<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nmop-rfc3535-20years-later-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="RFC 3535, 20 Years Later">An Update of Operators Requirements on Network Management Protocols and Modelling</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-rfc3535-20years-later-04"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <author fullname="Reshad Rahman">
      <organization>Equinix</organization>
      <address>
        <email>rrahman@equinix.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="06"/>
    <keyword>network management</keyword>
    <keyword>future networks</keyword>
    <abstract>
      <?line 82?>

<t>This document identifies a list of operators requirements for network management operations.
These requirements reflect advances in this field since the publication of "IAB Network Management Workshop" (RFC 3535), which
was instrumental for developing many key technologies that are widely deployed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/rfc3535-20years-later"/>.</t>
    </note>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IAB organized a workshop (June 4-June 6, 2002)
to establish a dialog between network operators and
protocol developers, and to guide the IETF to focus on work
regarding network management.  The outcome of that workshop
was documented in the "IAB Network Management Workshop" <xref target="RFC3535"/>
which was instrumental for developing NETCONF <xref target="RFC6241"/> and YANG <xref target="RFC6020"/><xref target="RFC7950"/>, in particular.</t>
      <t>Since the publication of <xref target="RFC3535"/> major advances were achieved in the network managment area, such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>SDN and Programmable Networks <xref target="RFC7149"/><xref target="RFC7426"/></t>
        </li>
        <li>
          <t>Automation <xref target="RFC8969"/></t>
        </li>
        <li>
          <t>Intent-based approaches <xref target="RFC9315"/></t>
        </li>
        <li>
          <t>Telemetry <xref target="RFC9232"/></t>
        </li>
        <li>
          <t>NETCONF <xref target="RFC6241"/></t>
        </li>
        <li>
          <t>RESTCONF  <xref target="RFC8040"/></t>
        </li>
        <li>
          <t>CoAP Management Interface (CORECONF) <xref target="I-D.ietf-core-comi"/></t>
        </li>
        <li>
          <t>YANG <xref target="RFC7950"/></t>
        </li>
        <li>
          <t>JSON Encoding of Data Modeled with YANG <xref target="RFC7951"/></t>
        </li>
        <li>
          <t>YANG Schema Item iDentifier (YANG SID) <xref target="RFC9595"/></t>
        </li>
        <li>
          <t>YANG to CBOR mapping <xref target="RFC9254"/></t>
        </li>
        <li>
          <t>Models for management of services, networks, and devices <xref target="RFC8199"/><xref target="RFC8309"/></t>
        </li>
        <li>
          <t>Network APIs (e.g., <xref target="CAMARA"/>)</t>
        </li>
        <li>
          <t>Virtualization <xref target="RFC8568"/></t>
        </li>
        <li>
          <t>Containerization <xref target="I-D.ietf-bmwg-containerized-infra"/></t>
        </li>
      </ul>
      <t>See also "An Overview of the IETF Network Management Standards" <xref target="RFC6632"/>.</t>
      <t>More than 20 years later after the publication of <xref target="RFC3535"/>, new requirements on network management operations are emerging from the operators. This document captures these requirements that reflect the progress in this area. Readers may also refer to <xref target="I-D.iab-nemops-workshop-report"/>.</t>
    </section>
    <section anchor="sec-obs">
      <name>Observations and Operators Requirements</name>
      <section anchor="sec-dm">
        <name>On the Importance of Data Models</name>
        <t>An appealing aspect about network automation techniques is that they almost apply to any kind of network. From that perspective, the functional component of a network automation framework that probably matters the most, and independent of the underlying interfaces and protocols, are the data models. Concretely, data models are instrumental in the automation of networks, service delivery, and infrastructures in general, especially that they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
        <t>Data models can be used to derive required configuration information for both network and service components, and state information that will be monitored and tracked. Likewise, they can be used during the service/network management life cycle (e.g., service instantiation, provisioning, optimization, monitoring, diagnostic, and assurance).</t>
        <t>More than three decades of "Internet standardization" have shown that the specification of data models is not that straightforward. This is because of at least two major reasons:</t>
        <ul spacing="normal">
          <li>
            <t>For more than 30 years, legacy network equipment manufacturers have considered their technology as a competitive advantage, thereby leading to proprietary, vendor-specific, data models and the burden of vendor lock-ins. For example, there are more YANG proprietary modules than standarized ones. At the time of writing, <xref target="YC"/> lists 13661 unique proprietary YANG modules vs. 991 Standards modules.</t>
          </li>
          <li>
            <t>Over the same period, operators have also developed their savoir-faire as a key competitive advantage. Such savoir-faire had to rely upon these proprietary data models (and their own ones). Operators were reluctant in the past to share their design and management practices.</t>
          </li>
        </ul>
        <t>The situation has changed since network "softwarization" strategies have been disclosed by vendors and operators. From a business standpoint, network "softwarization" is seen as a major transformation effort by operators, because of the flexibility and the "a la carte" approach that is promoted by "X-as-a-service" (XaaS) designs, "X" being network, platform, Network Slice <xref target="RFC9543"/>, etc.</t>
        <t>XaaS designs assume the availability of data models that are dynamically instantiated (along with a set of relevant policies) as a function of the "X" (and its design, for that matter). XaaS services cannot be designed, delivered, and operated without data models. Standard data models are thus key as they allow to:</t>
        <ul spacing="normal">
          <li>
            <t>Ease mapping among many (network/service) layers.</t>
          </li>
          <li>
            <t>Ease data correlation from distinct sources.</t>
          </li>
          <li>
            <t>Soften dependency on CLI specifics to vendors.</t>
          </li>
          <li>
            <t>Support both top-down and bottom-up approaches for operating services:</t>
          </li>
          <li>
            <t>Accurate control loops for adaptive and deterministic service creation, delivery, and maintenance.</t>
          </li>
          <li>
            <t>Feed an intelligence that will drive appropriate actions to adjust the current status to align with the intended status.</t>
          </li>
        </ul>
        <dl>
          <dt>OPS-REQ-STRENGTHEN-DM:</dt>
          <dd>
            <t>Network softwarization can only happen with a strong, committed standardization effort, complemented by active involvement in open-source projects that facilitate access to code.</t>
          </dd>
          <dt/>
          <dd>
            <t>Particularly, without data models, a Network API is essentially useless (see also <xref target="sec-api"/>).</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-frag">
        <name>Fragmented Ecosystem</name>
        <t>The current YANG device models ecosystem is fragmented: some standards data models are defined through the IETF, while similar ones are defined in other fora such as Openconfig <xref target="OC"/>.
Unlike service and network models, IETF-defined device models are not widely implemented.</t>
        <dl>
          <dt>OPS-REQ-DM-RATIONALIZE:</dt>
          <dd>
            <t>There is a need to rationalize this space and avoid redundant efforts.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-cons">
        <name>The Network Becomes Consumable</name>
        <t>Network connectivity can support tailored services in terms of Service Level Obejctives (SLOs), for instance, by means of Network Slice Services <xref target="RFC9543"/>. This approach of "consuming the network" flexibly and dynamically is made possible by enabling means of exposing network capabilities to either internal or external applications. Then, network management is no longer limited to collect network status information, but it should be extended to permit the exposure of resources, capabilities, functionality, and associated information (e.g., inventory-based data).</t>
        <dl>
          <dt>OPS-REQ-EASE-EXPOSURE:</dt>
          <dd>
            <t>Focus on protocols and data models to expose network/service capabilities, network-wide services, and related operations.</t>
          </dd>
          <dt>OPS-REQ-NW-API-DISCOVERY:</dt>
          <dd>
            <t>Define a reference approach for service exposure discovery (APIs discovery).</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-api">
        <name>Network APIfication</name>
        <t>APIs are getting momentum as means of interworking between parties, also at the time of providing network services. As an example, <xref target="I-D.ietf-grow-peering-api"/> defines an API for dynamically establishing BGP interconnection sessions between Autonomous Systems of different administrative domains. That same objective is also covered by the YANG data model defined in <xref target="RFC9834"/> as exemplified in its Appendix A.10. Tools such as YANG/OpenAPI transforms are key to leverage existing data models and allow for better integration and mapping to actual realization models.</t>
        <dl>
          <dt>OPS-REQ-DM2API:</dt>
          <dd>
            <t>Readily available API specifications should be generalized from YANG modules for fast development, prototyping, and validation.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-pro">
        <name>Lack of Profiling</name>
        <t>Many NETCONF-related features are (being) specified by the IETF, but these features are not widely supported (e.g., YANG-Push <xref target="RFC8639"/>). Some of these are not implemented because of the unbalance between actual operational need vs. complexity.</t>
        <dl>
          <dt>OPS-REQ-GUIDE-AND-PROFILE:</dt>
          <dd>
            <t>The target application/applicability of a network management approach should be documented (e.g., edit profile documents that outline a set of recommendations for core/key features, along with appropriate justifications, will help foster more implementations that meet operators’ needs). This also covers security management aspects of network management. Additionaly, consider independent compliance suites to validate functions/features/etc.</t>
          </dd>
          <dt>OPS-REQ-ARCH:</dt>
          <dd>
            <t>Need to promote more architecture and framework documents to exemplify the intended use.</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>Examples of such profile documents are the various RFCs that were published by the Behavior Engineering for Hindrance Avoidance (behave) WG <xref target="BCP127"/>.
Another approach is to consider a model similar to the "Roadmap for Transmission Control Protocol (TCP) Specification Documents" <xref target="RFC7414"/>.
Such a document would serve as a guide and reference for implementers and others seeking information on 'NETCONF/RESTCONF/YANG'-related RFCs.</t>
          </li>
        </ul>
        <dl>
          <dt>OPS-REQ-REASSESS:</dt>
          <dd>
            <t>Additionally, reassessing the value of some IETF proposals compared to competing or emerging solutions (e.g., gRPC vs. YANG-Push) would be beneficial.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-agile">
        <name>Lack of Agile Process for (The Maintenance of) YANG Modules</name>
        <t>RFCs might not be suited for documenting YANG modules (it takes much too long, especiallly for updates). In the meantime, there is a need for reference data models and "sufficiently stable data models".</t>
        <t>An hybrid approach might be investigated for documenting IETF-endorsed YANG modules, such as considering an RFC to describe the initial module sketch and objectives and an official IETF repository for maintaining intermediate YANG versions.</t>
        <t>By drawing a parallel between YANG data models and the concept of ontology used in the field of Semantic Web, the topic of YANG module maintenance could greatly benefit from proven methodologies in knowledge engineering such as <xref target="LOT2019"/> and automatic documentation tools like <xref target="Widoco2017"/>.</t>
        <dl>
          <dt>OPS-REQ-QUICK-BUT-WELL:</dt>
          <dd>
            <t>Develop a more agile process for the development and maintenance of YANG modules in the IETF. RFCs might not be suited for documenting YANG modules.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-int">
        <name>Integration Complexity</name>
        <t>One of the requirements listed in <xref section="3" sectionFormat="of" target="RFC3535"/> is the ease of use which, according to <xref section="3.2" sectionFormat="of" target="RFC6244"/>, is claimed to be addressed by NETCONF and YANG. For configuration this holds true, for network observability it is unfortunately not yet. This has been confirmed with a set of network operators asking how long it takes from subscribing YANG data to make it accessible to the operator. Minutes, Hours, Days, or Weeks. None of them answered Minutes or Hours. All of them responded Days or Weeks. Hinting manual post processing of YANG data.</t>
        <t>Collecting YANG metrics from networks is already a struggle due to late arrival of <xref target="RFC8639"/>, <xref target="RFC8640"/>, <xref target="RFC8641"/>, <xref target="I-D.ietf-netconf-https-notif"/>, and <xref target="I-D.ietf-netconf-udp-notif"/> for configured subscription transport protocols which defined YANG-Push in the industry. This caused network vendors to implement alternative solutions to collect real-time streaming data in the meanwhile, such as gNMI which was proposed in 2018 in <xref target="I-D.openconfig-rtgwg-gnmi-spec"/> to the IETF but not followed up on. Unfortunately, these implementations differ between network Operating Systems (OSes) due to the lack of standardization, specifically for the metadata which would ensure machine readability.</t>
        <t>When a set of network operators where asked to where operational YANG data needs to be integrated to, the answer homogeneously was Apache Kafka Message Broker and Time Series Databases. There is a need to specify how YANG-Push can be integrated into Apache Kafka and references needed YANG-Push extensions and YANG schema registry development. The YANG-Push extensions addressing needs to make YANG-Push messages machine readable and against semantic validate able to ensure a consistent data processing.</t>
        <t>Another challenge is that the subscribed YANG data referenced with 'datastore-subtree-filter' or 'datastore-xpath-filter' breaks semantic integrity which needs to be addressed by either updating <xref section="4" sectionFormat="of" target="RFC8641"/> or proposing a new YANG module being used at the YANG-Push receiver.</t>
        <dl>
          <dt>OPS-REQ-INTEGRATION:</dt>
          <dd>
            <t>Consider approaches to ease integration by-design (e.g., protocols and data models).</t>
          </dd>
          <dt>OPS-REQ-ITERATE:</dt>
          <dd>
            <t>Need a velocity and approach to standardization that allows for business goals to be incrementally realized.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-dama">
        <name>YANG-formatted Data Manipulation</name>
        <t>The use of a flat tree hierarchy in YANG data models may induce some performance issues compared to other graph models.
This can be the case, for example, during a path calculation on a network topology.
Different approaches using graph theory and compatible with YANG are currently available, but require further experimentation to generalize their adoption.
For instance, OpenDaylight <xref target="ODL"/> implements an in-memory connected graph version of YANG-based data to enable fast breadth-first search (BFS).</t>
        <dl>
          <dt>OPS-REQ-Y2KG:</dt>
          <dd>
            <t>Need for a reference specification to translate YANG-based data into the Knowledge Graph (KG).</t>
          </dd>
        </dl>
        <t>For example, <xref target="I-D.marcas-nmop-knowledge-graph-yang"/> and <xref target="I-D.tailhardat-nmop-incident-management-noria"/> discuss YANG-2-KG proposals to leverage automated reasoning and graph traversal techniques.</t>
        <dl>
          <dt>OPS-REQ-SCALE:</dt>
          <dd>
            <t>Consider approaches for YANG data models to scale.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-map">
        <name>Translation and Mapping Between Service/Network and Device Models</name>
        <t>Navigating among multiple levels of the hierarchy (service, network, device) relies
currently on proprietary solutions to graft and translate between two layers. There
is no programmatic approach to ensure lossless mappings.</t>
        <dl>
          <dt>OPS-REQ-LOSSLESS:</dt>
          <dd>
            <t>Consider programmatic approaches to ensure lossless mappings between service/network/device data models. Means to detect, characterize, and expose loss may be considered. Note that lossless mapping is an enabler for support of deterministic verification, auditing, and tracing back along layers/models.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-con">
        <name>(In)Consistent Data Structures in Network Protocols for Data Export</name>
        <t>Network Telemetry, as described in <xref target="RFC9232"/>, involve a set of protocols. Due to the different requirements, one Network Telemetry protocol doesn't address all needs. This is mainly due to the nature of the subscribed data. BGP Monitoring Protocol (BMP) <xref target="RFC7854"/> adds monitoring and tracing capabilities natively to the BGP process to minimize the processing overhead. While IPFIX <xref target="RFC7011"/><xref target="RFC7012"/> can be applied according to <xref target="RFC5472"/> to gain visibility into the data and forwarding planes, due to the amount of data, sampling as defined in <xref target="RFC5476"/> and applied to IPFIX in <xref target="RFC5477"/> and aggregation as defined in <xref target="RFC7015"/> for IPFIX is needed to reduce the amount of exposed data. While YANG-Push focuses on exposing already YANG modelled data, which eases the correlation among network configuration and operational data.</t>
        <t><xref target="RFC9232"/> is an informational document and does not specify what these Network Telemetry protocols should have in common to ensure consistent data structures for data export. While data types are fairly good aligned, a lack of metadata standardization among the Network Telemetry protocols is observed. In particular describing from where the metrics has been exported from and timestamping. In <xref section="4.2" sectionFormat="of" target="RFC7854"/> timestamps are optional and sysName <xref target="RFC1213"/> is only carried in the BMP initiation message (<xref section="4.3" sectionFormat="of" target="RFC7854"/>), while the message header of IPFIX defined in <xref section="4.3" sectionFormat="of" target="RFC7011"/> lacks the 'sysName' definition.</t>
        <t>The lack of information from where the data is being pushed from is only known to the Network Telemetry data collection due to the transport session being established from the network node exporting the information. When Network Telemetry messages are being transformed and forwarded, this information is being lost. Therefore, it is common among network operators to augment 'sysName' and other metadata at the data collection.</t>
        <t>The same common principle applies to when observation timestamping is missing in the Network Telemetry message. Since the data collection is the closest element to the network, a time stamp is added to give the network operator at least the information when the Network Telemetry message was collected. However, since Network Telemetry addresses real-time streaming needs, this is often not accurate enough for data correlation.</t>
        <dl>
          <dt>OPS-REQ-REUSABILITY:</dt>
          <dd>
            <t>Consider approach to ensure reuse/consistent data structure.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-limit">
        <name>Proprietary YANG Modules, CLI, and Limited Abstraction</name>
        <t>Leveraging on pluggins, propietary YANG data models or even CLI is still the rule in many operations, sometimes forced by the need of operating legacy infrastructures.</t>
        <t>The complexity of developing and maintaining these means of operation is huge, as it is required to to cover many OSes and vendors along the lifetime of the network device.</t>
        <t>Network models for the realization of services provide some "level" of abstraction and then allows for for more automation.</t>
      </section>
      <section anchor="sec-distinct">
        <name>Distinct Networks, Distinct Management Requirements</name>
        <t>From the time <xref target="RFC3535"/> was released up to now, new kind of services and applications have been developed and deployed over the time, with very diverse, and some times contradicting, requirements. Those services have been engineered on top of multi-service networks for the sake of efficiency and simplicity, accommodating such a variety of needs. As a result, services requiring mobility, data replication, large capacity, adaptability, multi-path support, determinism, etc., coexist on the same shared network, needing from it mechanisms for graceful operation.</t>
        <t>Likewise, such diversity of services also require different management capabilities. For example, session continuity, distribution trees, traffic engineering, congestion status notification, reordering, or on-time delivery impose very different management needs to be satisfied.</t>
        <t>This reality is different from the one existing at the time of <xref target="RFC3535"/>, and as such, the new identified needs can require from novel approaches to guarantee the aforementioned co-existence of services. Some networks have specific network management requirements such as the need for asynchronous operations or constraints on data compactness. An example of such networks is Delay-Tolerant Networking (DTN) <xref target="RFC4838"/> or DetNet <xref target="RFC8557"/>.</t>
        <dl>
          <dt>OPS-REQ-NEW-NEED:</dt>
          <dd>
            <t>Profiling main network management technologies (e.g., recommend customized transport parameters such as timeouts and transport services) is recommended than defining network management technologies that are applicable to a single deployment context.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-dep">
        <name>Implications of External Dependency</name>
        <t>Networks are being updated to abandon the silo approach from the past towards an increasing convergence. Specifically, there are trends towards a tighter interaction and integration of different technologies previously considered as totally separated from an operational perspective. Examples of that trends are the IP and Optical integration (e.g., the introduction of colored interfaces on routers), or the extension of deterministic-behavior features to Layer 3 networks. This kind of convergence in most cases creates dependencies on the conventional network management features, which require to incorporate or integrate functionality from other technological domains.</t>
        <t>Such convergence is also reflected on the need of interacting and interworking with distinct network parts participating in the end-to-end service delivery. Mobile access, fixed access, data center, enterprise, radio functional split (i.e., fronthaul and midhaul), neutral exchanges, intensive data networks (e.g., scientific academic networks), content distribution, etc., represent network parts constituent of end-to-end services that can impose dependencies of the management of an intermediate network.</t>
        <dl>
          <dt>OPS-REQ-UNSILO:</dt>
          <dd>
            <t>The convergence observed in recent years also implies the need for an up-to-date refresh of management capabilities and tools for conventional networks.</t>
          </dd>
          <dt/>
          <dd>
            <t>It highlights the necessity to handle the heterogeneity of data, configuration, and network management/requirements.</t>
          </dd>
          <dt/>
          <dd>
            <t>From a YANG perspective, this involves easily mapping and relating the data models used to manage each specific segment.</t>
          </dd>
          <dt/>
          <dd>
            <t>Resolving such issue could draw on insights from parallel technical fields such as knowledge engineering practices and concepts associated with Linked Data in the Semantic Web, areas where it is common to manage problems of heterogeneity and data reconciliation across various application domains.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-pub">
        <name>Too Much Time Between Publication of New Networking Functionality and the Associated YANG</name>
        <t>For example, <xref target="RFC8667"/> (IS-IS extensions for SR) was published in December 2019, while <xref target="I-D.ietf-isis-sr-yang"/> will be published ~5 years after. There are cases where modules are not published after more than a decade of WG adoption (e.g., <xref target="I-D.ietf-idr-bgp-model"/>).</t>
        <dl>
          <dt>OPS-REQ-TIMELY-DM:</dt>
          <dd>
            <t>Consider having YANG as part of the protocol specification/change where possible, or have the YANG document progress in parallel.
That may slow down the protocol specification, though.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-impl">
        <name>Lack of Implementation of Proposed Solutions</name>
        <t>New solutions proposed by WGs such as NETMOD and NETCONF very often lack an implementation or only have a partial implementation. The situation has improved with the last hackathons (e.g., for YANG-Push), but these solutions became RFCs without a known implementation:</t>
        <ul spacing="normal">
          <li>
            <t>YANG-Push <xref target="RFC8641"/></t>
          </li>
          <li>
            <t>Schema-mount <xref target="RFC8528"/></t>
          </li>
          <li>
            <t>NMDA <xref target="RFC8342"/></t>
          </li>
        </ul>
        <t>Schema-mount allegedly has only one known implementation because of the complexity of the solution. That means the IETF most likely spent lots of cycles for something which won't be deployed ever.</t>
        <t>While hackathons have improved the situation, the availablability of implementations is concerning. For open-source, 'sysrepo'/'libyang' are decent choices.</t>
        <dl>
          <dt>OPS-REQ-READILY-IMPLEM:</dt>
          <dd>
            <t>The availablability of implementations is concerning. Consider catalyst approaches to trigger more (open) implementations, especially during the development of protocols/extensions.</t>
          </dd>
        </dl>
      </section>
      <section anchor="tooling-skills">
        <name>Tooling &amp; Skills</name>
        <section anchor="sec-it">
          <name>Integration with "native" IT Tooling</name>
          <dl>
            <dt>OPS-REQ-IT-INTEGRATION:</dt>
            <dd>
              <t>There is a need to ease the integration of low-level/network-oriented solution with native "IT tooling" (e.g., "https://opentelemetry.io/").</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-ietf-in">
          <name>IETF Support for Better YANG Integration</name>
          <dl>
            <dt>OPS-REQ-IETF-TOOLS</dt>
            <dd>
              <t>Ease exposure of libraries and host tools (e.g., <tt>yangkit</tt>) to ease integration.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-client">
          <name>Open-source Tools</name>
          <t>While there are open-source implementations for NETCONF (e.g., NETOPEER), the gRPC/gNMI suite seems to have more support for tools on the client side.
For example, "ygot" generates structures from YANG models and these can easily be used by a client to configure a device with gNMI. NETCONF is not supported though (the XML tags are needed).</t>
          <dl>
            <dt>OPS-REQ-CLIENT-TOOLS:</dt>
            <dd>
              <t>Focus on tooling is needed, especially on the client side.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-skills">
          <name>Skills</name>
          <t>The IETF is not the expert community in data engineering. The experts are in the data industry. Without them, integration in data processing chains like Data Mesh is going to be a challenge.</t>
          <dl>
            <dt>OPS-REQ-BRIDGE:</dt>
            <dd>
              <t>Create an eco-system where data and networking engineers can collaborate.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-new">
        <name>New Service Approaches</name>
        <t>The virtualization trend have made posible to dynamically instantiate Service Functions (SFs) in distributed compute facilities in the form of virtual machines or containers, as micro-services. The instantiation of the SFs is governed by cloud management systems, as it is the connectivity among the different instances or micro-services. That connectivity is typically realized by using overlay mechanisms, without any further interaction with the network. However, this appraoch seems to be insuficient for future services demanding stringent requirements in terms of SLOs.</t>
        <dl>
          <dt>OPS-REQ-GLUE:</dt>
          <dd>
            <t>The distinct approaches followed in both the compute and the network environments makes necessary to define suitable mechanisms for enabling an efficient interplay, while highly automating the overall service delivery procedure.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-guid">
        <name>Many Solutions for the Same Problem, but Lack of Clear Applicably Guidance</name>
        <t>There are several solutions that were standardized for network management purposes. For example, management of ACLs by means to BGP FlowSpec <xref target="RFC8955"/><xref target="RFC8956"/> or  by means of NETCONF/YANG <xref target="RFC8519"/>. There is no cross referencing between the two standards or delimits its applicability scope vs the other approach.</t>
        <t>Likewise, BGP FlowSpec did not reuse the IPFIX Information Elements.</t>
        <dl>
          <dt>OPS-REQ-GUIDANCE:</dt>
          <dd>
            <t>The target application/applicability of a network management approach should be integrated in the specification itself.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="updated-operators-requirements">
      <name>Updated Operators' Requirements</name>
      <section anchor="sec-reqs">
        <name>Summary</name>
        <t>A summary of the operators' requirements discussed in the previous section is provided below:</t>
        <dl>
          <dt>OPS-REQ-STRENGTHEN-DM:</dt>
          <dd>
            <t>Network softwarization can only happen with a strong, committed standardization effort, complemented by active involvement in open-source
projects that facilitate access to code.</t>
          </dd>
          <dt>OPS-REQ-DM-RATIONALIZE:</dt>
          <dd>
            <t>Rationalize this space and avoid redundant efforts (in almost all layers (IP, optic, etc.)). Unlike service and network models, Standard-based device models are not widely implemented.</t>
          </dd>
          <dt>OPS-REQ-EASE-EXPOSURE:</dt>
          <dd>
            <t>Focus on protocols and data models to expose network/service capabilities, network-wide services, and related operations.</t>
          </dd>
          <dt>OPS-REQ-NW-API-DISCOVERY:</dt>
          <dd>
            <t>Define a reference approach/process for service exposure discovery (APIs discovery).</t>
          </dd>
          <dt>OPS-REQ-DM2API:</dt>
          <dd>
            <t>Readily available API specifications should be generalized from YANG modules for fast development, prototyping, and validation.</t>
          </dd>
          <dt>OPS-REQ-GUIDE-AND-PROFILE:</dt>
          <dd>
            <t>The target application/applicability of a network management approach should be documented (e.g., edit profile documents that outline a set of recommendations for core/key features, along with appropriate justifications, will help foster more implementations that meet operators’ needs). This also covers security management aspects of network management. Additionaly, consider independent compliance suites to validate functions/features/etc.</t>
          </dd>
          <dt>OPS-REQ-ARCH:</dt>
          <dd>
            <t>Need to promote more architecture and framework documents to exemplify the intended use.</t>
          </dd>
          <dt>OPS-REQ-REASSESS:</dt>
          <dd>
            <t>Reassess the value of some IETF proposals, including compared to competing or emerging solutions (e.g., gNMI).</t>
          </dd>
          <dt>OPS-REQ-QUICK-BUT-WELL:</dt>
          <dd>
            <t>Develop a more agile process for the development and maintenance of YANG modules in the IETF. RFCs might not be suited for documenting YANG modules.</t>
          </dd>
          <dt>OPS-REQ-INTEGRATION:</dt>
          <dd>
            <t>Consider approaches to ease integration by-design (e.g., protocols and data models). The integration covers both horizontal and vertical realms. For example, there is a lack of enablement of this integration across standard bodies that operators are left to solve.</t>
          </dd>
          <dt>OPS-REQ-ITERATE:</dt>
          <dd>
            <t>Need a velocity and approach to standardization that allows for business goals to be incrementally realized.</t>
          </dd>
          <dt>OPS-REQ-Y2KG:</dt>
          <dd>
            <t>Need for reference specifications to translate YANG-based data into the Knowledge Graph. Sample use cases to illustrate the intended use should be considered as well.</t>
          </dd>
          <dt>OPS-REQ-SCALE:</dt>
          <dd>
            <t>Consider approaches for YANG data models to scale, including protocol considerations (transactions, etc.). Specifically, address telemetry scalability enhancements.</t>
          </dd>
          <dt>OPS-REQ-LOSSLESS:</dt>
          <dd>
            <t>Consider programmatic approaches to ensure lossless mappings between service/network/device data models. Means to detect, characterize, and expose loss may be considered. Note that lossless mapping is an enabler for support of deterministic verification, auditing, and tracing back along layers/models.</t>
          </dd>
          <dt>OPS-REQ-REUSABILITY:</dt>
          <dd>
            <t>Consider approaches to ensure reuse/consistent data structure across various network management segments. This will ease correlating data learned using different means (IPFIX <xref target="RFC7011"/>,  BGP Monitoring Protocol (BMP) <xref target="RFC7854"/>, SYSLOG <xref target="RFC5424"/>, etc.).</t>
          </dd>
          <dt>OPS-REQ-NEW-NEED:</dt>
          <dd>
            <t>Profiling main network management technologies (e.g., recommend customized transport parameters such as timeouts and transport services) is recommended than defining network management technologies that are applicable to a single deployment context.</t>
          </dd>
          <dt>OPS-REQ-UNSILO:</dt>
          <dd>
            <t>Necessity to handle the heterogeneity of data, configuration, and network management/requirements. Resolving such issue could draw on insights from parallel technical fields such as knowledge engineering practices and concepts associated with Linked Data in the Semantic Web, areas where it is common to manage problems of heterogeneity and data reconciliation across various application domains.</t>
          </dd>
          <dt>OPS-REQ-TIMELY-DM:</dt>
          <dd>
            <t>Consider having YANG as part of the protocol specification/change where possible, or have the YANG document progress in parallel.</t>
          </dd>
          <dt>OPS-REQ-READILY-IMPLEM:</dt>
          <dd>
            <t>The availability of implementation is concerning. Consider catalyst approaches to trigger more (open) implementations, especially during the development of protocols/extensions.</t>
          </dd>
          <dt>OPS-REQ-IT-INTEGRATION:</dt>
          <dd>
            <t>There is a need to ease the integration of low-level/network-oriented solution with native "IT tooling" (e.g., https://opentelemetry.io/).</t>
          </dd>
          <dt>OPS-REQ-IETF-TOOLS:</dt>
          <dd>
            <t>Ease exposure of libraries and host tools (e.g., yangkit) to ease integration.</t>
          </dd>
          <dt>OPS-REQ-CLIENT-TOOLS:</dt>
          <dd>
            <t>Focus on tooling is needed, especially on the client side. There is a need for tools that are easy to use. Likewise, there is need for support for multiple friendly, stable, and feature-rich libraries for programming languages.</t>
          </dd>
          <dt>OPS-REQ-BRIDGE:</dt>
          <dd>
            <t>Create an eco-system where data and networking engineers can collaborate.</t>
          </dd>
          <dt>OPS-REQ-GLUE:</dt>
          <dd>
            <t>Distinct approaches followed in both the compute and the network environments make necessary to define suitable mechanisms for enabling an efficient interplay, while highly automating the overall service delivery procedure.</t>
          </dd>
          <dt>OPS-REQ-GUIDANCE:</dt>
          <dd>
            <t>The target application/applicability of a network management approach should be integrated in the specification itself.</t>
          </dd>
        </dl>
      </section>
      <section anchor="categorization">
        <name>Categorization</name>
        <t><xref target="_table-req-cat"/> provides a classification of the requirements listed in <xref target="sec-reqs"/>. It specifically tag whether a requirement:</t>
        <ul spacing="normal">
          <li>
            <t>Belongs to data modeling (DM)</t>
          </li>
          <li>
            <t>Requires protocol work (Proto)</t>
          </li>
          <li>
            <t>Impacts deployability of standardized approaches (Deploy)</t>
          </li>
          <li>
            <t>Has implications on integration effort by operators (Int)</t>
          </li>
          <li>
            <t>Requires some adaptations to a Standards Developing Organization (SDO) process (Process)</t>
          </li>
          <li>
            <t>Allows better coordination (Collaboration &amp; Cooperation (C&amp;C))</t>
          </li>
          <li>
            <t>Is relevant to skill transformations (Skills)</t>
          </li>
        </ul>
        <table anchor="_table-req-cat">
          <name>Requirements Classification</name>
          <thead>
            <tr>
              <th align="left">Ops Requirement Label</th>
              <th align="center">DM</th>
              <th align="center">Proto</th>
              <th align="center">Deploy</th>
              <th align="center">Int</th>
              <th align="center">Process</th>
              <th align="center">C&amp;C</th>
              <th align="center">Skills</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">OPS-REQ-STRENGTHEN-DM</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-DM-RATIONALIZE</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-EASE-EXPOSURE</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-NW-API-DISCOVERY</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-DM2API</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-GUIDE-PROFILE</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-ARCH</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-REASSESS</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-QUICK-BUT-WELL</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-INTEGRATION</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-ITERATE</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-Y2KG</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-SCALE</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-LOSSLESS</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-REUSABILITY</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-NEW-NEED</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-UNSILO</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-TIMELY-DM</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-READILY-IMPLEM</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-IT-INTEGRATION</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-IETF-TOOLS</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center">X</td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-CLIENT-TOOLS</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-BRIDGE</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center">X</td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-GLUE</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
            </tr>
            <tr>
              <td align="left">OPS-REQ-GUIDANCE</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center">X</td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="overall-new-requirements-levels-operators-view">
        <name>Overall New Requirements Levels: Operators View</name>
        <t><xref target="_table-ops-view"/> provides the requirement level of <xref target="sec-reqs"/> from an operator perspective.</t>
        <table anchor="_table-ops-view">
          <name>Operators Requirements Levels</name>
          <thead>
            <tr>
              <th align="right">Ops Requirement Label</th>
              <th align="center">Overall Operators Level</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">OPS-REQ-STRENGTHEN-DM</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-DM-RATIONALIZE</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-EASE-EXPOSURE</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-NW-API-DISCOVERY</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-DM2API</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-GUIDE-AND-PROFILE</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-ARCH</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-REASSESS</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-QUICK-BUT-WELL</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-INTEGRATION</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-ITERATE</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-Y2KG</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-SCALE</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-LOSSLESS</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-REUSABILITY</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-NEW-NEED</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-UNSILO</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-TIMELY-DM</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-READILY-IMPLEM</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-IT-INTEGRATION</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-IETF-TOOLS</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-CLIENT-TOOLS</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-BRIDGE</td>
              <td align="center">Strong</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-GLUE</td>
              <td align="center">Nice to have</td>
            </tr>
            <tr>
              <td align="right">OPS-REQ-GUIDANCE</td>
              <td align="center">Nice to have</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="consolidated-requirements">
        <name>Consolidated Requirements</name>
        <t>This section provides a consolidated view of main requirements that takes into account inputs from actors beyond operators:</t>
        <ul spacing="normal">
          <li>
            <t>Put more focus on service and network data models (OPS-REQ-EASE-EXPOSURE, OPS-REQ-STRENGTHEN-DM) while ensuring that the realization of these abstractions
can be easily correlated with underlying functionalities (OPS-REQ-INTEGRATION).</t>
          </li>
          <li>
            <t>Progress much faster (OPS-REQ-QUICK-BUT-WELL, OPS-REQ-TIMELY-DM).</t>
          </li>
          <li>
            <t>Implement minimal functionality, not bells and whistles (OPS-REQ-ITERATE).</t>
          </li>
          <li>
            <t>Have running code while a specification is under development (OPS-REQ-READILY-IMPLEM, OPS-REQ-TOOLS).</t>
          </li>
          <li>
            <t>Have vendors and operators on board at the time of developing a network management solution.</t>
          </li>
          <li>
            <t>Provide independent compliance suites to validate features (OPS-REQ-GUIDE-AND-PROFILE).</t>
          </li>
          <li>
            <t>Need for means to correlate data learned from different means (OPS-REQ-REUSABILITY).</t>
          </li>
          <li>
            <t>Investigate approaches to ease adoption and integration into an operator’s environments (OPS-REQ-EASE-EXPOSURE, OPS-REQ-DM2API, OPS-REQ-INTEGRATION).</t>
          </li>
          <li>
            <t>Network-centric approaches have limits, need to better integrate and learn from techniques in other domains (OPS-REQ-BRIDGE).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document exclusively focuses on operations and management requirements. These considerations (deployability, integration, complexity, etc.) are not repeated here.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not define any protocol or architecture.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3535">
          <front>
            <title>Overview of the 2002 IAB Network Management Workshop</title>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3535"/>
          <seriesInfo name="DOI" value="10.17487/RFC3535"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ODL" target="https://docs.opendaylight.org/projects/bgpcep/en/latest/graph/graph-user-guide-graph-model.html#">
          <front>
            <title>Graph Model Overview</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="OC" target="https://www.openconfig.net/">
          <front>
            <title>Openconfig</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="CAMARA" target="https://camaraproject.org/">
          <front>
            <title>CAMARA</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="YC" target="https://www.yangcatalog.org/private-page">
          <front>
            <title>YANG Catalog, YANG Modules Stats</title>
            <author>
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="Widoco2017" target="http://dgarijo.com/papers/widoco-iswc2017.pdf">
          <front>
            <title>WIDOCO: a wizard for documenting ontologies</title>
            <author initials="D." surname="Garijo" fullname="Daniel Garijo">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="LOT2019" target="https://doi.org/10.1016/j.engappai.2022.104755">
          <front>
            <title>LOT: An industrial oriented ontology engineering framework</title>
            <author initials="M." surname="Poveda-Villalon" fullname="Maria Poveda-Villalon">
              <organization/>
            </author>
            <author initials="A." surname="Fernandez-Izquierdo" fullname="Alba Fernandez-Izquierdo">
              <organization/>
            </author>
            <author initials="M." surname="Fernandez-Lopez" fullname="Mariano Fernandez-Lopez">
              <organization/>
            </author>
            <author initials="R." surname="Garcia-Castro" fullname="Raul Garcia-Castro">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7149">
          <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="C. Jacquenet" initials="C." surname="Jacquenet"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>Software-Defined Networking (SDN) has been one of the major buzz words of the networking industry for the past couple of years. And yet, no clear definition of what SDN actually covers has been broadly admitted so far. This document aims to clarify the SDN landscape by providing a perspective on requirements, issues, and other considerations about SDN, as seen from within a service provider environment.</t>
              <t>It is not meant to endlessly discuss what SDN truly means but rather to suggest a functional taxonomy of the techniques that can be used under an SDN umbrella and to elaborate on the various pending issues the combined activation of such techniques inevitably raises. As such, a definition of SDN is only mentioned for the sake of clarification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7149"/>
          <seriesInfo name="DOI" value="10.17487/RFC7149"/>
        </reference>
        <reference anchor="RFC7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
            <author fullname="S. Denazis" initials="S." surname="Denazis"/>
            <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="RFC9315">
          <front>
            <title>Intent-Based Networking - Concepts and Definitions</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="L. Z. Granville" initials="L. Z." surname="Granville"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>Intent and Intent-Based Networking are taking the industry by storm. At the same time, terms related to Intent-Based Networking are often used loosely and inconsistently, in many cases overlapping and confused with other concepts such as "policy." This document clarifies the concept of "intent" and provides an overview of the functionality that is associated with it. The goal is to contribute towards a common and shared understanding of terms, concepts, and functionality that can be used as the foundation to guide further definition of associated research and engineering problems and their solutions.</t>
              <t>This document is a product of the IRTF Network Management Research Group (NMRG). It reflects the consensus of the research group, having received many detailed and positive reviews by research group participants. It is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9315"/>
          <seriesInfo name="DOI" value="10.17487/RFC9315"/>
        </reference>
        <reference anchor="RFC9232">
          <front>
            <title>Network Telemetry Framework</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="A. Wang" initials="A." surname="Wang"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9232"/>
          <seriesInfo name="DOI" value="10.17487/RFC9232"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="I-D.ietf-core-comi">
          <front>
            <title>CoAP Management Interface (CORECONF)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>consultant</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-21"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC9595">
          <front>
            <title>YANG Schema Item iDentifier (YANG SID)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="A. Pelov" initials="A." role="editor" surname="Pelov"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>YANG Schema Item iDentifiers (YANG SIDs) are globally unique 63-bit unsigned integers used to identify YANG items. SIDs provide a more compact method for identifying those YANG items that can be used efficiently, notably in constrained environments (RFC 7228). This document defines the semantics, registration processes, and assignment processes for YANG SIDs for IETF-managed YANG modules. To enable the implementation of these processes, this document also defines a file format used to persist and publish assigned YANG SIDs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9595"/>
          <seriesInfo name="DOI" value="10.17487/RFC9595"/>
        </reference>
        <reference anchor="RFC9254">
          <front>
            <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="A. Pelov" initials="A." surname="Pelov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
              <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9254"/>
          <seriesInfo name="DOI" value="10.17487/RFC9254"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8568">
          <front>
            <title>Network Virtualization Research Challenges</title>
            <author fullname="CJ. Bernardos" initials="CJ." surname="Bernardos"/>
            <author fullname="A. Rahman" initials="A." surname="Rahman"/>
            <author fullname="JC. Zuniga" initials="JC." surname="Zuniga"/>
            <author fullname="LM. Contreras" initials="LM." surname="Contreras"/>
            <author fullname="P. Aranda" initials="P." surname="Aranda"/>
            <author fullname="P. Lynch" initials="P." surname="Lynch"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document describes open research challenges for network virtualization. Network virtualization is following a similar path as previously taken by cloud computing. Specifically, cloud computing popularized migration of computing functions (e.g., applications) and storage from local, dedicated, physical resources to remote virtual functions accessible through the Internet. In a similar manner, network virtualization is encouraging migration of networking functions from dedicated physical hardware nodes to a virtualized pool of resources. However, network virtualization can be considered to be a more complex problem than cloud computing as it not only involves virtualization of computing and storage functions but also involves abstraction of the network itself. This document describes current research and engineering challenges in network virtualization including the guarantee of quality of service, performance improvement, support for multiple domains, network slicing, service composition, device virtualization, privacy and security, separation of control concerns, network function placement, and testing. In addition, some proposals are made for new activities in the IETF and IRTF that could address some of these challenges. This document is a product of the Network Function Virtualization Research Group (NFVRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8568"/>
          <seriesInfo name="DOI" value="10.17487/RFC8568"/>
        </reference>
        <reference anchor="I-D.ietf-bmwg-containerized-infra">
          <front>
            <title>Considerations for Benchmarking Network Performance in Containerized Infrastructures</title>
            <author fullname="Trần Minh Ngọc" initials="T. M." surname="Ngọc">
              <organization>Electronics and Telecommunications Research Institute</organization>
            </author>
            <author fullname="Namseok Ko" initials="7. 9. 1. 1. 1. 1. 1. 3. 7." surname="Ko">
              <organization>Electronics and Telecommunications Research Institute</organization>
            </author>
            <author fullname="Sridhar Rao" initials="S." surname="Rao">
              <organization>The Linux Foundation</organization>
            </author>
            <author fullname="Jangwon Lee" initials="J." surname="Lee">
              <organization>Soongsil University</organization>
            </author>
            <author fullname="Younghan Kim" initials="Y." surname="Kim">
              <organization>Soongsil University</organization>
            </author>
            <date day="12" month="April" year="2026"/>
            <abstract>
              <t>   Recently, the Benchmarking Methodology Working Group extended the
   laboratory characterization from physical network functions (PNFs) to
   virtual network functions (VNFs).  With the ongoing shift in network
   function implementation from virtual machine-based to container-based
   approaches, system configurations and deployment scenarios for
   benchmarking will be partially influenced by how resource allocation
   and network technologies are specified for containerized network
   functions.  This draft outlines additional considerations for
   benchmarking network performance when network functions are
   containerized and executed on general-purpose hardware.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-bmwg-containerized-infra-09"/>
        </reference>
        <reference anchor="RFC6632">
          <front>
            <title>An Overview of the IETF Network Management Standards</title>
            <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6632"/>
          <seriesInfo name="DOI" value="10.17487/RFC6632"/>
        </reference>
        <reference anchor="I-D.iab-nemops-workshop-report">
          <front>
            <title>Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
            <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
         </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   The "Next Era of Network Management Operations (NEMOPS)" workshop was
   convened by the Internet Architecture Board (IAB) from December 3-5,
   2024, as a three-day online meeting.  It builds on a previous 2002
   workshop, the outcome of which was documented in RFC 3535,
   identifying 14 operator requirements for consideration in future
   network management protocol design and related data models, along
   with some recommendations for the IETF.  Much has changed in the
   Internet’s operation and technological foundations since then.  The
   NEMOPS workshop reviewed the past outcomes and discussed any
   operational barriers that prevented these technologies from being
   widely implemented.  With the industry, network operators and
   protocol engineers working in collaboration, the workshop developed a
   suggested plan of action and network management recommendations for
   the IETF and IRTF.  Building on RFC 3535, this document provides the
   report of the follow-up IAB workshop on Network Management.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report are
   those of the workshop participants and do not necessarily reflect IAB
   views and positions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-iab-nemops-workshop-report-04"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="I-D.ietf-grow-peering-api">
          <front>
            <title>Peering API</title>
            <author fullname="Carlos Aguado" initials="C." surname="Aguado">
              <organization>Amazon</organization>
            </author>
            <author fullname="Matt Griswold" initials="M." surname="Griswold">
              <organization>FullCtl</organization>
            </author>
            <author fullname="Jenny Ramseyer" initials="J." surname="Ramseyer">
              <organization>Meta</organization>
            </author>
            <author fullname="Arturo L. Servin" initials="A." surname="Servin">
              <organization>Google</organization>
            </author>
            <author fullname="Tom Strickx" initials="T." surname="Strickx">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Q Misell" initials="Q." surname="Misell">
              <organization>AS207960 Cyfyngedig</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   We propose an API standard for BGP Peering, also known as interdomain
   interconnection through global Internet Routing.  This API offers a
   standard way to request public (settlement-free) peering, verify the
   status of a request or BGP session, and list potential connection
   locations.  The API is backed by PeeringDB OIDC, the industry
   standard for peering authentication.  We also propose future work to
   cover private peering, and alternative authentication methods.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-peering-api-01"/>
        </reference>
        <reference anchor="RFC9834">
          <front>
            <title>YANG Data Models for Bearers and Attachment Circuits as a Service (ACaaS)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="R. Roberts" initials="R." role="editor" surname="Roberts"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="B. Wu" initials="B." surname="Wu"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>Delivery of network services assumes that appropriate setup is
provisioned over the links that connect customer termination points
and a provider network. The required setup to allow successful data
exchange over these links is referred to as an attachment circuit
(AC), while the underlying link is referred to as a "bearer".</t>
              <t>This document specifies a YANG service data model for ACs. This model
can be used for the provisioning of ACs before or during service
provisioning (e.g., RFC 9543 Network Slice Service).</t>
              <t>The document also specifies a YANG service data model for managing
bearers over which ACs are established.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9834"/>
          <seriesInfo name="DOI" value="10.17487/RFC9834"/>
        </reference>
        <reference anchor="RFC8639">
          <front>
            <title>Subscription to YANG Notifications</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8639"/>
          <seriesInfo name="DOI" value="10.17487/RFC8639"/>
        </reference>
        <referencegroup anchor="BCP127" target="https://www.rfc-editor.org/info/bcp127">
          <reference anchor="RFC4787" target="https://www.rfc-editor.org/info/rfc4787">
            <front>
              <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
              <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
              <author fullname="C. Jennings" initials="C." surname="Jennings"/>
              <date month="January" year="2007"/>
              <abstract>
                <t>This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="127"/>
            <seriesInfo name="RFC" value="4787"/>
            <seriesInfo name="DOI" value="10.17487/RFC4787"/>
          </reference>
          <reference anchor="RFC6888" target="https://www.rfc-editor.org/info/rfc6888">
            <front>
              <title>Common Requirements for Carrier-Grade NATs (CGNs)</title>
              <author fullname="S. Perreault" initials="S." role="editor" surname="Perreault"/>
              <author fullname="I. Yamagata" initials="I." surname="Yamagata"/>
              <author fullname="S. Miyakawa" initials="S." surname="Miyakawa"/>
              <author fullname="A. Nakagawa" initials="A." surname="Nakagawa"/>
              <author fullname="H. Ashida" initials="H." surname="Ashida"/>
              <date month="April" year="2013"/>
              <abstract>
                <t>This document defines common requirements for Carrier-Grade NATs (CGNs). It updates RFC 4787.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="127"/>
            <seriesInfo name="RFC" value="6888"/>
            <seriesInfo name="DOI" value="10.17487/RFC6888"/>
          </reference>
          <reference anchor="RFC7857" target="https://www.rfc-editor.org/info/rfc7857">
            <front>
              <title>Updates to Network Address Translation (NAT) Behavioral Requirements</title>
              <author fullname="R. Penno" initials="R." surname="Penno"/>
              <author fullname="S. Perreault" initials="S." surname="Perreault"/>
              <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
              <author fullname="S. Sivakumar" initials="S." surname="Sivakumar"/>
              <author fullname="K. Naito" initials="K." surname="Naito"/>
              <date month="April" year="2016"/>
              <abstract>
                <t>This document clarifies and updates several requirements of RFCs 4787, 5382, and 5508 based on operational and development experience. The focus of this document is Network Address Translation from IPv4 to IPv4 (NAT44).</t>
                <t>This document updates RFCs 4787, 5382, and 5508.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="127"/>
            <seriesInfo name="RFC" value="7857"/>
            <seriesInfo name="DOI" value="10.17487/RFC7857"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC7414">
          <front>
            <title>A Roadmap for Transmission Control Protocol (TCP) Specification Documents</title>
            <author fullname="M. Duke" initials="M." surname="Duke"/>
            <author fullname="R. Braden" initials="R." surname="Braden"/>
            <author fullname="W. Eddy" initials="W." surname="Eddy"/>
            <author fullname="E. Blanton" initials="E." surname="Blanton"/>
            <author fullname="A. Zimmermann" initials="A." surname="Zimmermann"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document contains a roadmap to the Request for Comments (RFC) documents relating to the Internet's Transmission Control Protocol (TCP). This roadmap provides a brief summary of the documents defining TCP and various TCP extensions that have accumulated in the RFC series. This serves as a guide and quick reference for both TCP implementers and other parties who desire information contained in the TCP-related RFCs.</t>
              <t>This document obsoletes RFC 4614.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7414"/>
          <seriesInfo name="DOI" value="10.17487/RFC7414"/>
        </reference>
        <reference anchor="RFC6244">
          <front>
            <title>An Architecture for Network Management Using NETCONF and YANG</title>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) gives access to native capabilities of the devices within a network, defining methods for manipulating configuration databases, retrieving operational data, and invoking specific operations. YANG provides the means to define the content carried via NETCONF, both data and operations. Using both technologies, standard modules can be defined to give interoperability and commonality to devices, while still allowing devices to express their unique capabilities.</t>
              <t>This document describes how NETCONF and YANG help build network management applications that meet the needs of network operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6244"/>
          <seriesInfo name="DOI" value="10.17487/RFC6244"/>
        </reference>
        <reference anchor="RFC8640">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over NETCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document provides a Network Configuration Protocol (NETCONF) binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8640"/>
          <seriesInfo name="DOI" value="10.17487/RFC8640"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.ietf-netconf-https-notif">
          <front>
            <title>An HTTPS-based Transport for YANG Notifications</title>
            <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
              <organization>Kloud Services</organization>
            </author>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <date day="1" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a protocol for sending asynchronous event
   notifications similar to notifications defined in RFC 5277, but over
   HTTPS.  YANG modules for configuring publishers are also defined.
   Examples are provided illustrating how to configure various
   publishers.

   This document requires that the publisher is a "server" (e.g., a
   NETCONF or RESTCONF server), but does not assume that the receiver is
   a server.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-https-notif-15"/>
        </reference>
        <reference anchor="I-D.ietf-netconf-udp-notif">
          <front>
            <title>UDP-based Transport for Configured Subscriptions</title>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Tianran Zhou" initials="T." surname="Zhou">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Paolo Lucente" initials="P." surname="Lucente">
              <organization>NTT</organization>
            </author>
            <date day="28" month="January" year="2026"/>
            <abstract>
              <t>   This document describes a UDP-based transport for YANG notifications
   to collect data from network nodes within a controlled environment.
   A shim header is defined to facilitate the data streaming directly
   from a publishing process on a network device to telemetry receivers.
   Such a design enables higher frequency updates and less performance
   overhead on publisher and receiver processes compared to already
   established notification mechanisms.  A YANG data model is also
   defined for management of the described UDP-based transport.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-udp-notif-25"/>
        </reference>
        <reference anchor="I-D.openconfig-rtgwg-gnmi-spec">
          <front>
            <title>gRPC Network Management Interface (gNMI)</title>
            <author fullname="Rob Shakir" initials="R." surname="Shakir">
              <organization>Google</organization>
            </author>
            <author fullname="Anees Shaikh" initials="A." surname="Shaikh">
              <organization>Google</organization>
            </author>
            <author fullname="Paul Borman" initials="P." surname="Borman">
              <organization>Google</organization>
            </author>
            <author fullname="Marcus Hines" initials="M." surname="Hines">
              <organization>Google</organization>
            </author>
            <author fullname="Carl Lebsack" initials="C." surname="Lebsack">
              <organization>Google</organization>
            </author>
            <author fullname="Chris Morrow" initials="C." surname="Morrow">
              <organization>Google</organization>
            </author>
            <date day="5" month="March" year="2018"/>
            <abstract>
              <t>   This document describes the gRPC Network Management Interface (gNMI),
   a network management protocol based on the gRPC framework.  gNMI
   supports retrieval and manipulation of state from network elements
   where the data is represented by a tree structure, and addressable by
   paths.  The gNMI service defines operations for configuration
   management, operational state retrieval, and bulk data collection via
   streaming telemetry.  The authoritative gNMI specification is
   maintained at [GNMI-SPEC].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-openconfig-rtgwg-gnmi-spec-01"/>
        </reference>
        <reference anchor="I-D.marcas-nmop-knowledge-graph-yang">
          <front>
            <title>Knowledge Graphs for YANG-based Network Management</title>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Lucia Cabanillas" initials="L." surname="Cabanillas">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Pedro Martinez-Julia" initials="P." surname="Martinez-Julia">
              <organization>NICT</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The success of the YANG language and YANG-based protocols for
   managing the network has unlocked new opportunities in network
   analytics.  However, the wide heterogeneity of YANG models hinders
   the consumption and analysis of network data.  Besides, data encoding
   formats and transport protocols will differ depending on the network
   management protocol supported by the network device.  These
   challenges call for new data management paradigms that facilitate the
   discovery, understanding, integration and access to silos of
   heterogenous YANG data, abstracting from the complexities of the
   network devices.

   This document introduces the knowledge graph paradigm as a solution
   to this data management problem, with focus on YANG-based network
   management.  The document provides background on related topics such
   as ontologies and graph standards, and shares guidelines for
   implementing knowledge graphs from YANG data.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-marcas-nmop-knowledge-graph-yang-05"/>
        </reference>
        <reference anchor="I-D.tailhardat-nmop-incident-management-noria">
          <front>
            <title>Knowledge Graphs for Enhanced Cross-Operator Incident Management and Network Design</title>
            <author fullname="Lionel Tailhardat" initials="L." surname="Tailhardat">
              <organization>Orange Research</organization>
            </author>
            <author fullname="Raphaël Troncy" initials="R." surname="Troncy">
              <organization>EURECOM</organization>
            </author>
            <author fullname="Yoan Chabot" initials="Y." surname="Chabot">
              <organization>Orange Research</organization>
            </author>
            <author fullname="Fano Ramparany" initials="F." surname="Ramparany">
              <organization>Orange Research</organization>
            </author>
            <author fullname="Pauline Folz" initials="P." surname="Folz">
              <organization>Orange Research</organization>
            </author>
            <author fullname="Bernard Kavanagh" initials="B." surname="Kavanagh">
              <organization>TiDB</organization>
            </author>
            <date day="9" month="February" year="2026"/>
            <abstract>
              <t>   Operational efficiency in incident management in networking requires
   correlating and interpreting large volumes of heterogeneous technical
   information.  Knowledge Graphs (KG) can provide a unified view of
   complex systems through shared vocabularies.  YANG data models enable
   describing network configurations and automating their deployment.
   However, both approaches face challenges in vocabulary alignment and
   adoption, hindering knowledge capitalization and sharing on network
   designs and best practices.  To address this, the concept of a IT
   Service Management Knowledge Graph (ITSM-KG) is introduced to
   leverage existing network infrastructure descriptions in YANG format
   and enable abstract reasoning on network behaviors.  The key
   principle to achieve the construction of such ITSM-KG is to transform
   YANG representations of network infrastructures into an equivalent
   knowledge graph representation, and then embed it into a more
   extensive data model for Anomaly Detection (AD) and Risk Management
   applications.

   In addition to use case analysis and design pattern analysis, an
   experiment is proposed to assess the potential of the ITSM-KG in
   improving network quality and designs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tailhardat-nmop-incident-management-noria-04"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7012">
          <front>
            <title>Information Model for IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7012"/>
          <seriesInfo name="DOI" value="10.17487/RFC7012"/>
        </reference>
        <reference anchor="RFC5472">
          <front>
            <title>IP Flow Information Export (IPFIX) Applicability</title>
            <author fullname="T. Zseby" initials="T." surname="Zseby"/>
            <author fullname="E. Boschi" initials="E." surname="Boschi"/>
            <author fullname="N. Brownlee" initials="N." surname="Brownlee"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>In this document, we describe the applicability of the IP Flow Information eXport (IPFIX) protocol for a variety of applications. We show how applications can use IPFIX, describe the relevant Information Elements (IEs) for those applications, and present opportunities and limitations of the protocol. Furthermore, we describe relations of the IPFIX framework to other architectures and frameworks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5472"/>
          <seriesInfo name="DOI" value="10.17487/RFC5472"/>
        </reference>
        <reference anchor="RFC5476">
          <front>
            <title>Packet Sampling (PSAMP) Protocol Specifications</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="A. Johnson" initials="A." surname="Johnson"/>
            <author fullname="J. Quittek" initials="J." surname="Quittek"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the export of packet information from a Packet SAMPling (PSAMP) Exporting Process to a PSAMP Collecting Process. For export of packet information, the IP Flow Information eXport (IPFIX) protocol is used, as both the IPFIX and PSAMP architecture match very well, and the means provided by the IPFIX protocol are sufficient. The document specifies in detail how the IPFIX protocol is used for PSAMP export of packet information. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5476"/>
          <seriesInfo name="DOI" value="10.17487/RFC5476"/>
        </reference>
        <reference anchor="RFC5477">
          <front>
            <title>Information Model for Packet Sampling Exports</title>
            <author fullname="T. Dietz" initials="T." surname="Dietz"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <author fullname="F. Dressler" initials="F." surname="Dressler"/>
            <author fullname="G. Carle" initials="G." surname="Carle"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This memo defines an information model for the Packet SAMPling (PSAMP) protocol. It is used by the PSAMP protocol for encoding sampled packet data and information related to the Sampling process. As the PSAMP protocol is based on the IP Flow Information eXport (IPFIX) protocol, this information model is an extension to the IPFIX information model. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5477"/>
          <seriesInfo name="DOI" value="10.17487/RFC5477"/>
        </reference>
        <reference anchor="RFC7015">
          <front>
            <title>Flow Aggregation for the IP Flow Information Export (IPFIX) Protocol</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="A. Wagner" initials="A." surname="Wagner"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document provides a common implementation-independent basis for the interoperable application of the IP Flow Information Export (IPFIX) protocol to the handling of Aggregated Flows, which are IPFIX Flows representing packets from multiple Original Flows sharing some set of common properties. It does this through a detailed terminology and a descriptive Intermediate Aggregation Process architecture, including a specification of methods for Original Flow counting and counter distribution across intervals.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7015"/>
          <seriesInfo name="DOI" value="10.17487/RFC7015"/>
        </reference>
        <reference anchor="RFC1213">
          <front>
            <title>Management Information Base for Network Management of TCP/IP-based internets: MIB-II</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="M. Rose" initials="M." surname="Rose"/>
            <date month="March" year="1991"/>
            <abstract>
              <t>This memo defines the second version of the Management Information Base (MIB-II) for use with network management protocols in TCP/IP-based internets. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="17"/>
          <seriesInfo name="RFC" value="1213"/>
          <seriesInfo name="DOI" value="10.17487/RFC1213"/>
        </reference>
        <reference anchor="RFC4838">
          <front>
            <title>Delay-Tolerant Networking Architecture</title>
            <author fullname="V. Cerf" initials="V." surname="Cerf"/>
            <author fullname="S. Burleigh" initials="S." surname="Burleigh"/>
            <author fullname="A. Hooke" initials="A." surname="Hooke"/>
            <author fullname="L. Torgerson" initials="L." surname="Torgerson"/>
            <author fullname="R. Durst" initials="R." surname="Durst"/>
            <author fullname="K. Scott" initials="K." surname="Scott"/>
            <author fullname="K. Fall" initials="K." surname="Fall"/>
            <author fullname="H. Weiss" initials="H." surname="Weiss"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document describes an architecture for delay-tolerant and disruption-tolerant networks, and is an evolution of the architecture originally designed for the Interplanetary Internet, a communication system envisioned to provide Internet-like services across interplanetary distances in support of deep space exploration. This document describes an architecture that addresses a variety of problems with internetworks having operational and performance characteristics that make conventional (Internet-like) networking approaches either unworkable or impractical. We define a message- oriented overlay that exists above the transport (or other) layers of the networks it interconnects. The document presents a motivation for the architecture, an architectural overview, review of state management required for its operation, and a discussion of application design issues. This document represents the consensus of the IRTF DTN research group and has been widely reviewed by that group. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4838"/>
          <seriesInfo name="DOI" value="10.17487/RFC4838"/>
        </reference>
        <reference anchor="RFC8557">
          <front>
            <title>Deterministic Networking Problem Statement</title>
            <author fullname="N. Finn" initials="N." surname="Finn"/>
            <author fullname="P. Thubert" initials="P." surname="Thubert"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This paper documents the needs in various industries to establish multi-hop paths for characterized flows with deterministic properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8557"/>
          <seriesInfo name="DOI" value="10.17487/RFC8557"/>
        </reference>
        <reference anchor="RFC8667">
          <front>
            <title>IS-IS Extensions for Segment Routing</title>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="A. Bashandy" initials="A." surname="Bashandy"/>
            <author fullname="H. Gredler" initials="H." surname="Gredler"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <date month="December" year="2019"/>
            <abstract>
              <t>Segment Routing (SR) allows for a flexible definition of end-to-end paths within IGP topologies by encoding paths as sequences of topological sub-paths, called "segments". These segments are advertised by the link-state routing protocols (IS-IS and OSPF).</t>
              <t>This document describes the IS-IS extensions that need to be introduced for Segment Routing operating on an MPLS data plane.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8667"/>
          <seriesInfo name="DOI" value="10.17487/RFC8667"/>
        </reference>
        <reference anchor="I-D.ietf-isis-sr-yang">
          <front>
            <title>A YANG Data Model for IS-IS Segment Routing over the MPLS Data Plane</title>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Ing-Wher (Helen) Chen" initials="H." surname="Chen">
              <organization>The MITRE Corporation</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="6" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model that can be used to manage
   IS-IS Extensions for Segment Routing over the MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-isis-sr-yang-31"/>
        </reference>
        <reference anchor="I-D.ietf-idr-bgp-model">
          <front>
            <title>YANG Model for Border Gateway Protocol (BGP-4)</title>
            <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
              <organization>Kloud Services</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Susan Hares" initials="S." surname="Hares">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jeff Haas" initials="J." surname="Haas">
              <organization>HPE</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document defines a YANG data model for configuring and managing
   BGP, including protocol, policy, and operational aspects, such as
   RIB, based on data center, carrier, and content provider operational
   requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-model-19"/>
        </reference>
        <reference anchor="RFC8528">
          <front>
            <title>YANG Schema Mount</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a mechanism that adds the schema trees defined by a set of YANG modules onto a mount point defined in the schema tree in another YANG module.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8528"/>
          <seriesInfo name="DOI" value="10.17487/RFC8528"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC8519">
          <front>
            <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="S. Agarwal" initials="S." surname="Agarwal"/>
            <author fullname="L. Huang" initials="L." surname="Huang"/>
            <author fullname="D. Blair" initials="D." surname="Blair"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device. Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8519"/>
          <seriesInfo name="DOI" value="10.17487/RFC8519"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
      </references>
    </references>
    <?line 538?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Christian Jacquenet and Jean-Michel Combes for their inputs.</t>
      <t>Thanks to Benoît Claise and Alex Clemm for the comments.</t>
      <t>Many of the requirements were extracted from contributions to the IAB Next Era of Network Management Operations (NEMOPS) Workshop <xref target="I-D.iab-nemops-workshop-report"/>.</t>
      <t>Thanks to Ian Farrer, Brad Peters, Chongfeng Xie, and Qin Wu for their contribution to consolidate the requirements.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Lionel Tailhardat">
        <organization>Orange</organization>
        <address>
          <email>lionel.tailhardat@orange.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
