<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-18" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-18"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>FiberCop</organization>
      <address>
        <email>fabio.peruzzini@fibercop.com</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="15"/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 120?>

<t>This document explores the applicability of the Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration (POI)
within the context of IP/MPLS and optical internetworking. It examines
the YANG data models defined by the IETF that enable an ACTN-based
deployment architecture and highlights specific scenarios pertinent
to Service Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology scenario (packet over optical), particularly
emphasising the Multi-Domain Service Coordinator to Provisioning
Network Controller Interface (MPI) within the ACTN architecture</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The full automation of management and control for Service Providers'
transport  networks, spanning IP/MPLS, optical, and microwave
technologies, is crucial to addressing customer demands for high-bandwidth
applications, such as ultra-fast  mobile broadband for 5G and fiber
connectivity services. The Abstraction and  Control of TE Networks (ACTN)
architecture and interfaces enable the automation  and efficient
operation of complex optical and IP/MPLS networks using standardized
interfaces and data models. This approach supports a broad spectrum of
network services that can be requested by upper-layer applications,
meeting diverse  service-level requirements from a network perspective,
such as physical diversity, latency, bandwidth, and topology.</t>
      <t>Packet Optical Integration (POI) represents an advanced application of
traffic engineering. In wide-area networks, packet networks based on the
Internet Protocol (IP), often augmented with Multiprotocol Label
Switching (MPLS) or Segment Routing  (SR), are typically implemented over
an optical transport network utilizing Dense Wavelength Division
Multiplexing (DWDM), occasionally with an optional Optical Transport
Network (OTN) layer.</t>
      <t>There are significant technical differences between the packet and optical technologies
(e.g., routers versus optical switches) and their associated network engineering
and planning approaches (e.g., inter-domain peering optimization in IP
networks versus managing physical impairments in DWDM systems or
operating on vastly different time scales). Additionally, customer
requirements often differ between packet and optical networks, and it is
common for Service Providers to use different vendors for each domain. As
a result, the operation of these complex packet and optical networks is
often siloed, as each technology domain requires specialized skill sets.</t>
      <t>As a consequence, in many existing network deployments, packet and optical networks are engineered and operated independently.</t>
      <t>This separation is inefficient for several reasons.
Firstly, integrating packet and optical
networks can significantly reduce capital expenditures (CAPEX) and
operational expenditures (OPEX).
Secondly, multi-technology topology insights can optimize troubleshooting (e.g., alarm correlation) and enhance network operation (e.g., coordination of maintenance events). Additionally, detailed inventory and planning information can also improve service assurance quality, such as detecting constraint violations or lack of resource diversity.
Thirdly, multi-technology traffic engineering enables more efficient use of
available network capacity (e.g., coordination of restoration).
Furthermore, provisioning workflows can be simplified or automated across
layers, facilitating capabilities such as bandwidth-on-demand and
streamlined maintenance activities.</t>
      <t>The ACTN framework facilitates seamless integration of packet and optical
networks across multiple technologies and vendors.
This is achieved through separated Provisioning Network Controllers (PNCs) for both packet and optical domains,
which hide the complexities of the technical differences between the packet and optical technologies while
providing sufficient abstract information that allows the Multi-Domain Service Coordinator (MDSC)
to provide multi-layer coordination between packet and optical networks.</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using
Resource Reservation Protocol (RSVP) Traffic Engineering (TE)-based or SR
-TE-based, forwarding plane mechanisms.</t>
      <t>This document outlines key scenarios for Packet Optical Integration (POI)
from the perspective of the packet service layer and highlights the
necessary coordination between packet and optical layers to enhance POI
deployment and operation. These scenarios emphasize multi-domain packet
networks functioning as clients of optical networks.</t>
      <t>This document analyzes the scenario in which packet networks support
multi-domain TE paths. The optical networks may
consist of a DWDM network, an OTN network (without a DWDM layer), or a
multi-layer OTN/DWDM network. Additionally, DWDM networks can be either
fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the degree of standardization and identifying potential
gaps are crucial for evaluating the feasibility of integrating packet and
optical DWDM domains (with an optional OTN layer) from an end-to-end,
multi-vendor service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from Customer Edge (CE) to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>Per <xref target="RFC8309"/>, a network service provides
Connectivity between customer sites and the Internet or between
customer sites across the operator's network and across
the Internet. In the context of this document, a network service
is enabled by Provider Edge (PE) to PE configuration, including
both the network service layer (VRFs, RT import/export policies
configuration) and the network transport layer (e.g., RSVP-TE
Label Switched Paths (LSPs)). This includes the configuration
(on the PE side) of the interface towards the CE (e.g., VLAN, IP
address, routing protocol, etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>Short for "switching technology domain", defined as "region" in
<xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control
domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>Part of the network under the control of a single PNC instance. It is
subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Optical PNC (O-PNC):</dt>
          <dd>
            <t>A PNC controlling an optical network domain.</t>
          </dd>
          <dt>Packet PNC (P-PNC):</dt>
          <dd>
            <t>A PNC controlling a packet network domain.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A bidirectional link interface, as defined in <xref section="3.6.1" sectionFormat="of" target="RFC4397"/>.</t>
          </dd>
          <dt>makeLink:</dt>
          <dd>
            <t>A bidirectional data link, as defined in <xref section="3.5.1" sectionFormat="of" target="RFC4397"/>.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>A link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>A link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers, supported by two cross-technology Ethernet links
interconnected through an optical tunnel.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link connecting an Ethernet interface on an IP router to an
Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent
IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent
IP routers within the same P-PNC domain, supported by two
cross-technology Ethernet links interconnected through an optical tunnel.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document examines various deployment scenarios for Packet and
Optical Integration (POI), where the ACTN hierarchy is implemented to
manage a multi-technology, multi-domain network comprising two optical
domains and two packet domains, as illustrated in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, as defined in <xref target="RFC8453"/>, is utilized to manage
this multi-technology, multi-domain network. In this topology, each
Packet PNC (P-PNC) is responsible for controlling its respective packet
domain, while each Optical PNC (O-PNC) is tasked with managing its
optical domain. The packet domains controlled by the P-PNCs can represent
Autonomous Systems (ASes), as defined in <xref target="RFC1930"/>, or Interior
Gateway Protocol (IGP) areas within the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The Multi-Domain Service Coordinator (MDSC) is responsible for
orchestrating the entire multi-domain, multi-technology network,
encompassing both packet and optical domains. A standardized interface,
the Multi-Domain Service Coordinator to Provisioning Network Controller
Interface (MPI), enables the MDSC to interact with various Provisioning
Network Controllers (O-PNCs and P-PNCs).</t>
      <t>The MPI interface provides the MDSC with an abstracted topology,
concealing technology-specific details of the network and selectively
hiding topology information based on the chosen abstraction policy. The
level of abstraction is determined by the configuration parameters of the
P-PNC and O-PNC, such as offering potential connectivity information
between any Provider Edge (PE) and Border Router (BR) within a packet
network.</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries of the packet and optical domains are
congruent. In other words, each optical domain exclusively supports
connectivity between IP routers within a single packet domain.</t>
        </li>
        <li>
          <t>There are no physical links directly connecting optical domains.
Inter-domain physical links exist only under the following conditions:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links
within this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Scenarios using coherent optical interfaces on the IP routers are outside the scope of this document.</t>
      <t>This document analyzes scenarios in which all multi-technology IP links
supported by the optical network are intra-domain (intra-AS/intra-area),
such as PE-BR, PE-P, BR-P, and P-P IP links. Consequently, inter-domain
IP links are always single-technology connections, supported by
single-technology Ethernet links between physically adjacent IP routers.</t>
      <t>As described in <xref target="RFC7424"/>, in order to increase the bandwidth between two adjacent routers, multiple Ethernet links can be setup between adjacent routers using either Link Aggregation Groups (LAGs) <xref target="IEEE_802.1AX"/> or Equal Cost Multi-Path (ECMP) <xref target="RFC2991"/>.</t>
      <t>Therefore, if inter-domain links between optical domains exist, they
would be utilized to support multi-domain optical services, which fall
outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated
ROADM function with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or
without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for coordinating multiple
packet and optical domains in a multi-domain, multi-technology
environment. It facilitates multi-layer and multi-domain L2/L3 VPN
network services as requested by the Operational Support System/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service-related and network-related functions are combined into a
single, monolithic implementation. This implementation manages
end-customer service requests received through the Customer MDSC
Interface (CMI) and adapts the corresponding network models. An example
of this architecture is illustrated in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation may opt to separate the service-related and
network-related functions into distinct functional entities, as outlined
in <xref target="RFC8309"/> and Section 4.2 of <xref target="RFC8453"/>. In this approach, the
MDSC is decomposed into a top-level Service Orchestrator, which
interfaces with the customer through the Customer MDSC Interface (CMI),
and a Network Orchestrator, which interfaces southbound with the PNCs.
The interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation may choose to split the MDSC functions into a
"higher-level MDSC" (MDSC-H) and "lower-level MDSCs" (MDSC-Ls). The
MDSC-H is responsible for multi-technology coordination across packet and
optical domains, while the MDSC-Ls handle domain-specific coordination.
Specifically, an Optical MDSC-L manages multi-domain coordination between
the O-PNCs, and a Packet MDSC-L manages multi-domain coordination between
the P-PNCs. This approach is illustrated, for example, in Figure 9 of
<xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An alternative implementation may choose to integrate the MDSC and
P-PNC functions in a single entity.</t>
          </li>
        </ol>
        <t>In current service provider network deployments, the MDSC's Northbound
Interface (NBI) typically connects to an OSS/Orchestration layer rather
than a CNC. In this scenario, the MDSC is limited to performing Network
Orchestration functions, as described in <xref target="RFC8309"/> (point 2 above).
Consequently, the MDSC handles network service requests received from the
OSS and/or Orchestration.</t>
        <t>The functionality of the OSS and/or Orchestration layer, as well as its
interface with the MDSC, is typically operator-specific and falls outside
the scope of this draft. Therefore, this document assumes that the OSS
and/or Orchestration layer requests the MDSC to provision L2/L3 VPN
network services through mechanisms not covered in this document.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS and/or Orchestration  layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates these workflows to perform multi-layer and
multi-domain optimizations and/or maintenance activities (e.g., rerouting
LSPs and their associated services when a resource, such as a fiber, is
placed in maintenance mode during a maintenance window). Unlike service
fulfilment, these workflows are not triggered by a network service
provisioning request from the OSS or Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document examines use cases in which multi-layer coordination is
initiated by a network service request from the OSS and/or Orchestration
layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke
multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one
spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-Labeled Unicast (BGP-LU) (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document explores inter-domain TE options where the TE tunnel model,
as defined in <xref target="I-D.ietf-teas-yang-te"/>, applies at the MPI for both
intra-domain and inter-domain TE configurations. The assessment of
alternative options is beyond the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms are employed for inter-domain TE path
stitching. In the case of inter-domain SR-TE, a Segment Identifier (SID)
is used in Segment Routing (SR) to define a segment (a portion of the
path) within a network. A binding SID, a special type of SID, acts as a
reference to a precomputed SR policy or path.</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> employs technology-specific
local protection mechanisms, such as Fast Reroute (FRR) for MPLS-TE or
Topology Independent Loop-Free Alternate (TI-LFA) for SR-TE. These
mechanisms operate with an awareness of the multi-technology TE path
properties, such as the Shared Risk Link Group (SRLG) path properties defined in <xref target="RFC8001"/>.</t>
            </li>
          </ul>
          <t>For inter-domain TE paths, it is assumed that each packet domain in
<xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> employs the same TE technology. The
stitching between two domains is achieved using inter-domain TE
mechanisms.</t>
          <t>In this scenario, a key function of the MDSC is to identify the
multi-domain and multi-layer TE paths for carrying L2/L3 VPN traffic
between PEs in different packet domains. The MDSC then relays this
information to the P-PNCs to ensure that the forwarding tables of the PEs
(e.g., VRF) are correctly configured, allowing the L2/L3 VPN traffic to
be routed over the designated multi-domain and multi-layer TE paths.</t>
          <t>The selection of the TE path should consider both the TE requirements and
the binding requirements of the L2/L3 VPN network service.</t>
          <t>In general, the binding requirements for a network service (e.g., L2/L3 VPN)
depend on the service isolation requirements (e.g., as discussed in <xref section="8" sectionFormat="of" target="RFC9543"/>)
and can be categorized into three main cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The L2/L3 VPN is bound to a set of dedicated TE tunnels, which neither
share resources with other services, nor compete for bandwidth with
other tunnels, ensuring deterministic latency performance.</t>
            </li>
            <li>
              <t>The L2/L3 VPN is bound to a set of dedicated TE tunnels, which can
compete for bandwidth with other tunnels.</t>
            </li>
            <li>
              <t>The L2/L3 VPN is bound to a set of TE tunnels which can be shared with other services.</t>
            </li>
            <li>
              <t>The customer does not require isolation and may request a VPN service
where the associated tunnels are shared across multiple VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document examines scenarios in which a single TE path is used to
carry VPN traffic between PEs. Scenarios involving multiple parallel TE
paths for load-balancing VPN traffic between PEs are possible but are
beyond the scope of this document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When establishing a new TE path, the MDSC is responsible for coordinating
the path computation across multiple layers and domains.</t>
          <t>Based on the MDSC's knowledge of the underlying network topology and
configuration, there are three possible approaches for multi-layer and multi-domain path
computation:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC maintains an abstracted
TE topology view of all its packet and optical underlying domains.  </t>
              <t>
In this case, the MDSC lacks sufficient TE topology information to
perform multi-layer/multi-domain path computation. It delegates the
P-PNCs and O-PNCs to compute local paths within their respective
domains, then uses the returned information to compute the optimal
multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue for the P-PNC, as it lacks the ability
to perform single-domain/multi-layer path computation. It cannot
retrieve topology information from the O-PNCs or delegate optical path
computation to the O-PNCs. A possible solution is to include a CNC
function within the P-PNC to request the MDSC for multi-domain
optical path computation, as shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could involve relying on the MDSC recursive hierarchy,
as defined in Section 4.1 of <xref target="RFC8453"/>, where each IP and optical
domain pair has a "lower-level MDSC" (MDSC-L) for multi-layer
correlation, and a "higher-level MDSC" (MDSC-H) for multi-domain
coordination.  </t>
              <t>
In this case, the MDSC-H obtains an abstract view of the underlying
multi-layer domain topologies from its MDSC-L. Each MDSC-L gets the
full IP domain topology from the P-PNC and an abstracted view of the
optical domain topology from its O-PNC. Topology abstraction occurs
at the MPIs between MDSC-L and O-PNC, as well as between MDSC-L and
MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC can then only perform multi-domain/single-layer path
computation for the packet layer, where the path can be computed
optimally for the two packet domains.  </t>
              <t>
The MDSC still needs to delegate the O-PNCs to perform local path
computation within their domains. It uses the information from the
O-PNCs and its TE topology view of the multi-domain packet layer to
perform multi-layer/multi-domain path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such a case, the MDSC has all the information needed to perform
multi-domain/multi-layer path computation without relying on PNCs.  </t>
              <t>
This approach, however, may present scalability issues. As discussed
in
Section 2.2 of <xref target="I-D.ietf-teas-yang-path-computation"/>, performing
path
computation for optical networks in the MDSC is particularly
challenging,
as optimal paths also depend on vendor-specific optical attributes,
which may vary across domains if provided by different vendors.</t>
            </li>
          </ol>
          <t>This document examines scenarios where the MDSC adopts the partial
summarization approach to enable multi-domain and multi-layer path
computation.</t>
          <t>Typically, O-PNCs are responsible for optical path computation within
their respective domains. When setting up a network service, they must
consider connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may impact the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>,
used by the O-PNC for optical path computation, are not exposed at the
MPI and therefore are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an
IGP area or an Autonomous System (AS) within the same operator network,
is controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for establishing TE paths between any two PEs
or BRs within their controlled domains, as requested by the MDSC. They
also provide topology information to the MDSC to enable efficient
network coordination.</t>
        <t>For example, in inter-domain SR-TE, setting up a bidirectional
SR-TE path from PE13 in Domain 1 to PE23 in Domain 2, as shown in
<xref target="fig-vpn-path"/>, requires the MDSC to coordinate the following actions:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1: Push a SID list to PE13, including the Binding SID
associated with the SR-TE path in Domain 2, with PE23 as the target
destination (forward direction).</t>
          </li>
          <li>
            <t>P-PNC2: Push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1, with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are responsible for the
following:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer, single-domain local TE path computation,
when requested by the MDSC, between two PEs (for single-domain
end-to-end TE path) or between PEs and BRs for an inter-domain TE
path selected by the MDSC.</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
for the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting a new TE path setup, the MDSC provides the P-PNCs
with the explicit path to be created or modified. In other words, the
MDSC communicates the complete list of nodes involved in the path
(strict mode). The P-PNC is then responsible for setting up the
explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide the P-PNC
with a loose path and per-domain TE constraints. The P-PNC can then
select the complete path within its domain.</t>
        <t>In this case, the P-PNC must signal back to the MDSC which path it has chosen, allowing the MDSC to track relevant resource utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC
touches PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two
paths with the same topology metric, e.g., BR21 - P24 - PE23 and
BR21 - BR22 - PE23, but with different loads. It may prefer to steer
traffic on the latter as it is less loaded.</t>
        <t>For the purposes of this document, it is assumed that the MDSC always
provides the explicit list of all hops to the P-PNCs to set up or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination
is handled by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>Provide the MDSC with an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation when requested by
the MDSC;</t>
          </li>
          <li>
            <t>Perform optical tunnel set up when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by the O-PNC to perform intra-domain topology
discovery and path setup are typically vendor-specific and outside
the scope of this document.</t>
        <t>Depending on the optical network type, TE topology abstraction, path
computation, and path setup can be single-layer (either OTN or DWDM)
or multi-layer OTN/DWDM. In the latter case, multi-layer coordination
between the OTN and DWDM layers is handled by the O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all MPI
interfaces between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation from <xref target="RFC7951"/>, is assumed to be used at these
interfaces. Additionally, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to comply with the Network Management Datastore
Architecture (NMDA) from <xref target="RFC8342"/>, are assumed to be used at
these MPI and MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models applicable to the Packet
and Optical MPIs. Some of these YANG data models may be optional,
depending on the specific network configuration detailed in
<xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module
defined in <xref target="RFC8525"/> is used to allow the MDSC to discover the
set of YANG modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology"
YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>, which augments the TE
Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the
"ietf-flexi-grid-topology" YANG module of
<xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid, and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC can use the following client signal YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service"
YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the
"ietf-eth-tran-service" YANG module of
<xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet"
YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the
generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments
the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of
<xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping"
YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface. The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are key extensions enabling the use of
PCE/PCEP for ACTN.</t>
        <t>Since PCEP supports path computation in both packet and optical
networks, it is well-suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> outlines H-PCE applicability for
inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that PCEP can be used in conjunction with the YANG data models
described in the rest of this document. Depending on whether ACTN is
deployed in a greenfield or brownfield, two options are possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface to each PNC to
discover all TE information and request TE tunnels. It may perform
full multi-layer path computation or delegate path computation to
the underlying PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. Only one type of
interface (RESTCONF) is needed, using the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a
single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MDSC needs to discover the underlying PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of the equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest-level link termination points (LTPs) in
the topology view and corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and
<xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM node).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for
MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the
ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layer alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example, a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in
<xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs,
the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in
<xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: one CBR client LTP is
reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>
for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is
reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the
O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is
reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X
and Y are
used to associate the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In the case of a multi-layer DWDM/OTN network domain, multi-layer
intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in
<xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based
or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>,
associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link, and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in
<xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used to report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of
<xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship
between the IP network
topology and the MPLS-TE network topology depend on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain
network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links,
inter-domain
Ethernet links or access links, as described in detail in
<xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as Link Layer Discovery Protocol (LLDP)
<xref target="IEEE_802.1AB"/>, which are outside the scope of this document, and
reported at the MPIs within the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>This document assumes that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet
technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a
gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/>
should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in
one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an IP domain and an adjacent
optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an
inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are
discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>A more detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of
<xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other link discovery options are possible but not described in this
document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the
encoding of the plug-id namespace and the specific LLDP information
reported within the plug-id value, such as the Chassis ID and Port ID
mandatory TLVs, is implementation-specific and needs to be consistent
across all PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers, making it more viable for
inter-domain Ethernet links. For cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable when
possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>,
and the optical nodes snoop the LLDP packets received from the local
Ethernet interface and report the extracted information, such as the
Chassis ID, Port ID, and System Name TLVs, to the O-PNCs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and do not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching
the plug-id values of the two LTPs reported by adjacent O-PNC and
P-PNCs. In case LLDP snooping is used, the P-PNC reports the LLDP
information sent by the corresponding Ethernet interface on the IP
router, while the O-PNC reports the LLDP information received by the
corresponding Ethernet interface on the optical node, e.g., between
LTP 5-0 on PE13 and LTP 7-0 on NE11, as shown in
<xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating
a cross-technology Ethernet link is reported by an O-PNC in the
Ethernet topology, the OTN topology model, or both, depending on the
type of corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet
links is based solely on the LLDP information sent by the Ethernet
interfaces of the routers and snooped by the Ethernet interfaces of
the optical nodes. Therefore, the MDSC can discover these links even
before optical paths, supporting overlay multi-technology IP links,
are set up.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link supporting an
inter-domain IP link by matching the plug-id values of the two
Ethernet LTPs reported by adjacent P-PNCs. The P-PNCs report the
LLDP information being sent and received from the corresponding
Ethernet interfaces, e.g., between Ethernet LTP 3-1 on BR11 and
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology
Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface
on an IP router terminates a cross-technology Ethernet link or an
inter-domain Ethernet link, it must report at the MPI two Ethernet
LTPs representing the same Ethernet interface, e.g., both Ethernet
LTP 3-0 and Ethernet LTP 3-1, supported by LTP 3-0, as shown in
<xref target="fig-inter-domain-link"/>.</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) represents the physical adjacency between
the Ethernet interface on an IP router and the Ethernet interface on
its physically adjacent node. This node can be either an IP router
(in the case of a single-technology Ethernet link) or an optical node
(in the case of a cross-technology Ethernet link). Therefore, as
described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information sent
by the corresponding Ethernet interface on the IP router, such as
{BR11,3} and {BR21,4} plug-id values reported by the Ethernet LTP
3-0 on BR11 and the Ethernet LTP 4-0 on BR21, as shown in
<xref target="fig-inter-domain-link"/>.</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g.,
LTP 3-0 in BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to
discover the logical adjacency between Ethernet interfaces on IP routers,
which can be either single-technology or multi-technology. Therefore,
the P-PNC reports, within the plug-id attribute of this LTP, the LLDP
information sent and received by the corresponding Ethernet interface
on the IP router, such as the {BR11,3,BR21,4} plug-id values reported
by the Ethernet LTP 3-1 on BR11 and the Ethernet LTP 4-1 on BR21, as
shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in the case of inter-domain Ethernet links,
the MDSC cannot discover, using the LLDP information reported in the
plug-id attributes, the physical adjacency between two Ethernet
interfaces on physically adjacent IP routers, because these plug-id
values do not match, such as the {BR11,3} and {BR21,4} plug-id values
shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms outside the scope of this document, that the Ethernet
interfaces on the IP routers either terminate a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit to report the physical Ethernet LTPs when it
knows, through mechanisms outside the scope of this document, that
the corresponding Ethernet interfaces terminate inter-domain Ethernet
links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs supported by the two Ethernet LTPs terminating an inter-domain
Ethernet link, discovered as described in
<xref target="ip-inter-domain-link-discovery"/>,
e.g., between IP LTP 3-2 on BR21 and IP LTP 4-2 on BR22, supported
respectively by Ethernet LTP 3-1 on BR11 and Ethernet LTP 4-1 on BR21,
as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting
multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in
<xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The Ethernet interface 5 on the P13 router is terminating two Ethernet
abstract links:</t>
        <ul spacing="normal">
          <li>
            <t>The multi-technology intra-domain Ethernet link between logical
Ethernet LTP 5-1 on PE13 and the logical Ethernet LTP 6-1 on BR11;</t>
          </li>
          <li>
            <t>The cross-technology Ethernet link, which is supporting that
multi-technology intra-domain Ethernet link, between the physical
Ethernet LTPs 5-0 on PE13 and the physical Ethernet LTP 7-0 on the
optical NE11.</t>
          </li>
        </ul>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in
<xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the
multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0
on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in
<xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology
intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels
support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in the case of intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency between
two Ethernet interfaces on physically adjacent IP routers, because
the plug-id values do not match, such as {PE13,1} and {P16,2}, as shown
in <xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical
intra-domain Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0
on P16, as shown in <xref target="fig-intra-domain-link"/>, if it knows a priori,
using mechanisms outside the scope of this document, that all Ethernet
interfaces on the IP routers terminate either a cross-technology or
single-technology (intra-domain or inter-domain) Ethernet link, e.g.,
as shown in <xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
through mechanisms outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of LAG groups within its
domain and report each intra-domain LAG as an Ethernet bundle link
within the Ethernet topology exposed at the MPI.</t>
        <t>This is done by bundling multiple single-domain Ethernet links, as
shown in <xref target="fig-lag"/>. For example, the Ethernet bundled link between
Ethernet LTP 5-1 on BR21 and Ethernet LTP 6-1 on P24 is built from
the Ethernet links set up respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and
multi-technology intra-domain LAG links are the same, with the only
difference being whether the bundled links are single-technology or
multi-technology.</t>
        <t>However, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document, as they do not imply cross-technology
coordination
between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the
P-PNC to discover the configuration of LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>It is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP can be
configured on a LAG group (Aggregated Port) and/or on any number of its
LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP
session
configured at LAG member (Aggregation Port) level and another one for
the LLDP session configured at LAG group (Aggregated Port) level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in
<xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP
session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the
multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined
in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry
the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>There are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and
<xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but does not have enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>, and
that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 does not have enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay
optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
          </ul>
        </li>
        <li>
          <t>a new multi-domain TE path needs to be setup between PE13 and
PE23, e.g., either because existing TE paths between PE13 and
PE23 are not able to meet the TE and binding requirements of
the L2/L3 VPN service or because there is no TE path between
PE13 and PE23.</t>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial
summarization, the MDSC will use the TE topology information provided
by the P-PNCs and the results of the path computation requests sent to
the O-PNCs, as described in <xref target="optical-path-computation"/>, to compute
the multi-layer/multi-domain path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When setting up the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration needed to realize the requested
network service across the appropriate optical and packet domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in
<xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of ECMP, between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to set up a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain the
new TE path to use the underlay optical tunnel setup between BR21 and
P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to set up the requested path and returns
the information needed for multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC2, knowing the node and adjacency SIDs
assigned within its domain, can install the proper SR policy or
hierarchical policies within BR21 and return to the MDSC the binding
SID assigned to this policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to set up a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain the new TE path
to use the underlay optical tunnel setup between PE13 and BR11,
specifying which inter-domain link should be used to send traffic to
BR21 and the information for multi-domain TE path stitching, as
described in <xref target="te-path-discovery"/> (e.g., in inter-domain SR-TE, the
binding SID assigned by P-PNC2 to the corresponding SR policy in BR21).
The P-PNC1 properly configures the routers within its domain to set up
the requested path and the multi-domain TE path stitching. For example,
in inter-domain SR-TE, the P-PNC1, knowing the node and adjacency SIDs
assigned within its domain and the PE SID assigned by P-PNC1 to the
inter-domain link between BR11 and BR21, along with the binding SID
assigned by P-PNC2, installs the proper policy or policies within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, set up or modified,
the MDSC can request both P-PNCs to configure the L3VPN and its binding
with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, optical path
computation is usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate single-domain optical path computation to the O-PNC.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/>,
and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its underlay
optical tunnel. Therefore, the properties of an optical path between
two optical TTPs, as computed by the O-PNC, can be used by the MDSC to
infer the properties of the associated multi-layer single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two
options to request an O-PNC to perform optical path computation: either
via a "compute-only" TE tunnel path, using the generic TE tunnel YANG
data model defined in <xref target="I-D.ietf-teas-yang-te"/>, or via the path
computation RPC defined in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one
relationship between a multi-technology intra-domain IP link and its
underlay optical tunnel.</t>
        <t>Therefore, to set up a new multi-technology intra-domain IP link,
the MDSC requires the O-PNC to set up the optical tunnel (using either
the WDM Tunnel model or the OTN Tunnel model, if optional OTN switching
is supported) within the optical network and steer client traffic
between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based transport)
or the Transparent CBR Client Signal Model (for transparent transport).</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request O-PNC1 to set up an optical tunnel between optical
TTPs (7) on NE11 and (8) on NE12 and steer client traffic over this
tunnel between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of
<xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been set up and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, outside
the scope of this document, are used between the adjacency of the two
IP routers' ports, the P-PNC can automatically discover the underlay
multi-technology single-domain Ethernet link set up by the MDSC and
report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if no automatic discovery mechanisms are used, the MDSC
can configure this multi-technology single-domain Ethernet link at
the MPI of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., LTP 5-1 on
PE13 and 6-1 on BR11, as shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been
configured by the MDSC or discovered by the P-PNC, the corresponding
multi-technology single-domain IP link can also be configured either
by the MDSC or the P-PNC.</t>
        <t>This document assumes that the IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology
single-domain Ethernet link is either discovered by the P-PNC or
configured by the MDSC at the MPI. However, if LAG is supported, the
P-PNC lacks enough information to determine whether the discovered or
configured multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs, and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All other configuration is
provided by the P-PNC.</t>
        <t>For example, with reference to <xref target="fig-multi-technology-link-2"/>, the
MDSC can request P-PNC1 to set up a multi-technology single-domain
IP link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11, supported
by the multi-technology single-domain Ethernet link between ETH LTP
5-1 on PE13 and ETH LTP 6-1 on BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain
IP link and, once finished, reports it to the MDSC within the IP
topology exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates a new Ethernet bundled link at the MPI (using the
bundled-link container defined in <xref target="RFC8795"/>), bundling the
multi-technology single-domain Ethernet link(s) being created, as
described above.</t>
          <t>When a new LAG link is created, it is recommended to configure the
minimum number of active member links required to consider the LAG
link as up. For example, a LAG link with three members can be
considered up when only one member link fails and down when at least
two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>
and is identified as a gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to set up an Ethernet bundled link between Ethernet LTP 5-1 on
BR21 and Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between Ethernet LTP 1-1 on BR21 and
Ethernet LTP 2-1 on P24.</t>
          <t>It is also worth noting that the MDSC needs to create the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology
single-domain IP link, supported by the just configured Ethernet
bundled link, following the same procedure described in
<xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP
5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates the configuration of an existing Ethernet bundled link at the
MPI, adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as up
may also need to be updated.</t>
          <t>For example, with reference to <xref target="fig-lag"/>, the MDSC can request
P-PNC2 to add the multi-technology single-domain Ethernet link set up
between Ethernet LTP 3-1 on BR21 and Ethernet LTP 4-1 on P24 to the
existing Ethernet bundle link set up between Ethernet LTP 5-1 on node
BR21 and Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also update
the bandwidth information of the multi-technology single-domain IP link
supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties
of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC
and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to
ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This document assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the
<xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to set it up,
properly specifying the path constraints, such as the explicit path,
to ensure the P-PNC sets up a TE path that meets the end-to-end TE
and binding constraints and uses the optical tunnels set up by the
MDSC to support this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of
both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the
<xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the
P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model
supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms.
For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case
of MPLS-TE domain or the TI-LFA local protection, as defined in
<xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The
mechanisms to request the configuration TI-LFA local protection for SR-TE
paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG
models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection
configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of
MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain
IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services, and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list
of TE tunnel(s) that should be used to forward L2/L3 VPN traffic
between the two PEs terminating the listed TE tunnel(s). If the list
contains more than one TE tunnel for the same pair of PEs, these TE
tunnels are used to load balance the associated L2/L3 VPN traffic
between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic between multiple TE
tunnels for the same PE pair in a way other than load balancing is
identified as a gap requiring further work and is outside the scope
of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document shows that the IETF YANG models
described in <xref target="yang"/> provide useful support for Packet Optical Integration
(POI) scenarios for resource discovery (network topology, service,
tunnels, and network inventory discovery), as well as for supporting
multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>The following gaps were identified that may need to be addressed by
the relevant IETF Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in
<xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks:
this gap has been
identified in <xref target="optical-path-computation"/> and the solution in
<xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links
and the
UNI topology discovery mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of
<xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in
<xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that being
able to use WSON and Flexi-grid topology models together (through
multi-inheritance) is not only useful for mixed fixed-grid and
flexible-grid DWDM network topologies but also the only viable option
for a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would also support optical tunnel setup in the case
of a mixed CWDM and DWDM network topology.</t>
      <t>Although not analyzed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs enhancement
to support scenarios where multiple parallel TE paths are used in
load-balancing to carry traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESTCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to
discover the intra-domain Ethernet and IP links. While LLDP provides
valuable information for network management and troubleshooting, it also
presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP
packets could be captured using a packet sniffer. An attacker can
leverage this information to gain insights into the network topology,
device types, and configurations, which could be used for further
attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device
types, software versions, and network configuration details. This might
help an attacker identify vulnerable devices or configurations that can
be exploited to gain unauthorized access or escalate privileges within
the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device,
they could manipulate LLDP information to advertise false device
information, leading to potential misconfigurations or trust
relationships being exploited. This can disrupt network operations or
redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP
packets, an attacker could overwhelm network devices or management
systems, potentially leading to a denial of service where legitimate
network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other
network devices. Potentially, this might lead to incorrect network
mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for
authenticating the source of LLDP messages, which means that devices
accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement
several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing
untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who
can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify
unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known
vulnerabilities that could be exploited through information gathered via
LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for
automating the management and control of multi-layer Service Providers'
transport networks, combining the optical and microwave transport layer
with the packet (IP/MPLS) layer to create a more efficient and scalable
network infrastructure. This approach is particularly beneficial for
Service Providers and large enterprises dealing with high bandwidth
demands and looking for cost-effective ways to expand their networks.
However, integrating these two traditionally separate network layers
involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of
integration between the packet and optical layers is critical.
Furthermore, this includes determining whether to pursue a loose
integration (keeping layers distinct but coordinated) or a tight
integration (combining layers more closely, potentially at the hardware
level) coordinated via the MDSC. Accurate forecasting and planning will
also be essential to ensure that the integrated ACTN infrastructure can
handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various
vendors. Ensuring that packet and optical devices can interoperate
seamlessly and the PNCs can manage them is crucial for a successful
integration. The Service Provider must also check with the vendors to
ensure they support the IETF-based technologies outlined in this
document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require
comprehensive monitoring solutions that can provide visibility to the
PNCs across both packet and optical layers. Identifying and diagnosing
issues may become more complex with integrated layers. Telemetry data may
also be required to collect lower-layer networking health and consider
network and service performance. This topic is further discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient,
including considerations for automatic protection switching and fast
reroute mechanisms that span both layers. Fault isolation and recovery
may become more challenging, as issues in one layer can have cascading
effects on the other. Effective fault management strategies must be in
place to quickly identify and rectify such issues. This topic is further
discussed in <xref target="I-D.poidt-teas-actn-poi-assurance"/>;</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths, and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="28" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-43"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-26"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu Shah" initials="H." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-18"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="RFC4397">
          <front>
            <title>A Lexicography for the Interpretation of Generalized Multiprotocol Label Switching (GMPLS) Terminology within the Context of the ITU-T's Automatically Switched Optical Network (ASON) Architecture</title>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>Generalized Multiprotocol Label Switching (GMPLS) has been developed by the IETF to facilitate the establishment of Label Switched Paths (LSPs) in a variety of data plane technologies and across several architectural models. The ITU-T has specified an architecture for the control of Automatically Switched Optical Networks (ASON).</t>
              <t>This document provides a lexicography for the interpretation of GMPLS terminology within the context of the ASON architecture.</t>
              <t>It is important to note that GMPLS is applicable in a wider set of contexts than just ASON. The definitions presented in this document do not provide exclusive or complete interpretations of GMPLS concepts. This document simply allows the GMPLS terms to be applied within the ASON context. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4397"/>
          <seriesInfo name="DOI" value="10.17487/RFC4397"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7424">
          <front>
            <title>Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks</title>
            <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="A. Ghanwani" initials="A." surname="Ghanwani"/>
            <author fullname="N. So" initials="N." surname="So"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Demands on networking infrastructure are growing exponentially due to bandwidth-hungry applications such as rich media applications and inter-data-center communications. In this context, it is important to optimally use the bandwidth in wired networks that extensively use link aggregation groups and equal-cost multipaths as techniques for bandwidth scaling. This document explores some of the mechanisms useful for achieving this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7424"/>
          <seriesInfo name="DOI" value="10.17487/RFC7424"/>
        </reference>
        <reference anchor="RFC2991">
          <front>
            <title>Multipath Issues in Unicast and Multicast Next-Hop Selection</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next-hop should be used for a given data packet. This memo summarizes current practices, problems, and solutions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2991"/>
          <seriesInfo name="DOI" value="10.17487/RFC2991"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for a Wavelength Switched Optical Network (WSON), while it is known
   as Impairment-Aware Routing and Spectrum Assignment (IA-RSA) for a
   Spectrum Switched Optical Network (SSON).

   This document provides a YANG data model for the impairment-aware
   Traffic Engineering topology (TE topology) in optical networks.  It
   augments the technology agnostic YANG Data Model for TE topologies.
   The topology YANG model provides read-only topology data including
   optical impairments that can be used for example by a Path
   Computation Engine (PCE) for calculating an optically feasible path
   for a new connection before it is established through an optical
   network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-23"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8001">
          <front>
            <title>RSVP-TE Extensions for Collecting Shared Risk Link Group (SRLG) Information</title>
            <author fullname="F. Zhang" initials="F." role="editor" surname="Zhang"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="C. Margaria" initials="C." surname="Margaria"/>
            <author fullname="M. Hartley" initials="M." surname="Hartley"/>
            <author fullname="Z. Ali" initials="Z." surname="Ali"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides extensions for Resource Reservation Protocol - Traffic Engineering (RSVP-TE), including GMPLS, to support automatic collection of Shared Risk Link Group (SRLG) information for the TE link formed by a Label Switched Path (LSP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8001"/>
          <seriesInfo name="DOI" value="10.17487/RFC8001"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="15" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-10"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="2" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-19"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-06"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="1" month="December" year="2025"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-24"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="4" month="February" year="2026"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-17"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="1" month="March" year="2026"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-04"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu Shah" initials="H." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="12" month="October" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-18"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE-centric Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document describes how profiles of the Topology YANG data model,
   defined in RFC8795, can be used to address applications in Traffic
   Engineering aware (TE-aware) deployments, irrespective of whether
   they are TE-centric or not.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-05"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="12" month="February" year="2025"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-21"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-14"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-08"/>
        </reference>
        <reference anchor="I-D.poidt-teas-actn-poi-assurance">
          <front>
            <title>Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) for Packet Optical Integration (POI) service assurance</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Paolo Volpato" initials="P." surname="Volpato">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Prasenjit Manna" initials="P." surname="Manna">
              <organization>Cisco</organization>
            </author>
            <date day="26" month="February" year="2025"/>
            <abstract>
              <t>   This document extends the analysis of the applicability of
   Abstraction and Control of TE Networks (ACTN) architecture to Packet
   Optical Integration (POI) to cover multi-layer service assurance
   scenarios.  Specifically, the ACTN architecture enables the detection
   and handling of different failures that may happen either at the
   optical or the packet layer.  It is assumed that the underlying
   transport optical network carries end-to-end IP services such as
   L2VPN or L3VPN connectivity services, with specific Service Level
   Agreement (SLA) requirements.

   Existing IETF protocols and data models are identified for each
   multi-layer (packet over optical) service assurance scenario with a
   specific focus on the MPI (Multi-Domain Service Coordinator to
   Provisioning Network Controllers Interface) in the ACTN architecture.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-poidt-teas-actn-poi-assurance-05"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2629?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Access, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can
request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually
operator-specific, typically it would be using a RESTCONF/YANG interface
with a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between
the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in
<xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and
<xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from an
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model
<xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must request to reroute IP traffic before the event takes place. It should</t>
          <t>be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the
link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after
checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port
with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has
been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let us assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since an IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the transponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are
vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not
provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>The authors would like to thank Young Lee for his valuable input on the initial discussions which have triggered this work as well as for his contribution to the first drafts of this document.</t>
      <t>The authors would like to thank Adrian Farrel for his review and comments to this document.</t>
      <t>Previous versions of document were prepared using
2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Zheng" fullname="Yanlei Zheng">
        <organization>China Unicom</organization>
        <address>
          <email>zhengyanlei@chinaunicom.cn</email>
        </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Nvidia</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
