L 112,344" fill="none" stroke="black"/>
                  <path d="M 112,392 L 112,416" fill="none" stroke="black"/>
                  <path d="M 128,576 L 128,608" fill="none" stroke="black"/>
                  <path d="M 144,64 L 144,96" fill="none" stroke="black"/>
                  <path d="M 144,160 L 144,192" fill="none" stroke="black"/>
                  <path d="M 144,256 L 144,288" fill="none" stroke="black"/>
                  <path d="M 144,352 L 144,432" fill="none" stroke="black"/>
                  <path d="M 144,480 L 144,512" fill="none" stroke="black"/>
                  <path d="M 160,432 L 160,480" fill="none" stroke="black"/>
                  <path d="M 184,400 L 184,432" fill="none" stroke="black"/>
                  <path d="M 184,480 L 184,512" fill="none" stroke="black"/>
                  <path d="M 184,576 L 184,608" fill="none" stroke="black"/>
                  <path d="M 200,400 L 200,432" fill="none" stroke="black"/>
                  <path d="M 200,480 L 200,512" fill="none" stroke="black"/>
                  <path d="M 200,576 L 200,608" fill="none" stroke="black"/>
                  <path d="M 216,432 L 216,480" fill="none" stroke="black"/>
                  <path d="M 224,160 L 224,192" fill="none" stroke="black"/>
                  <path d="M 224,256 L 224,288" fill="none" stroke="black"/>
                  <path d="M 240,400 L 240,432" fill="none" stroke="black"/>
                  <path d="M 240,480 L 240,512" fill="none" stroke="black"/>
                  <path d="M 256,32 L 256,152" fill="none" stroke="black"/>
                  <path d="M 256,200 L 256,248" fill="none" stroke="black"/>
                  <path d="M 256,296 L 256,416" fill="none" stroke="black"/>
                  <path d="M 256,576 L 256,608" fill="none" stroke="black"/>
                  <path d="M 264,160 L 264,192" fill="none" stroke="black"/>
                  <path d="M 264,256 L 264,288" fill="none" stroke="black"/>
                  <path d="M 272,464 L 272,640" fill="none" stroke="black"/>
                  <path d="M 296,160 L 296,192" fill="none" stroke="black"/>
                  <path d="M 296,256 L 296,288" fill="none" stroke="black"/>
                  <path d="M 296,464 L 296,480" fill="none" stroke="black"/>
                  <path d="M 296,512 L 296,640" fill="none" stroke="black"/>
                  <path d="M 304,32 L 304,152" fill="none" stroke="black"/>
                  <path d="M 304,200 L 304,248" fill="none" stroke="black"/>
                  <path d="M 304,296 L 304,416" fill="none" stroke="black"/>
                  <path d="M 320,400 L 320,432" fill="none" stroke="black"/>
                  <path d="M 320,480 L 320,512" fill="none" stroke="black"/>
                  <path d="M 336,160 L 336,192" fill="none" stroke="black"/>
                  <path d="M 336,256 L 336,288" fill="none" stroke="black"/>
                  <path d="M 336,432 L 336,480" fill="none" stroke="black"/>
                  <path d="M 360,400 L 360,432" fill="none" stroke="black"/>
                  <path d="M 360,480 L 360,512" fill="none" stroke="black"/>
                  <path d="M 384,400 L 384,432" fill="none" stroke="black"/>
                  <path d="M 384,480 L 384,512" fill="none" stroke="black"/>
                  <path d="M 408,432 L 408,480" fill="none" stroke="black"/>
                  <path d="M 416,160 L 416,192" fill="none" stroke="black"/>
                  <path d="M 416,256 L 416,288" fill="none" stroke="black"/>
                  <path d="M 424,400 L 424,432" fill="none" stroke="black"/>
                  <path d="M 424,480 L 424,512" fill="none" stroke="black"/>
                  <path d="M 448,32 L 448,160" fill="none" stroke="black"/>
                  <path d="M 448,200 L 448,248" fill="none" stroke="black"/>
                  <path d="M 448,296 L 448,416" fill="none" stroke="black"/>
                  <path d="M 456,160 L 456,192" fill="none" stroke="black"/>
                  <path d="M 456,256 L 456,288" fill="none" stroke="black"/>
                  <path d="M 464,464 L 464,640" fill="none" stroke="black"/>
                  <path d="M 472,128 L 472,304" fill="none" stroke="black"/>
                  <path d="M 480,160 L 480,192" fill="none" stroke="black"/>
                  <path d="M 480,256 L 480,288" fill="none" stroke="black"/>
                  <path d="M 520,160 L 520,192" fill="none" stroke="black"/>
                  <path d="M 520,256 L 520,288" fill="none" stroke="black"/>
                  <path d="M 528,208 L 528,240" fill="none" stroke="black"/>
                  <path d="M 584,208 L 584,240" fill="none" stroke="black"/>
                  <path d="M 592,128 L 592,304" fill="none" stroke="black"/>
                  <path d="M 112,32 L 256,32" fill="none" stroke="black"/>
                  <path d="M 304,32 L 448,32" fill="none" stroke="black"/>
                  <path d="M 8,64 L 40,64" fill="none" stroke="black"/>
                  <path d="M 104,64 L 144,64" fill="none" stroke="black"/>
                  <path d="M 40,80 L 96,80" fill="none" stroke="black"/>
                  <path d="M 8,96 L 40,96" fill="none" stroke="black"/>
                  <path d="M 104,96 L 144,96" fill="none" stroke="black"/>
                  <path d="M 472,128 L 520,128" fill="none" stroke="black"/>
                  <path d="M 568,128 L 592,128" fill="none" stroke="black"/>
                  <path d="M 8,160 L 40,160" fill="none" stroke="black"/>
                  <path d="M 104,160 L 144,160" fill="none" stroke="black"/>
                  <path d="M 224,160 L 264,160" fill="none" stroke="black"/>
                  <path d="M 296,160 L 336,160" fill="none" stroke="black"/>
                  <path d="M 416,160 L 456,160" fill="none" stroke="black"/>
                  <path d="M 488,160 L 520,160" fill="none" stroke="black"/>
                  <path d="M 40,176 L 96,176" fill="none" stroke="black"/>
                  <path d="M 272,176 L 288,176" fill="none" stroke="black"/>
                  <path d="M 8,192 L 40,192" fill="none" stroke="black"/>
                  <path d="M 104,192 L 144,192" fill="none" stroke="black"/>
                  <path d="M 224,192 L 264,192" fill="none" stroke="black"/>
                  <path d="M 296,192 L 336,192" fill="none" stroke="black"/>
                  <path d="M 416,192 L 456,192" fill="none" stroke="black"/>
                  <path d="M 488,192 L 512,192" fill="none" stroke="black"/>
                  <path d="M 536,208 L 576,208" fill="none" stroke="black"/>
                  <path d="M 8,240 L 80,240" fill="none" stroke="black"/>
                  <path d="M 536,240 L 576,240" fill="none" stroke="black"/>
                  <path d="M 104,256 L 144,256" fill="none" stroke="black"/>
                  <path d="M 224,256 L 264,256" fill="none" stroke="black"/>
                  <path d="M 296,256 L 336,256" fill="none" stroke="black"/>
                  <path d="M 416,256 L 456,256" fill="none" stroke="black"/>
                  <path d="M 488,256 L 512,256" fill="none" stroke="black"/>
                  <path d="M 272,272 L 288,272" fill="none" stroke="black"/>
                  <path d="M 104,288 L 144,288" fill="none" stroke="black"/>
                  <path d="M 224,288 L 264,288" fill="none" stroke="black"/>
                  <path d="M 296,288 L 336,288" fill="none" stroke="black"/>
                  <path d="M 416,288 L 456,288" fill="none" stroke="black"/>
                  <path d="M 488,288 L 520,288" fill="none" stroke="black"/>
                  <path d="M 8,304 L 80,304" fill="none" stroke="black"/>
                  <path d="M 472,304 L 592,304" fill="none" stroke="black"/>
                  <path d="M 8,336 L 80,336" fill="none" stroke="black"/>
                  <path d="M 104,352 L 144,352" fill="none" stroke="black"/>
                  <path d="M 104,384 L 144,384" fill="none" stroke="black"/>
                  <path d="M 8,400 L 80,400" fill="none" stroke="black"/>
                  <path d="M 144,400 L 184,400" fill="none" stroke="black"/>
                  <path d="M 200,400 L 240,400" fill="none" stroke="black"/>
                  <path d="M 320,400 L 360,400" fill="none" stroke="black"/>
                  <path d="M 384,400 L 424,400" fill="none" stroke="black"/>
                  <path d="M 112,416 L 136,416" fill="none" stroke="black"/>
                  <path d="M 432,416 L 448,416" fill="none" stroke="black"/>
                  <path d="M 144,432 L 184,432" fill="none" stroke="black"/>
                  <path d="M 200,432 L 240,432" fill="none" stroke="black"/>
                  <path d="M 320,432 L 360,432" fill="none" stroke="black"/>
                  <path d="M 384,432 L 424,432" fill="none" stroke="black"/>
                  <path d="M 104,464 L 272,464" fill="none" stroke="black"/>
                  <path d="M 296,464 L 464,464" fill="none" stroke="black"/>
                  <path d="M 144,480 L 184,480" fill="none" stroke="black"/>
                  <path d="M 200,480 L 240,480" fill="none" stroke="black"/>
                  <path d="M 320,480 L 360,480" fill="none" stroke="black"/>
                  <path d="M 384,480 L 424,480" fill="none" stroke="black"/>
                  <path d="M 144,512 L 184,512" fill="none" stroke="black"/>
                  <path d="M 200,512 L 240,512" fill="none" stroke="black"/>
                  <path d="M 320,512 L 360,512" fill="none" stroke="black"/>
                  <path d="M 384,512 L 424,512" fill="none" stroke="black"/>
                  <path d="M 128,576 L 184,576" fill="none" stroke="black"/>
                  <path d="M 200,576 L 256,576" fill="none" stroke="black"/>
                  <path d="M 128,608 L 184,608" fill="none" stroke="black"/>
                  <path d="M 200,608 L 256,608" fill="none" stroke="black"/>
                  <path d="M 104,640 L 176,640" fill="none" stroke="black"/>
                  <path d="M 216,640 L 272,640" fill="none" stroke="black"/>
                  <path d="M 296,640 L 352,640" fill="none" stroke="black"/>
                  <path d="M 392,640 L 464,640" fill="none" stroke="black"/>
                  <path d="M 440,160 C 448.83064,160 456,167.16936 456,176" fill="none" stroke="black"/>
                  <path d="M 488,160 C 479.16936,160 472,167.16936 472,176" fill="none" stroke="black"/>
                  <path d="M 488,160 C 479.16936,160 472,152.83064 472,144" fill="none" stroke="black"/>
                  <path d="M 464,176 C 472.83064,176 480,183.16936 480,192" fill="none" stroke="black"/>
                  <path d="M 464,176 C 472.83064,176 480,168.83064 480,160" fill="none" stroke="black"/>
                  <path d="M 488,192 C 479.16936,192 472,199.16936 472,208" fill="none" stroke="black"/>
                  <path d="M 488,192 C 479.16936,192 472,184.83064 472,176" fill="none" stroke="black"/>
                  <path d="M 512,192 C 520.83064,192 528,199.16936 528,208" fill="none" stroke="black"/>
                  <path d="M 536,208 C 527.16936,208 520,200.83064 520,192" fill="none" stroke="black"/>
                  <path d="M 576,208 C 584.83064,208 592,215.16936 592,224" fill="none" stroke="black"/>
                  <path d="M 576,208 C 584.83064,208 592,200.83064 592,192" fill="none" stroke="black"/>
                  <path d="M 536,240 C 527.16936,240 520,247.16936 520,256" fill="none" stroke="black"/>
                  <path d="M 576,240 C 584.83064,240 592,247.16936 592,256" fill="none" stroke="black"/>
                  <path d="M 576,240 C 584.83064,240 592,232.83064 592,224" fill="none" stroke="black"/>
                  <path d="M 488,256 C 479.16936,256 472,263.16936 472,272" fill="none" stroke="black"/>
                  <path d="M 488,256 C 479.16936,256 472,248.83064 472,240" fill="none" stroke="black"/>
                  <path d="M 512,256 C 520.83064,256 528,248.83064 528,240" fill="none" stroke="black"/>
                  <path d="M 464,272 C 472.83064,272 480,279.16936 480,288" fill="none" stroke="black"/>
                  <path d="M 464,272 C 472.83064,272 480,264.83064 480,256" fill="none" stroke="black"/>
                  <path d="M 488,288 C 479.16936,288 472,295.16936 472,304" fill="none" stroke="black"/>
                  <path d="M 488,288 C 479.16936,288 472,280.83064 472,272" fill="none" stroke="black"/>
                  <g class="text">
                    <text x="24" y="84">CE1</text>
                    <text x="124" y="84">PE5A</text>
                    <text x="532" y="132">DC</text>
                    <text x="552" y="132">1</text>
                    <text x="24" y="180">CE2</text>
                    <text x="124" y="180">PE5B</text>
                    <text x="244" y="180">BR2A</text>
                    <text x="316" y="180">BR1A</text>
                    <text x="436" y="180">PE1A</text>
                    <text x="500" y="180">GW2A</text>
                    <text x="188" y="212">Access/Agg</text>
                    <text x="364" y="212">Core</text>
                    <text x="544" y="228">APP</text>
                    <text x="568" y="228">A</text>
                    <text x="184" y="244">Network</text>
                    <text x="376" y="244">Network</text>
                    <text x="36" y="276">DC-4</text>
                    <text x="92" y="276">--</text>
                    <text x="124" y="276">PE4A</text>
                    <text x="244" y="276">BR2B</text>
                    <text x="316" y="276">BR1B</text>
                    <text x="436" y="276">PE1B</text>
                    <text x="500" y="276">GW2B</text>
                    <text x="36" y="372">DC-5</text>
                    <text x="92" y="372">--</text>
                    <text x="124" y="372">PE4B</text>
                    <text x="164" y="420">PE3A</text>
                    <text x="192" y="420">-</text>
                    <text x="220" y="420">PE3B</text>
                    <text x="248" y="420">-</text>
                    <text x="312" y="420">-</text>
                    <text x="340" y="420">PE2A</text>
                    <text x="372" y="420">--</text>
                    <text x="404" y="420">PE2B</text>
                    <text x="164" y="500">GW1A</text>
                    <text x="220" y="500">GW1B</text>
                    <text x="340" y="500">GW3A</text>
                    <text x="404" y="500">GW3B</text>
                    <text x="148" y="596">vCPE</text>
                    <text x="216" y="596">APP</text>
                    <text x="240" y="596">A</text>
                    <text x="196" y="644">DC-3</text>
                    <text x="372" y="644">DC-2</text>
                    <text x="32" y="660">Legend:</text>
                    <text x="80" y="660">GW:</text>
                    <text x="108" y="660">DC</text>
                    <text x="152" y="660">Gateway</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
             +-----------------+     +-----------------+
             |                 |     |                 |
+---+       +----+             |     |                 |
|CE1+-------|PE5A|             |     |                 |
+---+       +----+             |     |                 |
             |                 |     |                 |
             |                 |     |                 |  +------DC 1 ---+
             |                 |     |                 |  |              |
+---+       +----+         +----+   +----+         +---++ |+----+        |
|CE2+-------|PE5B|         |BR2A|---|BR1A|         |PE1A|-+|GW2A|        |
+---+       +----+         +----+   +----+         +----+ |+----+        |
             |    Access/Agg   |     |     Core        |  |      +------+|
             |                 |     |                 |  |      |APP A ||
+--------+   |     Network     |     |     Network     |  |      +------+|
|        |  +----+         +----+   +----+         +----+ |+----+        |
| DC-4   |--|PE4A|         |BR2B|---|BR1B|         |PE1B|-+|GW2B|        |
|        |  +----+         +----+   +----+         +----+ |+----+        |
+--------+   |                 |     |                 |  +--------------+
             |                 |     |                 |
+--------+   |                 |     |                 |
|        |  +----+             |     |                 |
| DC-5   |--|PE4B|             |     |                 |
|        |  +----+             |     |                 |
+--------+   |   +----+ +----+ |     | +----+  +----+  |
             +---|PE3A|-|PE3B|-+     +-|PE2A|--|PE2B|--+
                 +-+--+ +-+--+         +-+--+  +--+-+
                   |      |              |        |
            +------+------+------+  +----+--------+------+
            |    +-+--+ +-+--+   |  |  +-+--+  +--+-+    |
            |    |GW1A| |GW1B|   |     |GW3A|  |GW3B|    |
            |    +----+ +----+   |  |  +----+  +----+    |
            |                    |  |                    |
            |                    |  |                    |
            |                    |  |                    |
            |  +------+ +------+ |  |                    |
            |  |vCPE  | |APP A | |  |                    |
            |  +------+ +------+ |  |                    |
            |                    |  |                    |
            +---------DC-3-------+  +-------DC-2---------+
Legend: GW: DC Gateway

]]></artwork>
            </artset>
          </figure>
          <t>To create services across DCs like optimized service placement,
generic API calls are needed. A typical usage is to use Restful APIs
of Cloud Orchestrator and Network Orchestrator and used by
the Super Orchestrator to provision the inter-DC services connections and also applications.</t>
          <t>When deploying cross-DC cloud services, it is assumed that the Super
 Orchestrator has access to the DC and network connectivity topology (e.g. TE
Topology <xref target="RFC8975"/>), as well as centralized resource information for both the DCs and the network.
Some standard network inventory interfaces are available. For example,
the Service Attachment Points (SAPs) <xref target="RFC9408"/> or ACs <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> can obtain the AC/Bearer
information of the PE, which suggests that the private line service
provisioning resource resources on the network side, but there is no
cloud DC service provisioning resource information, such as CPU, GPU,
storage, and DC network information. DC aware TE topology model <xref target="I-D.llc-teas-dc-aware-topo-model-04"/> defines YANG models about the information. One API example is as below.</t>
          <figure>
            <name>Cloud Inventory API</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="400" width="480" viewBox="0 0 480 400" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <g class="text">
                    <text x="16" y="36">GET</text>
                    <text x="256" y="36">/api/cloud/resources?type=compute&amp;network&amp;location=dc-3</text>
                    <text x="8" y="52">{</text>
                    <text x="60" y="68">"compute":</text>
                    <text x="112" y="68">{</text>
                    <text x="64" y="84">"vCPU":</text>
                    <text x="116" y="84">100,</text>
                    <text x="60" y="100">"GPU":</text>
                    <text x="100" y="100">2,</text>
                    <text x="72" y="116">"memory":</text>
                    <text x="152" y="116">"1280GB",</text>
                    <text x="76" y="132">"storage":</text>
                    <text x="152" y="132">"10TB",</text>
                    <text x="100" y="148">"instance_type":</text>
                    <text x="200" y="148">"large"</text>
                    <text x="28" y="164">},</text>
                    <text x="60" y="180">"network":</text>
                    <text x="112" y="180">{</text>
                    <text x="96" y="196">"availability":</text>
                    <text x="168" y="196">{</text>
                    <text x="104" y="212">"throughput":</text>
                    <text x="176" y="212">"10</text>
                    <text x="220" y="212">Gbps",</text>
                    <text x="92" y="228">"latency":</text>
                    <text x="168" y="228">"&lt;1ms",</text>
                    <text x="108" y="244">"packet_loss":</text>
                    <text x="208" y="244">"0.001%",</text>
                    <text x="140" y="260">"supported_protocols":</text>
                    <text x="272" y="260">["VxLAN",</text>
                    <text x="340" y="260">"GRE"]</text>
                    <text x="44" y="276">},</text>
                    <text x="76" y="292">"subnets":</text>
                    <text x="128" y="292">[</text>
                    <text x="56" y="308">{</text>
                    <text x="96" y="324">"cidr":</text>
                    <text x="188" y="324">"10.1.0.0/24",</text>
                    <text x="56" y="340">}</text>
                    <text x="44" y="356">],</text>
                    <text x="24" y="372">}</text>
                    <text x="8" y="388">}</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
GET /api/cloud/resources?type=compute&network&location=dc-3
{
  "compute": {
    "vCPU": 100,
    "GPU": 2,    
    "memory": "1280GB",
    "storage": "10TB",
    "instance_type": "large"
  },
  "network": {
    "availability": {
      "throughput": "10 Gbps",
      "latency": "<1ms",
      "packet_loss": "0.001%",
      "supported_protocols": ["VxLAN", "GRE"]
    },
    "subnets": [
      {
        "cidr": "10.1.0.0/24",
      }
    ],
  }
}
]]></artwork>
            </artset>
          </figure>
          <t>The flowchart below gives an example of hospital applications are deployed
and ensure efficient use of network connections for optimized data flow.</t>
          <figure>
            <name>Cloud Service Placement</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="256" viewBox="0 0 256 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,224" fill="none" stroke="black"/>
                  <path d="M 8,304 L 8,432" fill="none" stroke="black"/>
                  <path d="M 8,496 L 8,592" fill="none" stroke="black"/>
                  <path d="M 128,232 L 128,296" fill="none" stroke="black"/>
                  <path d="M 136,440 L 136,488" fill="none" stroke="black"/>
                  <path d="M 248,32 L 248,128" fill="none" stroke="black"/>
                  <path d="M 248,160 L 248,224" fill="none" stroke="black"/>
                  <path d="M 248,304 L 248,432" fill="none" stroke="black"/>
                  <path d="M 248,496 L 248,592" fill="none" stroke="black"/>
                  <path d="M 8,32 L 248,32" fill="none" stroke="black"/>
                  <path d="M 8,224 L 248,224" fill="none" stroke="black"/>
                  <path d="M 8,304 L 248,304" fill="none" stroke="black"/>
                  <path d="M 8,432 L 248,432" fill="none" stroke="black"/>
                  <path d="M 8,496 L 248,496" fill="none" stroke="black"/>
                  <path d="M 8,592 L 248,592" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="144,488 132,482.4 132,493.6" fill="black" transform="rotate(90,136,488)"/>
                  <polygon class="arrowhead" points="136,296 124,290.4 124,301.6" fill="black" transform="rotate(90,128,296)"/>
                  <g class="text">
                    <text x="16" y="52">1</text>
                    <text x="48" y="52">Super</text>
                    <text x="124" y="52">Orchestrator</text>
                    <text x="80" y="84">Requirement</text>
                    <text x="164" y="84">Analysis</text>
                    <text x="208" y="84">&amp;</text>
                    <text x="52" y="100">Resource</text>
                    <text x="132" y="100">Allocation</text>
                    <text x="212" y="100">Decision</text>
                    <text x="44" y="132">Branch</text>
                    <text x="92" y="132">Data</text>
                    <text x="152" y="132">Transfer:</text>
                    <text x="48" y="148">Bandwidth</text>
                    <text x="172" y="148">100Mbps,Latency&lt;50ms</text>
                    <text x="40" y="164">Secure,</text>
                    <text x="84" y="164">AI</text>
                    <text x="132" y="164">Analysis</text>
                    <text x="36" y="196">Select</text>
                    <text x="84" y="196">Edge</text>
                    <text x="116" y="196">DC</text>
                    <text x="144" y="196">and</text>
                    <text x="192" y="196">compute</text>
                    <text x="48" y="212">dedicated</text>
                    <text x="108" y="212">Line</text>
                    <text x="16" y="324">2</text>
                    <text x="64" y="324">Cloud</text>
                    <text x="140" y="324">Orchestrator</text>
                    <text x="200" y="324">&amp;</text>
                    <text x="72" y="340">Network</text>
                    <text x="156" y="340">Orchestrator</text>
                    <text x="80" y="372">Application</text>
                    <text x="136" y="372">&amp;</text>
                    <text x="176" y="372">Network</text>
                    <text x="80" y="388">connections</text>
                    <text x="172" y="388">deployment</text>
                    <text x="60" y="404">Center</text>
                    <text x="112" y="404">DC:AI</text>
                    <text x="172" y="404">training</text>
                    <text x="52" y="420">Edge</text>
                    <text x="96" y="420">DC:AI</text>
                    <text x="160" y="420">inference</text>
                    <text x="16" y="516">3</text>
                    <text x="48" y="516">Super</text>
                    <text x="124" y="516">Orchestrator</text>
                    <text x="76" y="548">Validation</text>
                    <text x="136" y="548">and</text>
                    <text x="196" y="548">Monitoring</text>
                    <text x="32" y="564">(Test</text>
                    <text x="108" y="564">Transmission</text>
                    <text x="196" y="564">Latency:</text>
                    <text x="28" y="580">48ms</text>
                    <text x="72" y="580">Check</text>
                    <text x="116" y="580">Data</text>
                    <text x="180" y="580">Integrity)</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
+-----------------------------+
|1 Super Orchestrator         |
|                             |
|   Requirement Analysis &    |
| Resource Allocation Decision|
|                             |
| Branch Data Transfer:       |
|Bandwidth 100Mbps,Latency<50ms
|Secure, AI Analysis          |
|                             |
|Select Edge DC and compute   |
|dedicated Line               |
+-----------------------------+
               |
               |
               |
               v
+-----------------------------+
|2   Cloud Orchestrator &     |
|    Network Orchestrator     |
|                             |
|   Application & Network     |
|   connections deployment    |
|   Center DC:AI training     |
|   Edge DC:AI inference      |
+-----------------------------+
                |
                |
                v
+-----------------------------+
|3 Super Orchestrator         |
|                             |
|   Validation and Monitoring |
|(Test Transmission Latency:  |
|48ms Check Data Integrity)   |
+-----------------------------+



]]></artwork>
            </artset>
          </figure>
          <t>Here is a step-by-step breakdown of the flowchart with detailed explanations for each step:</t>
          <ol spacing="normal" type="1"><li>
              <t>Step 1: Requirement Analysis: This is the first step where the Super Orchestrator gathers and analyzes requirements for branch data transfer.
Key Requirements are bandwidth must be at least 100 Mbps, data must be transmitted over a private connectionbe, and support AI analysis.
the Super Orchestrator also determines the optimal allocation of resources for data transfer. Data will flow from the branch office to the center data center (DC).
A edge DC is selected as an intermediate hop. A dedicated line of 100 Mbps of bandwidth with redundant links and to the center and edge DC is needed.
Underlay Network Controllers may expose to Network Orchestrator s a set of network data models, such as the AC, L3SM <xref target="RFC8299"/>, L3NM <xref target="RFC9182"/>, L2SM <xref target="RFC8466"/>, L2NM <xref target="RFC9291"/>, RFC9543 NSS YANG Model <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>,
Service Attachment Points (SAPs) <xref target="RFC9408"/>, TE Service Mapping <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, TE Tunnel <xref target="I-D.ietf-teas-yang-te"/>, or SR Policy <xref target="I-D.ietf-spring-sr-policy-yang"/>.
Network Orchestrator can use these models to set up connections between the Provider Edge devices, and also customer facing ACs between CEs and PEs, DC-GWs and PEs.</t>
            </li>
            <li>
              <t>Step 2: Application Instances Deployment and Parallel Network Connectivity: This step involves deploying AI at the center DC and the edge DC. 
With request from Super Orchestrator, Cloud Orchestrator allocates resources, including GPU clusters and storage.
Also Network Orchestrator can configure PE.</t>
            </li>
            <li>
              <t>Step 3: Validation and Monitoring: This step ensures that the service meets performance and reliability expectations.
Through the open interfaces, Super orchestrator can monitor status of cloud resources and WAN connections.
The open interfaces could be VPN PM <xref target="RFC9375"/> ,Alarm Management <xref target="RFC8632"/>, or new service assurance models.</t>
            </li>
          </ol>
          <t>The steps described above assume that ​​Super Orchestrator​​ can access
both network and cloud resources to perform resource analysis and
allocation.</t>
          <section anchor="example-of-telco-cloud-service-creation-flow">
            <name>Example of Telco Cloud Service Creation Flow</name>
            <t>An example of service creation flow is as follows:</t>
            <figure>
              <name>Cloud Service Creation</name>
              <artwork align="center"><![CDATA[
 +------------------+         +---------------+    +----------------+
 |Super Orchestrator|         | Cloud Orchestr|    |Network Orchestr|
 +------------------+         +---------------+    +----------------+
      |                               |                        |
      |                               |                        |
      |1.1 Create a cloud service     |                        |
      |------------------------------>|                        |
      |                               |                        |
      |                   +--------------------------+         |
      |                   |2.Deploy the cloud service|         |
      |                   +--------------------------+         |
      |                               |                        |
      |         1.2 Create a network service                   |
      |------------------------------------------------------->|
      |                               |                        |
      |                               |   +----------------------------+
      |                               |   |2.Deploy the network service|
      |                               | +------------------------------+
      | 3.Create cloud service response                        |
      |-------------------------------|                        |
      |                               |                        |
      |                               |                        |
      |         3. Create Network service response             |
      |--------------------------------------------------------|
      |                               |                        |
      |                               |                        |
      |                               |                        |
      | 4. Subscribe for cloud performance metric              |
      |------------------------------>|                        |
      |                               |                        |
      |             5.Subscribe for network performance metric |
      |------------------------------------------------------->|
      |                               |                        |
 +------------------------+           |                        |
 |                        |           |                        |
 |5.Continuous monitoring |           |                        |
 +------------------------+           |                        |
      |                               |                        |
      |                               |                        |

]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="more-examples-to-add">
          <name>More Examples to Add</name>
        </section>
      </section>
      <section anchor="optimized-scenarios-of-telco-cloud-service-assurance">
        <name>Optimized Scenarios of Telco Cloud Service Assurance</name>
        <t>A scaling example is to add.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBC.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-25"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ETSI-GS-NFV-IFA-032" target="https://www.etsi.org/deliver/etsi_gs/nfv-ifa/001_099/032/04.02.01_60/gs_nfv-ifa032v040201p.pdf">
          <front>
            <title>Interface and Information Model Specification for Multi-Site Connectivity Services</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="ETSI-GR-NFV-SOL-017" target="https://www.etsi.org/deliver/etsi_gr/NFV-SOL/001_099/017/03.03.01_60/gr_NFV-SOL017v030301p.pdf">
          <front>
            <title>Report on protocol and data model solutions for Multi-site Connectivity Services</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8975">
          <front>
            <title>Network Coding for Satellite Systems</title>
            <author fullname="N. Kuhn" initials="N." role="editor" surname="Kuhn"/>
            <author fullname="E. Lochin" initials="E." role="editor" surname="Lochin"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document is a product of the Coding for Efficient Network Communications Research Group (NWCRG). It conforms to the directions found in the NWCRG taxonomy (RFC 8406).</t>
              <t>The objective is to contribute to a larger deployment of Network Coding techniques in and above the network layer in satellite communication systems. This document also identifies open research issues related to the deployment of Network Coding in satellite communication systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8975"/>
          <seriesInfo name="DOI" value="10.17487/RFC8975"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   Delivery of network services assumes that appropriate setup is
   provisioned over the links that connect customer termination points
   and a provider network.  The required setup to allow successful data
   exchange over these links is referred to as an attachment circuit
   (AC), while the underlying link is referred to as "bearer".

   This document specifies a YANG service data model for ACs.  This
   model can be used for the provisioning of ACs before or during
   service provisioning (e.g., Network Slice Service).

   The document also specifies a YANG service model for managing bearers
   over which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-20"/>
        </reference>
        <reference anchor="I-D.llc-teas-dc-aware-topo-model-04">
          <front>
            <title>DC aware TE topology model</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document proposes the extension of the TE topology model for
   including information related to data center resource capabilities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-llc-teas-dc-aware-topo-model-04"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-17"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-38"/>
        </reference>
        <reference anchor="I-D.ietf-spring-sr-policy-yang">
          <front>
            <title>YANG Data Model for Segment Routing Policy</title>
            <author fullname="Syed Kamran Raza" initials="S. K." surname="Raza">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Tarik Saleh" initials="T." surname="Saleh">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Individual</organization>
            </author>
            <author fullname="Muhammad Durrani" initials="M." surname="Durrani">
              <organization>Oracle Corporation</organization>
            </author>
            <author fullname="Satoru Matsushima" initials="S." surname="Matsushima">
              <organization>SoftBank</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <date day="25" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   Policy that can be used for configuring, instantiating, and managing
   SR policies.  The model is generic and applies equally to the MPLS
   and SRv6 instantiations of SR policies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-policy-yang-05"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC8632">
          <front>
            <title>A YANG Data Model for Alarm Management</title>
            <author fullname="S. Vallin" initials="S." surname="Vallin"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document defines a YANG module for alarm management. It includes functions for alarm-list management, alarm shelving, and notifications to inform management systems. There are also operations to manage the operator state of an alarm and administrative alarm procedures. The module carefully maps to relevant alarm standards.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8632"/>
          <seriesInfo name="DOI" value="10.17487/RFC8632"/>
        </reference>
      </references>
    </references>
    <?line 448?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank xxx and many others for their helpful comments and
suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Jie Dong">
        <organization>Huawei</organization>
        <address>
          <email>jie.dong@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA808a3PbxnbfNaP/sJWnrj0k+JLsWJrk3lCUrKi1ZY2l2O1k
Mh4QWJKoQQDFQzRjqtPv/Zf9JT2PXWABLmlazk3CPCQuds+ePefseUOO4+zv
5UEeyhNxMEySMPDccRAG+VLEE3F5fvvSOZOTIJK+uJHpXeBJ4Ua+uJL5Ik4/
ijM3d8Xr2JdhJiZxKm5l6MVeGBfVlNdu5E7lXEb5wf6eOx6n8g62+tJEz83l
NE6XJyKIJvH+3v6eH3uROwc0/dSd5M6nhec7kYxz6TlR5swJBycvwTq93v5e
VoznQZYFcZQvE1iK59nfi4r5WKYnABI2gR9eHGUyyorsRORpIff3AMFDwDWV
LmD6JpGpmwOIjE5ewxLxnqZxkcC8OMI5MPhRLmHcP0GkhSOGRR7PCQB9pYPP
xQhxpAF9/HKf2uhtnMRhPF0iMLfIZzHiLYBnAj6TIgyZJqNZHE0nMpqKfw8k
P4zTqRsFvxFInBBELm4uYXeeIOduEJ6IT4H0ZpMfPZyQ8/OOF9k2OY3F+8IG
/KfCXcigBjUEMnUWxTj+cUYPO7ztGswrdyxlKEax91GmNthvQfJ+cvMa8Mij
6T+m0p+5+SbQr4LId8VZEY1dK+SXRV6kcg1xnxb8ONFPGTxJSZ4GY+CmwYJq
t38NpDgDJtDwRvKoTf4zkB0fJteIA4IZpygpd5JkBwW/+i7E+e3NpXNx41y9
fOdcvhw6vcPBCaOu7+9llMt04qo7eqnXxxFfUXGTSC+YwA1nMcML+7oI88C5
CXIJPIgi6cF2ePnVZUd5ph3cdCrzEzHL8yQ76XYXi0VH5lnQgZN2ATTgmHZx
4MM060aTOyeYuN1er/+hd3zcBUS7vaNOb9CBgee97jT7oKbAk7veUW/Q6yed
xJ/wXnQr4Z4txaA36NMtUmd/S2e/efPK6fW/a5z9rUziNBdw1iSN89iLQyKC
jwqKlIPI4rDgewwH39/jk2e/48nTrkKvOnn/Ozh9B//lk6cf1BR4ctc7hH+2
n9xxHOGOszx1vRy/386CTIAmLFABCV9mHoikzMQsXoh8JsWdmwZxkRnHzmDc
zQUos/09oIxfeHChgohmozoUnhuJsRQggmNS8+oZirv8lKMVIJUlWGWJTFkB
dfRlB9EqBSsMl21YbkeSwc7nRaREEIG7lQJMvZnEo8INI97xhrE5jCKLYEA1
h+p+AZD9vTjJg3nwG6DPyNZwhZ1jEcyTkNQ2HBBuieN7CMSbaWsHG9IdrwRB
r+5oRswD3w8lfnsElysnYvJNQsYocs7cTJR0ziSQyA3FfwyvLqw8AWTgaEQo
N+Qb6Sp7AbocTwqw7gK0YDhAEq0Ij8Qz8QVrpxEWYghkucOvcoHzAFAmawgg
JFdMUtBdRHxECAxiU6CySqRgYRHCEyUvRQbny2O4GzOZsnjp1SRDnz///e3L
0Yvj58f395110XV9YBmLBFs9N5SIqbmsLUDbikWQzxBVWJkJJDauiZTMeDFY
WjRcKAg00yasWUezqNo/zEAmfPgV5BZOlcVzKaZukoFUhHAN8WxCfgoyYgQT
bR1KXOQhXBokJ5AATCh4I2g2iLx1UQc+AiIZiOrEKvHZBpHnXVHkQEvdIb7a
EyG/LKDvFvpmGfyiBE3dGB8YBXMm7hxE3k2ZXuVdj3JGjjnwfHDURw7wt++O
n/XwG26rOHTYAw7BNiLIURZgJ5nOAXgKzg24KSA4MCuzcJ4nw664QBxoThKJ
DxCgr/xNEKIbSRdMDDp9AzdDqB6JIXgIE5nKCHTS0GRBqbhGNS9zZEgMQriM
mPelfqAnbbVqTSfZWEeuIohmuESyx15A8qOpG6QiXkRA/yyhqyorqRS3yJ0g
s+4WADtwEbA3GMPlQN1AN9iTqMDEk7PR0xJUW2SFN0PquezD0yFQoc2TIpfE
uS4AyAAyuK+VZkQslcY/G7XFYhaE5e0Co1TDKAGnLlM6KAnjZVbqHxTJsYsa
ASUdphH7UM2ejeDCgsMOxgFWzWExywSQ3ZNp7sLeGRwIdYxxCETn82eLwwMi
56VxlrHdtqlr3hedICVJgSIF3OesSMhJ4ACBEWZw64QFWwY3v02oAAK8Bs+W
o1dFWjAk7T4t6eXIT0mMMIfXlyYasLO/BC+R7SNgHYKXDRchggsZuqC43w+v
So2WgQAWTGUgvDsOg2zWLRJ0DUqSmnRHIZJ15YPGEPgAly6boegp/k6CKT4d
yzBeEA/+Gz7CdbM7clpbTuPTErbP2jSaigBWSorLz8oKYGW7QisGUBM3GPje
stffrGAZwJPalUeIZJOVS/dY7bx6co1GFdWhxkUDMDAAEj6lI5xVZrOLnKWD
NeZpAN9MxOaxrMurE/9DpzexXG04DUxcWc6yQgDGirtN+63g0fruK5CUly2h
iNUSnT4t7x9DGNGB/7qHfTW506tvpJbjYKfTaZ2NLt5bCQ4fIQj49fmqubyl
mNfSXFQz3r2Cy9rv9Qwa2nZfDa+va8fdePa1EXP33ZaX4lyeHZS5IdtfWF6b
aOH7Jim2TVyXMlM0xHAkapRfsXPzSk5l5J8IZBX+X1yAulugakQdtb/3+YTj
vB8OTPMtDFfqrcziIkVtq0ME1gE6aXVtuNHgZaSssEHHT6MfDljxH9yXzkql
8K2KFVyFwPStLNY7pmyOMrClgXAX4CmAv4g2ENW2NfRhK8JGsG5FEuYz/JQO
Wlk0s2OwFIvARx8ZDTPbmXUDYUERTRjsETWMEwY2HDvPKdXFHqKbuJ4Kkwzn
27D+MCYBFpiyDPmiTRUcdAh2qJhOYV8dGViiefQub2mjyA/I2JHmNs6vd/hC
uFgfRqaxj14GtmhTlRWkNMtKXFE+EC6DBv2yiNjvfCv/qwhScgszdWEILYrn
VNrzWz9wBcor0lSjts8uc77ygygIrU3FpsSIqTYc8erw5rX4Bb3xwfHxr9+P
07/h2BWPHfdfDPTYQM87ev68HNPzBsd9NYbfnh0diqubG4O8/OyXS+esE8h8
4uTSzRz6TV+pDLxd6UTj4NcnOkWDzhxmTD7KlFZxqib2uruA6T7lPUFTad1R
oWNgEieZu5gyJDfPXW+GUuJ4QeoVQf41yGyH1H1KEiIGmvQjfRWrTHRTooA9
GvdhCVBcx3CbmOxHvReK7Lfn5dTXEDpgsNugdi4d5Vo7c57hLN1oWq3XKWrm
8vF3z4xHBchP2ISIy+E3Ne3mLWAG1F8a07IkxX2y1EnoEe/IhDjUh3zpgqBu
poIixDB0wV03ZhGWzw8Hvz7sqoojDfsaNBMmWCOinQ2LlZHIRw317vqqMkjq
BhwCvb5if/znp3iBkYdKtIESfWM1U6BKozgXcynZSgF66RQZHEnpk5JW6X5t
6qrIEbWt50KkjtE9Bu8BBnBIbrRCIWaASrOj9XKIiVIH4ybYyp9iPKnCGNTh
wFCAhkoFbd9LMnMuhtxtMbxUoRjathiWuOEyC3gtPPNTiJkj8TGKFyHBTUGG
OB22CMIQc1EcjrKKpylGOJdB6AdRLcaVQBpv5mIqVaaUKxyDPWO8BdeEkCgM
jFU+opCBi0C5TeAt5sIUgQIK6cnnIOtIacSATjfSqdQyweJjxi5TRbUmPTjG
jOSiwQ9m08TN8jZY/ODOVXE8ZqgCMmI2A4wgnTwm/d0uvxHEtkCrT7GvHgJk
/AT1AkflQ5HEmAkKXPAAQkAzovKD3QuK7uLwDhOCsCDFdCwmPMH4+gVGzpSe
5CKX6TOkpZ8GklRm76RKlKC5n6YqAyMjjH4BUuomgY/pRc0YhF3GyzqTQRlN
U4R1MuHmzAGvpC1uhjfnbcYmpqQliYpXTxQK8v8AThqD3hRYFkwR+BTzIuAh
xVXmmldWB6IMskpEl5PM0L52drqW2l3jzMhaUM61j+qzKYqhT8P1BkNRZHkM
d75UOejNoBeWNoPBr4G7rpIso3rHlXgiO9POORK6npFtb4JKEXYZrjDvsjby
7ukDEFl/uvWsGw5O6HBm4aZIDIo28hW2fTbsZwyvE3hTtLY+UVsXzkuUw0xr
GFzLSZj7NkGvhN25XhkHaplIb4dMy8qUUIl8GW2unXK1nhLCD7lfVrLUB8oF
7KrZFnz1GezUGXGQFFLE3cwcoNC/uaPMnngsflZJvqeWiZtEcW3rLYe2TDyT
JJtrE1u1M1ZSp+OY5nz6DrF4f0dEVsYmO4s2zVc7OVd6pw2EcTBtYIdkooc6
t5bUWKNBhZ7+p5lnGBrWr1lW+NbsAtgWzhNTt0ppR3QVo2ZsyQ/CbEJkFuti
MkULynXMMVxLsC4JbpIfp1uqS3qqUDNVE0ptIqcLpjF4AAEZKjLDEvPSke+m
fq2KCDBAydRyE1z7qRXeHtWysqY10rE1zXok3pRV3BtdE2iWcUqKh65Ha3np
I3HO7iTO17fPdL23rFY1vcAFz2POiQEBjmVBFEG7XuOTNubKfS19MKwSavKa
7ieWE7Kn7BwYnt/oHCj92roA/VRK3IMLhD5I6ZKFy/09oC7thR45ykteOUCY
7zD8n45ALxvryxihtPF+9amo5APVvTxcCnCuPnKhc8rpNnHxfjAkcsEvp22d
tsH9IA6YwwTcfn/PS8HV9dBHNP0tLC+VBXdMjaXMYTELpuCI3blBqIrtIBXv
VFUZ9IvanA9euvLoIqn8kyofTZAxebwAIYRTUFZ+pEiGclihUh6a0mwLEJ3z
PgBWbmJa8ox3uT5/xmeGX06NMl24bGMPjk9AVTEewKa5YIeZLp+nfSyNJCFU
q92D/v+XTIsN5/2wQIxMVt0BZfqW/CSN6BNErE1YgSDkXuep4DgGiQy3HTxb
dLw5JSc/BTW8NDpzgAzI6OCAUnkaZVy3DUtxCt45zEvjggX59C0I8sT1kId0
MyidlrpRNlGhE/LEpYqaIaAJ0CzTerO2w1Jzgh65HhbIu+50msopMxJuMdI2
VlXq1FzfdJW36PnKqH45Y21JyG8a398z0/Qtx2kmyresXIFMamRWyOnVrisf
vqdl3j94ZUlwciO+jdprg9tpUX61jLdaXGGphpkjA5Mjp9V2q9O3gyHmXeGX
vsEpmAZfndYK9ebKgPVAvBwbXuvUGfJFGU6nDXqN8Ias0Us7fN/ERzWIZS0x
FCt1xvJmWQpJxv8b4+t4rYydvpVeK7R0mKRbER+PhnU+nmo+ntb5eKr4eLqq
wfr98LLQq0HjTeMNpfXNGushWGylxRdXAkeeiZIjp6vdVz50z7VzquWaPWql
Bqp/Nu9Ii5XBIdxy/HGqS+At/Eo6AX+iTNnSJC2nxXu26hLS0nu2NmRXVrUf
jdE1LBuBXXnulvHVEvdVMJt4rhTBTTwt+9JauDOoEvEH8VVR9uL9IV48/Mns
tq2t86Tat84T+1oLyTY3hvwl1paMKX/Zfe3qbnR9jr9pBfwH7WuZs9vaSmfB
3T+s7mKrGh2YGk13ADTr/39GBwCEeqnEpHSVW2afFisaYfCRU+AcqOqus0RH
lBA0wEkgBvAoKYdVdQ46MJ0v/Q4wL18mFD0VGYY3HGVjrQVOkE+KkEJqanf8
ih5EekA9ueMlt8hyprI2R4fpSIWqvQCds/KkZkmBMurYJ1sLKzlkfk+NAxSs
YYDBXXTYmVbP8qr6EXej+lXHBCHX7C/E1mkOArTLDwBtDQdUjs512ZFSzOL2
HDmnhnSf6HfP7u+ftrEIsJBhiD/NYkVZvwmMNyVQeMaxqtvoElY9crnBftEy
H6KRC6g7N4aAzGhaQMaryDeUHJHrupfi0oY6LYRbN8NriLf4KFixvb+nOBdQ
grEdq8fYL4n5ozF1WuKGw1H3VAJaqfGCCV8kfHp93tZRJsf+RpeLqkFh2qC8
GvROQdWfXlK0KnUoSSvLNRBpcl93TnEwCEcU7++x2FSCKOxgDYyrZtHR9c9t
cQH/299T7a1cJgNoFW/KdR0SKuzDwQJ1KUT8iogibBh6TFDf45YdB+fxO2ZO
7wiIyj3KGeemdUv9OOZj1bd7A9RCTaATRnQdNnRhXpzfiq6bBF2iR7ek4t/x
9bUfVDPvY3Wqx7oY9QOgeQgqEjXwgZp0cCI+s0Y+ANPxM3zt93qq6HJwQQOD
Nn5RQ3M5B9GF0YP+4EXv4vRAz1UkpSe922pc51g+IGr4lOqo9NLMPc3Rnd0G
JmYOqBqGB/ksjYvpDBDnfcTFOMkOyhrRAXbkRx6h931/bj5JsLMi/xCC+sGn
vU6v1/9n47lq+ZX+B/1aEM775eDdp1fDq4M20OLt+cGvPP2+PHMxBuRpogb0
uTJvB17gp4xnp9+BHbuDo2rHe/7lVxqAL/cWC0bCflnqC5COrQaJszGY/sLy
da5SlNPgjl88kFXmcxZnSZA3E3NmXo3rn1zWFBJzRIFqyjeLqqYVmFA3m7Z3
lOKZ2GTX8LmtHzDyq77NKhkexIbaRn2CkTgWQ90s8LicoP0AMayqtWfSI2Wy
2xanKQj2jPt+b1V668SYcFr2PsCdeg2S2n7F8vn9s94cLPfqRnpAXuxsqBD8
umPeSGoRP+c+Cv06CV5sNQFcCeQvcOQVquM1CF/kxfqSB4zc7cJ07FyyeDKP
a9Sw+jQ7kwt+mPnfx82WVpxgyrTRSlBN4GQykPsE+AYYBGR7jAmKG/gYNLyq
1jyU4LaCtWVoJwof/h7X6h1oHp/pR+85g+kFMEgCnPDkFgDzbVBvVAsl9CcM
4ejFHEzxTHrqpfBLauUARf90R/rY63Ab6jZb9eVPyrFwwUmTiTNeOvhTjMGp
/+jjCxHK2ak0KjXq+BKcpFBiMh1bnNxK/VEZBmFQw2i/I24QXv/EqopOuIUk
yNRLFynQjfZfkMOzwTWfuugPKZ8bIf0mM11A4V4kckxZM5ES1ol3UMT/Jpf1
VlXU+FWH1rzI0GgI8ONC8Gpyal8nvaWKeep5ztzNUavg24NAQO3zVZdnrLwr
/S4NXAbdsdXZGHhQFAH0lemc3CacRjaF+ozMppq0FsXVD8qCRU1fVAtS75pJ
TZYYzZksywV8nZtv9mBDsu5Po1dkSNPCiV0ypuS7Q6iC73CBOU0wXqt0Lbm+
gKUmIP5e0ZmkKJV+AYEBCASW11T4UMOIDHCFgIoL9/d0q4ClzSCj4hs3hiM0
q7YkgZe15iijVlt/uWo4anMHr4qUBsf0viU18KqIo/9iQEODatbR8+c8VM0a
HNNrgvbuXZj0T7v03FJ75z26X18VDrVt3atmbLStf1UtVx2qa6tUjyrOAtJW
ParmRGuXKr2YaOUPBmLoZ/FrtfpF4Jh4ViTWZj4KyWzVwXYVnJf1PKzMAQEw
QNTrR+eZKm1mVAC+eF9+J/9toFTZ4KRmPy91/RQcp9JQ0joXYucQ6GWIaBmR
K8VHuq5sDqxSBKgocvMeKL+GWlP5OnQgGnnPl4g61fiGr+sT+9uZrEdIbSod
0gY8vLDwcXuIeYSHRX2tZVVgg/oAybiRZcAX9ebc9TkR7Zki2uHJZptp0kL3
EJaBtI5xsQUwE4nRRlx1d/JL6XDjgbpl4uWWwySlPmVkZBraikxxE/0546Tf
K7T3LVLLjPnOCIccjT1gRhH6aCmwkfm61AGHmGYR7bVOa6U1nh8O1DXCHld9
eEwJpXToxsvVSLNMVO+SQ1h9J1UGiWn4f//zv/DvuljwOJ2a00j7e5TJiYw+
kObhMSXGDKiyDGYHMsRLpX3Sb2I32k1s7SkjTCCiWLwEQ0WdtbU4TRPB09PI
nnFmYBJja092UnlDtkaxRsGp+WT9PUR8LWydZEYNrHGnOGnfvBX218MehI3a
dftn4/PV7wih3+kzw4D19QTmrhC2+rYb3lj9vU9hebjF527tBmE16LAJYMVt
0ma1G4Rvx6GGz8YH6xD6nUHF1ka7+FYI27m5hc1/rFTv1rW9C6Q6lxuk+gqc
vtBbbeB02FGcqV839fcObOxp0OcLvPizbtxDIRx2tKheNQTVSpJvllXnL0qH
h0M4Aq+sGLPTwK15/AcbDO9qLnMsy22AsJ1ef4IOf9apH0jfS8uR/iq6a6MC
aO0KYfPDnSE862DgHEQF/9WiKo31x51i+4w/BMKXUmnaQ/1C5QF93dfYVqYc
XvKYh77/9R3bQ+3wM+Ch/hMrZmEMG9t9v6OTgY8EZdIxEhrhn8Hx9V9ihEjh
dKR6yy+HV8O1xxCCx5Es/3LX2PU+qj8X5OkXCVXj+ecTfvVP+j8cTCCglrpR
Xwr+e4v4Cn824xyOG30Unz590m/HL/lFsrLjIEjFTIYJ1vDxjz/pVwjx71By
IzWHVv8PL5hVE3RTAAA=

-->

</rfc>
