<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-network-inventory-software-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Network Inventory Software">A YANG Network Data Model of Network Inventory Software Extensions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-software-02"/>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Zhou" fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area/>
    <workgroup>Network Inventory YANG</workgroup>
    <keyword>Automation</keyword>
    <keyword>Network Inventory</keyword>
    <keyword>Network Operation</keyword>
    <abstract>
      <?line 44?>

<t>This document extends the base Network Inventory YANG model to support
 non-physical network elements (NEs), such as controllers, virtual
 routers, and virtual firewalls, as well as software components
 like platform operating systems and software modules. In addition to
 the software revisions and patches already defined in the base model,
 this extension introduces software status and time stamp information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Inventory YANG  mailing list (inventory-yang@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-ivy-wg/network-inventory-software"/>.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Network Inventory consists of the physical and non-physical
      network elements (NEs), hardware components, firmware components, and
      software components on a managed network domain. The non-physical
      network elements (NEs) are network devices that support network
      protocols and functions, e.g., routers, firewalls, and controllers,
      which can reside in any network or compute devices, such as servers in
      Data Center (DC), server-based virtual machines (VMs), or server-based
      containers.</t>
      <t><xref target="I-D.ietf-ivy-network-inventory-yang"/>  defines the base
      Network Inventory YANG model for physical network element (NE) and
      hardware components of NEs. Examples of hardware components could be
      rack, shelf, slot, board and physical port.</t>
      <t>The management of non-physical NE and software components information
      is similar to the management of physical NE and hardware information.
      For example, inventory data, including product names, serial numbers,
      etc. are also applicable. This document defines a network inventory
      software extension YANG model. In addition to inheriting the common
      inventory attributes of the base network inventory model, this document
      also adds some software-specific attributes of non-physical NEs (such as
      controllers, virtual routers, and virtual firewalls) and software
      components (such as operating system, software modules, BIOS, and boot
      loader).</t>
      <t>The Network Inventory software extension model is classified as a
      network model (Section 4 of  <xref target="RFC8309"/>).</t>
      <t>The YANG data model in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>AAAA --&gt; the assigned RFC number for <xref target="I-D.ietf-ivy-network-inventory-yang"/></t>
          </li>
        </ul>
      </section>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>The following terms are defined in <xref target="RFC7950"/> and are not
redefined here:</t>
        <ul spacing="normal">
          <li>
            <t>client</t>
          </li>
          <li>
            <t>server</t>
          </li>
          <li>
            <t>augment</t>
          </li>
          <li>
            <t>data model</t>
          </li>
          <li>
            <t>data node
The following terms are defined in <xref target="RFC6241"/> and are not redefined
here:</t>
          </li>
          <li>
            <t>configuration data</t>
          </li>
          <li>
            <t>state data
The tree diagram used in this document follows the notation defined
in <xref target="RFC8340"/>..</t>
          </li>
        </ul>
        <t>Also, this document uses terms defined in <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP 14
        <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="relationship-to-other-yang-data-models">
      <name>Relationship to Other YANG Data Models</name>
      <t>The base network inventory model supports the software versions of
      NEs and software versions of hardware components. This document adds
      more software component identifiers (e.g. platformos, software patch)
      and more NE types (e.g. software NE, virtual NE) to provide enhanced
      software information on the NE to facilitate software compatibility
      check.</t>
      <t><xref target="fig-ni-sw-mod-relation"/> depicts the relationship between
      the Software Extension model and the base network inventory model. The Software Extension
      network inventory model enhances the model defined in the base network
      inventory model with more software specific attributes.</t>
      <figure anchor="fig-ni-sw-mod-relation">
        <name>Relationship of SW Extension Model to the Base Inventory Model</name>
        <artwork type="ascii-art" align="center"><![CDATA[
+----------------------+
|                      |
|Base Network Inventory|
|                      |
+----------^-----------+
           |
           |
           |
           |
+----------^-----------+
|                      |
|  Software Extensions |
|    e.g.,SW module    |
|                      |
+----------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="model-overview">
      <name>Model Overview</name>
      <t>The tree diagram in <xref target="full-tree"/> provides an overview of the data model for "ietf-network-inventory-sw-ext"
      module.</t>
      <figure anchor="full-tree">
        <name>YANG Tree of Software Extensions</name>
        <artwork align="center"><![CDATA[
module: ietf-network-inventory-sw-ext
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:software-rev:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:software-rev/nwi:patch:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:components/nwi:component
            /nwi:software-rev:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:components/nwi:component
            /nwi:software-rev/nwi:patch:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time


]]></artwork>
      </figure>
    </section>
    <section anchor="non-physical-network-elements">
      <name>Non-physical Network Elements</name>
      <t>In the base Network Inventory YANG model, "ne-type" is a YANG
      identity that describes the type of the network element and only the
      "physical-network-element" identity" is defined. This document adds
      non-physical NE identity, such as "ne-software", "ne-virtual", and
      "ne-container".</t>
      <t>The base Network Inventory model also defines common inventory
      attributes, including the software version, patch versions, product
      name, and serial number. The data is also applicable to non-physical
      NEs.</t>
      <t>The Network Inventory software extension mode defines some new
      software attributes, consisting of software status, installation time,
      and activation time.</t>
    </section>
    <section anchor="software-components">
      <name>Software components</name>
      <t>Software components refer to the software installed on the NE, such
      as operating system, software modules, BIOS, and boot loaders.</t>
      <t>Similar to the common inventory attributes of NEs, the common
      attributes of software components (such as software revisions, patch
      revisions, product name, and serial number) are also applicable to
      software components. For software revisions and patch revisions, the base inventory
      (Section 4 of <xref target="I-D.ietf-ivy-network-inventory-yang"/>)
      defines the "list" of "software-rev" and the "list" of
      "patch". For example, on a router, software components may
      include a routing protocol package
      (e.g., " foo-rt-protocol-suite"), or a firmware module for a
      line card (e.g., " foo-lc-fw-21.5.3").</t>
      <t>If more detailed installation and activation
      information is needed—such as whether a component is active, pending-reboot,
 or rollback-eligible, along with its install time or activation
 time stamp, the extension attributes of software components
      can be used.</t>
    </section>
    <section anchor="yang-data-model-for-network-inventory-software-extensions">
      <name>YANG Data model for Network Inventory Software Extensions</name>
      <t>The "ietf-network-inventory-sw-ext" module uses types defined in <xref target="RFC6991"/>,
   <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <sourcecode type="yang" markers="true" name="ietf-network-inventory-sw-ext@2025-10-20.yang"><![CDATA[
module ietf-network-inventory-sw-ext {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext";
  prefix nwis;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-network-inventory {
    prefix nwi;
    reference
      "RFCAAAA: A YANG Data Model for Network Inventory";
  }

  organization
    "IETF Network Inventory YANG (ivy) Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/ivy>
     WG List:  <mailto:inventory-yang@ietf.org>

     Editor: Bo Wu
             <lana.wubo@huawei.com>
     Editor: Cheng Zhou
          <zhouchengyjy@chinamobile.com>
     Editor: Qin Wu
             <bill.wu@huawei.com>
     Editor: Mohamed Boucadair
             <mohamed.boucadair@orange.com>";
  description
    "This YANG module defines a model for network inventory software
     extensions.

     Copyright (c) 2025 IETF Trust and the persons
     identified as authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2025-10-20 {
    description
      "Initial version";
    reference
      "RFC XXXX: A YANG Data Model for Network Inventory Software
                 Extensions.";
  }

  identity ne-nonphysical {
    base nwi:ne-type;
    description
      "Any network element implemented purely in software.
       It performs protocol or forwarding functions but
       does not correspond to a distinguishable hardware
       chassis. It can be hosted on a bare-metal server,
       VM, container, or cloud instance.";
  }

  identity ne-software {
    base ne-nonphysical;
    description
      "Software NE that runs directly on a host OS
       (a.k.a. bare-metal deployment) or hypervisor.
       Examples of software NEs are network controllers.";
  }

  identity ne-virtual {
    base ne-nonphysical;
    description
      "Virtual NE instantiated inside a virtual-machine
       (VM). Provides virtual network function (VNF) implementations
       such as vRouter, vFirewall, vPE.";
  }

  identity ne-container {
    base ne-nonphysical;
    description
      "Container NE packaged as CNF (Containerised Network
       Function). Runs under Docker/K8s.";
  }

  identity software-component {
    base nwi:non-hardware-component-class;
    description
      "Base identity for software components in a managed device.";
  }

  identity operating-system {
    base software-component;
    description
      "Operating system software type.";
  }

  identity bios {
    base software-component;
    description
      "BIOS or UEFI firmware image responsible for hardware
       initialisation and secure boot.";
  }

  identity boot-loader {
    base software-component;
    description
      "Software layer responsible for loading and booting the
       device OS or network OS.";
  }

  identity software-module {
    base software-component;
    description
      "Installable unit smaller than a full OS image,
       e.g. feature package.";
  }

  identity software-status {
    description
      "Base identity for software status.";
  }

  identity software-installed {
    base software-status;
    description
      "Software status is Installed.";
  }

  identity software-activated {
    base software-status;
    description
      "Software status is Activated.";
  }

  grouping software-info-grouping {
    description
      "Specific attributes applicable to software.";
    leaf status {
      type identityref {
        base software-status;
      }
      description
        "Software status.";
    }
    leaf installation-time {
      type yang:date-and-time;
      description
        "Time when the software or patch revision was
         first installed.";
    }
    leaf activation-time {
      type yang:date-and-time;
      description
        "Time when the currently installed revision became active
         (i.e., was rebooted into).";
    }
  }

  /* Main blocks */

  augment "/nwi:network-inventory/nwi:network-elements"
        + "/nwi:network-element/nwi:software-rev" {
    description
      "Adds installation-/activation-time, status, etc. to the base
       NE software revision.";
    uses software-info-grouping;
  }

  augment "/nwi:network-inventory/nwi:network-elements"
        + "/nwi:network-element/nwi:software-rev/nwi:patch" {
    description
      "Adds installation-/activation-time, status, etc. to the patch
       level.";
    uses software-info-grouping;
  }

  augment "/nwi:network-inventory/nwi:network-elements/"
        + "nwi:network-element/nwi:components/nwi:component/"
        + "nwi:software-rev" {
    description
      "Extends components, such as line-card/CPU/etc.
       software revision with timestamp and state information.";
    uses software-info-grouping;
  }

  augment "/nwi:network-inventory/nwi:network-elements/"
        + "nwi:network-element/nwi:components/nwi:component/"
        + "nwi:software-rev/nwi:patch" {
    description
      "Applies the software-info attributes to component-level
       patches.";
    uses software-info-grouping;
  }
}

]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section uses the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The "ietf-network-inventory-sw-ext" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. These YANG-based management
protocols (1) have to use a secure transport layer
(e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have
to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
      <ul spacing="normal">
        <li>
          <t>"/nwi:network-elements/network-element/software-rev"  </t>
          <t>
This subtree reports the software information for all the network
elements and their hardware components deployed within the network
as well as of the software modules being active on these network
elements and components. This may reveal software versions or
unpatched vulnerabilities.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
URI:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext
Registrant Contact:  The IESG.
XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
Name:  ietf-network-inventory-sw-ext
Namespace:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext
Prefix:  nwis
Maintained by IANA?  N
Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="14" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-11"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
    <?line 504?>

<section anchor="examples-of-software-attributes">
      <name>Examples of Software Attributes</name>
      <t>This appendix provides some examples of software attributes
 implementations and how they can be modeled using the
 “ietf-network-inventory-sw-ext” module defined.</t>
      <t>This appendix illustrates, by means of two typical scenarios, how to
 populate the software-specific nodes defined in
 ietf-network-inventory-sw-ext and explains the common values that can be used.</t>
      <t>Scenario 1: Whole-device base software (example-os) plus hot patches
 (P3 already activated, P4 installed but not yet activated).</t>
      <t>Scenario 2: Line-card programmable forwarding image
 (example-fpga-image) plus its patch
 (2.1.0.P1 installed and awaiting activation).</t>
      <t>=============== NOTE: '' line wrapping per RFC 8792 ================</t>
      <t>{
  "ietf-network-inventory:network-inventory": {
    "network-elements": {
      "network-element": [
        {
          "ne-id": "example:NE-01",
          "software-rev": [
            {
              "name": "example:ne-os",
              "revision": "7.9.2",
              "ietf-network-inventory-sw-ext:status": "software-\
                                                          activated",
              "ietf-network-inventory-sw-ext:installation-time": "\
                                               2024-08-01T12:00:00Z",
              "ietf-network-inventory-sw-ext:activation-time": "2024\
                                                   -08-01T12:05:00Z",
              "patch": [
                {
                  "revision": "P3",
                  "ietf-network-inventory-sw-ext:status": "software-\
                                                          activated",
                  "ietf-network-inventory-sw-ext:installation-time"\
                                            : "2024-09-15T10:30:00Z",
                  "ietf-network-inventory-sw-ext:activation-time": "\
                                                2024-09-15T10:32:00Z"
                },
                {
                  "revision": "P4",
                  "ietf-network-inventory-sw-ext:status": "software-\
                                                          installed",
                  "ietf-network-inventory-sw-ext:installation-time"\
                                            : "2024-10-01T14:00:00Z",
                  "ietf-network-inventory-sw-ext:activation-time": \
                                                                 null
                }
              ]
            }
          ],
          "components": {
            "component": [
              {
                "component-id": "example:lpu/1/0",
                "class": "iana-hardware:module",
                "software-rev": [
                  {
                    "name": "example-fp-image",
                    "revision": "2.1.0",
                    "ietf-network-inventory-sw-ext:status": "\
                                                 software-activated",
                    "ietf-network-inventory-sw-ext:installation-time\
                                           ": "2024-08-01T12:00:00Z",
                    "ietf-network-inventory-sw-ext:activation-time"\
                                            : "2024-08-01T12:06:00Z",
                    "patch": [
                      {
                        "revision": "2.1.0.P1",
                        "ietf-network-inventory-sw-ext:status": "\
                                                 software-installed",
                        "ietf-network-inventory-sw-ext:installation-\
                                       time": "2024-10-01T14:10:00Z",
                        "activation-time": null
                      }
                    ]
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Prasenjit Manna,Phil Bedard, Diego R.
      Lopez, Italo Busi, and many others for their helpful comments and
      suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="Y." surname="Zhao" fullname="Yao Zhao">
        <organization>Huawei</organization>
        <address>
          <email>zhaoyao.zhaoyao@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
