<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-boucadair-nmop-rfc3535-20years-later-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="RFC 3535, 20 Years Later">RFC 3535,  20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling</title>
    <seriesInfo name="Internet-Draft" value="draft-boucadair-nmop-rfc3535-20years-later-04"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis Miguel Contreras Murillo">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.co</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <author fullname="Reshad Rahman">
      <organization>Equinix</organization>
      <address>
        <email>rrahman@equinix.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="22"/>
    <keyword>network management</keyword>
    <keyword>future networks</keyword>
    <abstract>
      <?line 50?>

<t>The IAB has organized an important workshop
to establish a dialog between network operators and
protocol developers, and to guide the IETF focus on work
regarding network management.  The outcome of that workshop
was documented in the "IAB Network Management Workshop" (RFC 3535)
which was instrumental for developing NETCONF and YANG, in particular.</t>
      <t>20 years later, it is time to evaluate what has been achieved since then and
identify the operational barriers for making these
technologies widely implemented. Also, this document intends to capture new
requirements for network management operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/rfc3535-20years-later"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IAB has organized a workshop (June 4-June 6, 2002)
to establish a dialog between network operators and
protocol developers, and to guide the IETF focus on work
regarding network management.  The outcome of that workshop
was documented in the "IAB Network Management Workshop" <xref target="RFC3535"/>
which was instrumental for developing NETCONF <xref target="RFC6241"/>, YANG <xref target="RFC6020"/><xref target="RFC7950"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <t>20 years later, new requirements on network management operations are emerging from the operators. This document intends to capture these requirements that reflect the progress in this area. The document also provide an assessment of the RFC3535 recommendations and to what extend that roadmap was driving network management efforts within the IETF.</t>
      <t>Early version of the document includes <strong>many placeholders on purpose</strong> as the intent is to collect inputs from interested parties. Items listed in <xref target="sec-obs"/> are provided to exemplify candidate items to discuss in that section.</t>
    </section>
    <section anchor="summary-of-technology-advances-since-rfc-3535">
      <name>Summary of Technology Advances Since RFC 3535</name>
      <t>To be further elaborated:</t>
      <ul spacing="normal">
        <li>
          <t>NETCONF <xref target="RFC6241"/></t>
        </li>
        <li>
          <t>YANG <xref target="RFC7950"/></t>
        </li>
        <li>
          <t>RESTCONF  <xref target="RFC8040"/></t>
        </li>
        <li>
          <t>SDN &amp; Programmable Networks <xref target="RFC7149"/><xref target="RFC7426"/></t>
        </li>
        <li>
          <t>Automation <xref target="RFC8969"/></t>
        </li>
        <li>
          <t>Virtualization <xref target="RFC8568"/></t>
        </li>
        <li>
          <t>Containerization <xref target="I-D.ietf-bmwg-containerized-infra"/></t>
        </li>
        <li>
          <t>Intent-based <xref target="RFC9315"/></t>
        </li>
        <li>
          <t>Network APIs</t>
        </li>
        <li>
          <t>Telemetry <xref target="RFC9232"/></t>
        </li>
        <li>
          <t>JSON Encoding of Data Modeled with YANG <xref target="RFC7951"/></t>
        </li>
        <li>
          <t>CoAP Management Interface (CORECONF) <xref target="I-D.ietf-core-comi"/></t>
        </li>
        <li>
          <t>YANG to CBOR mapping <xref target="RFC9254"/></t>
        </li>
        <li>
          <t>YANG Schema Item iDentifier (YANG SID) <xref target="I-D.ietf-core-sid"/></t>
        </li>
      </ul>
      <t>See also "An Overview of the IETF Network Management Standards" <xref target="RFC6632"/>.</t>
    </section>
    <section anchor="assessment-of-rfc-3535-operator-requirements">
      <name>Assessment of RFC 3535 Operator Requirements</name>
      <t><xref section="3" sectionFormat="of" target="RFC3535"/> includes the following recommendations:</t>
      <ul spacing="normal">
        <li>
          <t>TBC</t>
        </li>
      </ul>
    </section>
    <section anchor="assessment-of-rfc-3535-recommendations">
      <name>Assessment of RFC 3535 Recommendations</name>
      <t><xref section="6" sectionFormat="of" target="RFC3535"/> includes the following recommendations:</t>
      <ol spacing="normal" type="1"><li>
          <t>The workshop recommended that the IETF stop forcing working groups
to provide writable MIB modules.  It should be the decision of
the working group whether they want to provide writable objects
or not.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>In 2014, the IESG published a statement Writable MIB Module, which states that:
</t>
              <ul empty="true">
                <li>
                  <t>SNMP MIB modules creating and modifying configuration state should only be produced by working groups in cases of clear utility and consensus to use SNMP
 write operations for configuration, and in consultation with the OPS ADs/MIB doctors.</t>
                </li>
              </ul>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop recommended that a group be formed to investigate why
current MIB modules do not contain all the objects needed by
operators to monitor their networks.  </t>
          <t><strong>Status Update</strong>: xxx</t>
        </li>
        <li>
          <t>The workshop recommended that a group be formed to investigate why
the current SNMP protocol does not satisfy all the monitoring
requirements of operators.  </t>
          <t><strong>Status Update</strong>: xxx</t>
        </li>
        <li>
          <t>The workshop recommended, with strong consensus from both protocol
developers and operators, that the IETF focus resources on the
standardization of configuration management mechanisms.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>NETCONF <xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>, CORECONF <xref target="I-D.ietf-core-comi"/>, YANG.</t>
            </dd>
            <dt/>
            <dd>
              <t>YANG is a transport-independent data modeling language. It can be used independently of NETCONF/RESTCONF. For example, YANG can be used to define abstract data structures <xref target="RFC8791"/> that can be manipulated by other protocols (e.g., <xref target="RFC9132"/>).</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop recommended, with strong consensus from the operators
and rough consensus from the protocol developers, that the
IETF/IRTF should spend resources on the development and
standardization of XML-based device configuration and management
technologies (such as common XML configuration schemas, exchange
protocols and so on).  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>OK. This recommendation was also mirrored in other documents such as <xref target="RFC5706"/>.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop recommended, with strong consensus from the operators
and rough consensus from the protocol developers, that the
IETF/IRTF should not spend resources on developing HTML-based or
HTTP-based methods for configuration management.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>The IETF deviated from this recommendation, e.g., RESTCONF <xref target="RFC8040"/> or CoAP Management Interface (CORECONF) <xref target="I-D.ietf-core-comi"/>.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop recommended, with rough consensus from the operators
       and strong consensus from the protocol developers, that the IETF
       should continue to spend resources on the evolution of the
       SMI/SPPI data definition languages as being done in the SMIng
       working group.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>SMIng WG was concluded in 2003-04-04.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop recommended, with split consensus from the operators
       and rough consensus from the protocol developers, that the IETF
       should spend resources on fixing the MIB development and
       standardization processs.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>The IETF dedicated some resources to fix some SNMP shortcomings with a focus on security (e.g., Transport Layer Security (TLS) Transport Model for the SNMP <xref target="RFC6353"/> or <xref target="RFC9456"/>, HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3 <xref target="RFC7860"/>).</t>
            </dd>
          </dl>
        </li>
      </ol>
      <t><xref section="6" sectionFormat="of" target="RFC3535"/> also includes the following but without tagging them as recommendations:</t>
      <ol spacing="normal" type="1"><li>
          <t>The workshop had split consensus from the operators and rough
consensus from the protocol developers, that the IETF should not
focus resources on CIM extensions.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>The IETF didn't dedicate any resources on CIM extensions.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop had rough consensus from the protocol developers
that the IETF should not spend resources on COPS-PR development.
So far, the operators have only very limited experience with
COPS-PR.  In general, however, they felt that further development
of COPS-PR might be a waste of resources as they assume that
COPS-PR does not really address their requirements.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>The IETF has reclassified COPS Usage for Policy Provisioning <xref target="RFC3084"/>
to Historic status.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>The workshop had rough consensus from the protocol developers
that the IETF should not spend resources on SPPI PIB definitions.
The operators had rough consensus that they do not care about
SPPI PIBs.  </t>
          <dl>
            <dt><strong>Status Update</strong>:</dt>
            <dd>
              <t>The IETF has reclassified Structure of Policy Provisioning Information <xref target="RFC3159"/>, as well as
three Policy Information Bases (<xref target="RFC3317"/>, <xref target="RFC3318"/>, and <xref target="RFC3571"/>) to
Historic status.</t>
            </dd>
          </dl>
        </li>
      </ol>
    </section>
    <section anchor="sec-obs">
      <name>Some Observations</name>
      <section anchor="fragmented-ecosystem">
        <name>Fragmented Ecosystem</name>
        <t>The current YANG device models ecosystem is <strong>fragmented</strong>: some
standards models are defined in the IETF while similar ones are
defined in other fora such as Openconfig or ONF. Unlike service and
network models, IETF-defined device models are not widely
implemented. There is a need to rationalize this space and
avoid redundant efforts.</t>
      </section>
      <section anchor="lack-of-profiling">
        <name>Lack of Profiling</name>
        <t>Many NETCONF-related features are (being) specified by the IETF,
but these features are not widely supported (e.g., Push). Editing a
profile document with a set of recommendations about core/key
features with the appropriate justification will help the
emergence of more implementations that meet the operators’
needs.</t>
        <ul empty="true">
          <li>
            <t>Examples of such profile documents are the various RFCs that were published by the behave WG <xref target="BCP127"/>.
Another approach is to consider an approach similar to the "Roadmap for Transmission Control Protocol (TCP) Specification Documents" <xref target="RFC7414"/>. Such a document
would serve as a guide and reference for implementers and any other parties who desire information contained in the 'NETCONF/RESTCONF/YANG'-related RFCs.</t>
          </li>
        </ul>
        <t>Likewise, reassess the value of some IETF proposals vs. competing/emerging solutions would be useful (e.g., gRPC vs. YANG-Push).</t>
      </section>
      <section anchor="lack-of-agile-process-for-the-maintenance-of-yang-modules">
        <name>Lack of Agile Process for (The Maintenance of) YANG Modules</name>
        <t>RFCs might not be suited for documenting YANG modules (it takes much too long, especiallly for updates). In the meantime, there is a need for
"reference models" and "sufficiently stable models". An
hybrid approach might be investigated for documenting IETF-
endorsed YANG modules, such as considering an RFC to
describe the initial module sketch and objectives and an
official IETF repository for maintaining intermediate YANG
versions.</t>
      </section>
      <section anchor="integration-complexity">
        <name>Integration Complexity</name>
        <t><xref section="3" sectionFormat="of" target="RFC3535"/> describes a set of network operator requirements. One of the requirements is the ease of use which, according to <xref section="3.2" sectionFormat="of" target="RFC6244"/>, is addressed by NETCONF and YANG. For configuration this holds true, for network observability it is unfortunately not yet. This has been confirmed with a set of network operators asking how long it takes from subscribing YANG data to make it accessible to the operator. Minutes, Hours, Days, or Weeks. None of them answered Minutes or Hours. All of them responded Days or Weeks. Hinting manual post processing of YANG data.</t>
        <t>Collecting YANG metrics from networks is already a struggle due to late arrival of <xref target="RFC8639"/>, <xref target="RFC8640"/>, <xref target="RFC8641"/>, <xref target="I-D.ietf-netconf-https-notif"/>, and <xref target="I-D.ietf-netconf-udp-notif"/> for configured subscription transport protocols which defined YANG-Push in the industry. This caused network vendors to implement alternative solutions to collect real-time streaming data in the meanwhile, such as gNMI which was proposed in 2018 in <xref target="I-D.openconfig-rtgwg-gnmi-spec"/> to the IETF but not followed up on. Unfortunately, these implementations differ between network Operating Systems due to the lack of standardization, specifically for the metadata which would ensure machine readability.</t>
        <t>When a set of network operators where asked to where operational YANG data needs to be integrated to, the answer homogeneously was Apache Kafka Message Broker and Time Series Databases. There is a need to specify how YANG-Push can be integrated into Apache Kafka and references needed YANG-Push extensions and YANG schema registry development. The YANG-Push extensions addressing needs to make YANG-Push messages machine readable and against semantic validate able to ensure a consistent data processing.</t>
        <t>Another challenge is that the subscribed YANG data referenced with datastore-subtree-filter or datastore-xpath-filter breaks semantic integrity which needs to be addressed by either updating <xref section="4" sectionFormat="of" target="RFC8641"/> or proposing a new YANG module being used at the YANG-Push receiver.</t>
      </section>
      <section anchor="yang-formatted-data-manipulation">
        <name>YANG-formatted Data Manipulation</name>
        <t>The use of a flat tree hierarchy in YANG models may induce some performance issues compared to other graph models. See, for example, <xref target="ODL"/>.</t>
      </section>
      <section anchor="translation-and-mapping-between-servicenetwork-and-device-models">
        <name>Translation and Mapping Between Service/Network and Device Models</name>
        <t>TBC.</t>
      </section>
      <section anchor="inconsistent-data-structures-in-network-protocols-for-data-export">
        <name>(In)Consistent Data Structures in Network Protocols for Data Export</name>
        <t>Network Telemetry, as described in <xref target="RFC9232"/>, involve a set of protocols. Due to the different requirements, one Network Telemetry protocol doesn't address all needs. This is mainly due to the nature of the subscribed data. BGP Monitoring Protocol (BMP) <xref target="RFC7854"/> adds monitoring and tracing capabilities natively to the BGP process to minimize the processing overhead. While IPFIX <xref target="RFC7011"/><xref target="RFC7012"/> can be applied according to <xref target="RFC5472"/> to gain visibility into the data and forwarding planes, due to the amount of data, sampling as defined in <xref target="RFC5476"/> and applied to IPFIX in <xref target="RFC5477"/> and aggregation as defined in <xref target="RFC7015"/> for IPFIX is needed to reduce the amount of exposed data. While YANG-Push focuses on exposing already YANG modelled data, which eases the correlation among network configuration and operational data.</t>
        <t><xref target="RFC9232"/> is an informational document and does not specify what these Network Telemetry protocols should have in common to ensure consistent data structures for data export. While data types are fairly good aligned, a lack of metadata standardization among the Network Telemetry protocols is observed. In particular describing from where the metrics has been exported from and timestamping. In <xref section="4.2" sectionFormat="of" target="RFC7854"/> timestamps are optional and sysName <xref target="RFC1213"/> is only carried in the BMP initiation message (<xref section="4.3" sectionFormat="of" target="RFC7854"/>), while the message header of IPFIX defined in <xref section="4.3" sectionFormat="of" target="RFC7011"/> lacks the sysName definition.</t>
        <t>The lack of information from where the data is being pushed from is only known to the Network Telemetry data collection due to the transport session being established from the network node exporting the information. When Network Telemetry messages are being transformed and forwarded, this information is being lost. Therefore, it is common among network operators to augment sysName and other metadata at the data collection.</t>
        <t>The same common principle applies to when observation timestamping is missing in the Network Telemetry message. Since the data collection is the closest element to the network, a time stamp is added to give the network operator at least the information when the Network Telemetry message was collected. However, since Network Telemetry addresses real-time streaming needs, this is often not accurate enough for data correlation.</t>
      </section>
      <section anchor="proprietary-yang-modules-cli-and-limited-abstraction">
        <name>Proprietary YANG Modules, CLI, and Limited Abstraction</name>
        <t>Pluggins/Proxy YANG/CLI is still the rule in many operations.</t>
        <t>Complexity in dev the pluggins (as you need to cover many OS/vendors).</t>
        <t>Network models for the realization provides some "level" of abstraction and then automations.</t>
        <t>TBC.</t>
      </section>
      <section anchor="distinct-networks-distinct-management-requirements">
        <name>Distinct Networks, Distinct Management Requirements</name>
        <t>From the time RFC 3535 was released up to now, new kind of services and applications have been developed and deployed over the time, with very diverse, and some times contradicting, requirements. Those services have been engineered on top of multi-service networks for the sake of efficiency and simplicity, accommodating such a variety of needs. As a result, services requiring mobility, data replication, large capacity, adaptability, multi-path support, determinism, etc., coexist on the same shared network, needing from it mechanisms for graceful operation.</t>
        <t>Likewise, such diversity of services also require different management capabilities. For example, session continuity, distribution trees, traffic engineering, congestion status notification, reordering, or on-time delivery impose very different management needs to be satisfied.</t>
        <t>This reality is different from the one existing at the time of <xref target="RFC3535"/>, and as such, the new identified needs can require from novel approaches to guarantee the aforementioned co-existence of services.</t>
        <t>Also, some networks have specific network management requirements such as the need for asynchronous operations or constraints on data compactness. An example of such networks is Delay-Tolerant Networking (DTN) <xref target="RFC838"/>.</t>
      </section>
      <section anchor="implications-of-external-dependency">
        <name>Implications of External Dependency</name>
        <t>Networks are being updated to abandon the silo approach from the past towards an increasing convergence. Specifically, there are trends towards a tighter interaction and integration of different technologies previously considered as totally separated from an operational perspective. Examples of that trends are the IP and Optical integration (e.g., the introduction of colored interfaces on routers), or the extension of deterministic-behavior features to Layer 3 networks. This kind of convergence in most cases creates dependencies on the conventional network management features, which require to incorporate or integrate functionality from other technological domains.</t>
        <t>Furthermore, such convergence is also reflected on the need of interacting and interworking with distinct network parts participating in the end-to-end service delivery. Mobile access, fixed access, data center, enterprise, radio functional split (i.e., fronthaul and midhaul), neutral exchanges, intensive data networks (e.g., scientific academic networks), content distribution, etc., represent network parts constituent of end-to-end services that can impose dependencies of the management of an intermediate network.</t>
        <t>That convergence shown the last years also implies the need of an up-to-date refresh of management capabilities and tooling of the conventional networks. Also, it highlights the need to easily map the data models that are used to manage each specific segment.</t>
      </section>
      <section anchor="too-much-time-between-publication-of-new-networking-functionality-and-the-associated-yang">
        <name>Too Much Time Between Publication of New Networking Functionality and the Associated YANG</name>
        <t>For example, <xref target="RFC8667"/> (IS-IS extensions for SR) was published in December 2019, while <xref target="I-D.ietf-isis-sr-yang"/> will be published ~5 years after.</t>
        <t>Consider having YANG as part of the protocol specification/change where possible, or have the YANG document progress in parallel.
That may slow down the protocol specification, though.</t>
      </section>
      <section anchor="open-source-tools">
        <name>Open-source Tools</name>
        <t>While there are open-source implementations for NETCONF (e.g., NETOPEER), the gRPC/gNMI suite seems to have more support for tools on the client side.
For example, "ygot" generates structures from YANG models and these can easily be used by a client to configure a device with gNMI. NETCONF is not supported though (we need the XML tags).</t>
      </section>
      <section anchor="network-apification">
        <name>Network APIfication</name>
        <t>APIs are getting momentum as means of interworking between parties, also at the time of providing network services. As an example, <xref target="I-D.ramseyer-grow-peering-api"/> defines an API for dynamically establishing BGP peering sessions between Autonomous Systems of different administrative domains. That same objective is also covered by the YANG data model defined in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> as exemplified in Appendix A.10. Tools such as YANG/OpenAPI transforms are key to leverage existing data models and allow for better integration and mapping to actual realization models.</t>
        <t>Readily available API specifications could be generalized for fast development, prototyping, and validation.</t>
      </section>
      <section anchor="new-service-approaches">
        <name>New Service Approaches</name>
        <t>The virtualization trend hava made posible to dynamically instantiate Service Functions (SFs) in distributed compute facilities in the form of virtual machines or containers, as micro-services. The instantiation of the SFs is governed by cloud management systems, as it is the connectivity among the different instances or micro-services. That connectivity is typically realized by using overlay mechanisms, without any further interaction with the network. However, this appraoch seems to be insuficient for future services demanding stringent requirements in terms of Service Level Objectives (SLOs).</t>
        <t>The distinct approaches followed in both the compute and the network environments makes necessary to define suitable mechanism for enabling an efficient interplay, while highly automating the overall service delivery procedure.</t>
      </section>
      <section anchor="the-network-becomes-consumable">
        <name>The Network Becomes Consumable</name>
        <t>Network connectivity can support tailored services in terms of SLOs, for instance, by means of Network Slice Services <xref target="RFC9543"/>. This approach of "consuming" the network flexibly and dynamically is made possible by enabling means of exposing network capabilities to either internal or external applications. Then, network management is no longer limited to collect network status information, but it should be now extended to permit the exposure of resources, capabilities, functionality, and associated information (e.g., inventory based data).</t>
      </section>
      <section anchor="another-item">
        <name>Another Item</name>
        <t>TBC.</t>
      </section>
    </section>
    <section anchor="some-individual-assessments">
      <name>Some Individual Assessments</name>
      <t>This section captures some early assessments. The goal is first to capture received feedback, challenge it, and then structure it.</t>
      <section anchor="what-went-well">
        <name>What Went Well</name>
        <ul spacing="normal">
          <li>
            <t>An overview of current and next possible technologies were given</t>
          </li>
          <li>
            <t>Some rather technical, technology focused input from operators were collected</t>
          </li>
          <li>
            <t>Some protocols were early on de-scoped and described why</t>
          </li>
        </ul>
      </section>
      <section anchor="what-went-wrong">
        <name>What Went Wrong</name>
        <ul spacing="normal">
          <li>
            <t>Not enough implementers (software developers implementing the standards) and users (network operators using the network management software developed based on standards) were present and were well organized. That lead to standards which are technical not implementable and implementation that are not applicable or bringing not enough added value.</t>
          </li>
          <li>
            <t>IETF is not the expert community in data engineering. The experts are in the data industry. Without them, integration in data processing chains like Data Mesh is going to be a challenge.</t>
          </li>
          <li>
            <t>Closed Loop Operation and Intend Based Networking were not considered as a use case or overall non-technology related use cases were not considered.</t>
          </li>
          <li>
            <t>Most drawn conclusions were not explained why the IETF community came to such conclusions.</t>
          </li>
          <li>
            <t>We were looking at the past and present and not into the distant future. What do we need in 5-10 years?</t>
          </li>
        </ul>
      </section>
      <section anchor="where-can-be-improved">
        <name>Where Can Be Improved</name>
        <ul spacing="normal">
          <li>
            <t>Focus on use cases. What goal do we need to fulfill and who can describe best: Network Operators</t>
          </li>
          <li>
            <t>Focus on how those use cases could be implemented best and what standards would help: Software and Data Engineers</t>
          </li>
          <li>
            <t>Look at current standards and see wherever those standards contribute to those implementations: IETF community</t>
          </li>
          <li>
            <t>List what is missing and analyze why it is missing: IETF community</t>
          </li>
          <li>
            <t>Create an eco-systems of software developer and network operators which share their open source tools: IETF community</t>
          </li>
          <li>
            <t>Mandate that no network management standard is being defined without having at least two reference implementations and help the IETF community to achieve that: IESG</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="perspectives-recommendations">
      <name>Perspectives &amp; Recommendations</name>
      <t>TBC</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBC.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ODL" target="https://docs.opendaylight.org/projects/bgpcep/en/latest/graph/graph-user-guide-graph-model.html#">
        <front>
          <title>Graph Model Overview</title>
          <author>
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="RFC3535">
        <front>
          <title>Overview of the 2002 IAB Network Management Workshop</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="May" year="2003"/>
          <abstract>
            <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3535"/>
        <seriesInfo name="DOI" value="10.17487/RFC3535"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC7149">
        <front>
          <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
          <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
          <author fullname="C. Jacquenet" initials="C." surname="Jacquenet"/>
          <date month="March" year="2014"/>
          <abstract>
            <t>Software-Defined Networking (SDN) has been one of the major buzz words of the networking industry for the past couple of years. And yet, no clear definition of what SDN actually covers has been broadly admitted so far. This document aims to clarify the SDN landscape by providing a perspective on requirements, issues, and other considerations about SDN, as seen from within a service provider environment.</t>
            <t>It is not meant to endlessly discuss what SDN truly means but rather to suggest a functional taxonomy of the techniques that can be used under an SDN umbrella and to elaborate on the various pending issues the combined activation of such techniques inevitably raises. As such, a definition of SDN is only mentioned for the sake of clarification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7149"/>
        <seriesInfo name="DOI" value="10.17487/RFC7149"/>
      </reference>
      <reference anchor="RFC7426">
        <front>
          <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
          <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
          <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
          <author fullname="S. Denazis" initials="S." surname="Denazis"/>
          <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
          <author fullname="D. Meyer" initials="D." surname="Meyer"/>
          <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
          <date month="January" year="2015"/>
          <abstract>
            <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7426"/>
        <seriesInfo name="DOI" value="10.17487/RFC7426"/>
      </reference>
      <reference anchor="RFC8969">
        <front>
          <title>A Framework for Automating Service and Network Management with YANG</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="D. Lopez" initials="D." surname="Lopez"/>
          <author fullname="C. Xie" initials="C." surname="Xie"/>
          <author fullname="L. Geng" initials="L." surname="Geng"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
            <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8969"/>
        <seriesInfo name="DOI" value="10.17487/RFC8969"/>
      </reference>
      <reference anchor="RFC8568">
        <front>
          <title>Network Virtualization Research Challenges</title>
          <author fullname="CJ. Bernardos" initials="CJ." surname="Bernardos"/>
          <author fullname="A. Rahman" initials="A." surname="Rahman"/>
          <author fullname="JC. Zuniga" initials="JC." surname="Zuniga"/>
          <author fullname="LM. Contreras" initials="LM." surname="Contreras"/>
          <author fullname="P. Aranda" initials="P." surname="Aranda"/>
          <author fullname="P. Lynch" initials="P." surname="Lynch"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document describes open research challenges for network virtualization. Network virtualization is following a similar path as previously taken by cloud computing. Specifically, cloud computing popularized migration of computing functions (e.g., applications) and storage from local, dedicated, physical resources to remote virtual functions accessible through the Internet. In a similar manner, network virtualization is encouraging migration of networking functions from dedicated physical hardware nodes to a virtualized pool of resources. However, network virtualization can be considered to be a more complex problem than cloud computing as it not only involves virtualization of computing and storage functions but also involves abstraction of the network itself. This document describes current research and engineering challenges in network virtualization including the guarantee of quality of service, performance improvement, support for multiple domains, network slicing, service composition, device virtualization, privacy and security, separation of control concerns, network function placement, and testing. In addition, some proposals are made for new activities in the IETF and IRTF that could address some of these challenges. This document is a product of the Network Function Virtualization Research Group (NFVRG).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8568"/>
        <seriesInfo name="DOI" value="10.17487/RFC8568"/>
      </reference>
      <reference anchor="I-D.ietf-bmwg-containerized-infra">
        <front>
          <title>Considerations for Benchmarking Network Performance in Containerized Infrastructures</title>
          <author fullname="Trần Minh Ngọc" initials="T. M." surname="Ngọc">
            <organization>Soongsil University</organization>
          </author>
          <author fullname="Sridhar Rao" initials="S." surname="Rao">
            <organization>The Linux Foundation</organization>
          </author>
          <author fullname="Jangwon Lee" initials="J." surname="Lee">
            <organization>Soongsil University</organization>
          </author>
          <author fullname="Younghan Kim" initials="Y." surname="Kim">
            <organization>Soongsil University</organization>
          </author>
          <date day="17" month="June" year="2024"/>
          <abstract>
            <t>   Recently, the Benchmarking Methodology Working Group has extended the
   laboratory characterization from physical network functions (PNFs) to
   virtual network functions (VNFs).  Considering the network function
   implementation trend moving from virtual machine-based to container-
   based, system configurations and deployment scenarios for
   benchmarking will be partially changed by how the resources
   allocation and network technologies are specified for containerized
   network functions.  This draft describes additional considerations
   for benchmarking network performance when network functions are
   containerized and performed in general-purpose hardware.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-bmwg-containerized-infra-01"/>
      </reference>
      <reference anchor="RFC9315">
        <front>
          <title>Intent-Based Networking - Concepts and Definitions</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
          <author fullname="L. Z. Granville" initials="L. Z." surname="Granville"/>
          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
          <date month="October" year="2022"/>
          <abstract>
            <t>Intent and Intent-Based Networking are taking the industry by storm. At the same time, terms related to Intent-Based Networking are often used loosely and inconsistently, in many cases overlapping and confused with other concepts such as "policy." This document clarifies the concept of "intent" and provides an overview of the functionality that is associated with it. The goal is to contribute towards a common and shared understanding of terms, concepts, and functionality that can be used as the foundation to guide further definition of associated research and engineering problems and their solutions.</t>
            <t>This document is a product of the IRTF Network Management Research Group (NMRG). It reflects the consensus of the research group, having received many detailed and positive reviews by research group participants. It is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9315"/>
        <seriesInfo name="DOI" value="10.17487/RFC9315"/>
      </reference>
      <reference anchor="RFC9232">
        <front>
          <title>Network Telemetry Framework</title>
          <author fullname="H. Song" initials="H." surname="Song"/>
          <author fullname="F. Qin" initials="F." surname="Qin"/>
          <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
          <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
          <author fullname="A. Wang" initials="A." surname="Wang"/>
          <date month="May" year="2022"/>
          <abstract>
            <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9232"/>
        <seriesInfo name="DOI" value="10.17487/RFC9232"/>
      </reference>
      <reference anchor="RFC7951">
        <front>
          <title>JSON Encoding of Data Modeled with YANG</title>
          <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7951"/>
        <seriesInfo name="DOI" value="10.17487/RFC7951"/>
      </reference>
      <reference anchor="I-D.ietf-core-comi">
        <front>
          <title>CoAP Management Interface (CORECONF)</title>
          <author fullname="Michel Veillette" initials="M." surname="Veillette">
            <organization>Trilliant Networks Inc.</organization>
          </author>
          <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
            <organization>consultant</organization>
          </author>
          <author fullname="Alexander Pelov" initials="A." surname="Pelov">
            <organization>IMT Atlantique</organization>
          </author>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
            <organization>YumaWorks</organization>
          </author>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-17"/>
      </reference>
      <reference anchor="RFC9254">
        <front>
          <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
          <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
          <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
          <author fullname="A. Pelov" initials="A." surname="Pelov"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <date month="July" year="2022"/>
          <abstract>
            <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
            <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9254"/>
        <seriesInfo name="DOI" value="10.17487/RFC9254"/>
      </reference>
      <reference anchor="I-D.ietf-core-sid">
        <front>
          <title>YANG Schema Item iDentifier (YANG SID)</title>
          <author fullname="Michel Veillette" initials="M." surname="Veillette">
            <organization>Trilliant Networks Inc.</organization>
          </author>
          <author fullname="Alexander Pelov" initials="A." surname="Pelov">
            <organization>IMT Atlantique</organization>
          </author>
          <author fullname="Ivaylo Petrov" initials="I." surname="Petrov">
            <organization>Google Switzerland GmbH</organization>
          </author>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <author fullname="Michael Richardson" initials="M." surname="Richardson">
            <organization>Sandelman Software Works</organization>
          </author>
          <date day="22" month="December" year="2023"/>
          <abstract>
            <t>   YANG Schema Item iDentifiers (YANG SID) are globally unique 63-bit
   unsigned integers used to identify YANG items, as a more compact
   method to identify YANG items that can be used for efficiency and in
   constrained environments (RFC 7228).  This document defines the
   semantics, the registration, and assignment processes of YANG SIDs
   for IETF managed YANG modules.  To enable the implementation of these
   processes, this document also defines a file format used to persist
   and publish assigned YANG SIDs.


   // The present version (–24) is intended to address the remaining
   // IESG comments.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-sid-24"/>
      </reference>
      <reference anchor="RFC6632">
        <front>
          <title>An Overview of the IETF Network Management Standards</title>
          <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="June" year="2012"/>
          <abstract>
            <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6632"/>
        <seriesInfo name="DOI" value="10.17487/RFC6632"/>
      </reference>
      <reference anchor="RFC8791">
        <front>
          <title>YANG Data Structure Extensions</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Björklund" initials="M." surname="Björklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="June" year="2020"/>
          <abstract>
            <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8791"/>
        <seriesInfo name="DOI" value="10.17487/RFC8791"/>
      </reference>
      <reference anchor="RFC9132">
        <front>
          <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="J. Shallow" initials="J." surname="Shallow"/>
          <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
          <date month="September" year="2021"/>
          <abstract>
            <t>This document specifies the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel, a protocol for signaling the need for protection against Distributed Denial-of-Service (DDoS) attacks to a server capable of enabling network traffic mitigation on behalf of the requesting client.</t>
            <t>A companion document defines the DOTS data channel, a separate reliable communication layer for DOTS management and configuration purposes.</t>
            <t>This document obsoletes RFC 8782.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9132"/>
        <seriesInfo name="DOI" value="10.17487/RFC9132"/>
      </reference>
      <reference anchor="RFC5706">
        <front>
          <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="November" year="2009"/>
          <abstract>
            <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5706"/>
        <seriesInfo name="DOI" value="10.17487/RFC5706"/>
      </reference>
      <reference anchor="RFC6353">
        <front>
          <title>Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)</title>
          <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
          <date month="July" year="2011"/>
          <abstract>
            <t>This document describes a Transport Model for the Simple Network Management Protocol (SNMP), that uses either the Transport Layer Security protocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS protocols provide authentication and privacy services for SNMP applications. This document describes how the TLS Transport Model (TLSTM) implements the needed features of an SNMP Transport Subsystem to make this protection possible in an interoperable way.</t>
            <t>This Transport Model is designed to meet the security and operational needs of network administrators. It supports the sending of SNMP messages over TLS/TCP and DTLS/UDP. The TLS mode can make use of TCP's improved support for larger packet sizes and the DTLS mode provides potentially superior operation in environments where a connectionless (e.g., UDP) transport is preferred. Both TLS and DTLS integrate well into existing public keying infrastructures.</t>
            <t>This document also defines a portion of the Management Information Base (MIB) for use with network management protocols. In particular, it defines objects for managing the TLS Transport Model for SNMP. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="78"/>
        <seriesInfo name="RFC" value="6353"/>
        <seriesInfo name="DOI" value="10.17487/RFC6353"/>
      </reference>
      <reference anchor="RFC9456">
        <front>
          <title>Updates to the TLS Transport Model for SNMP</title>
          <author fullname="K. Vaughn" initials="K." role="editor" surname="Vaughn"/>
          <date month="November" year="2023"/>
          <abstract>
            <t>This document updates RFC 6353 ("Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)") to reflect changes necessary to support Transport Layer Security version 1.3 (TLS 1.3) and Datagram Transport Layer Security version 1.3 (DTLS 1.3), which are jointly known as "(D)TLS 1.3". This document is compatible with (D)TLS 1.2 and is intended to be compatible with future versions of SNMP and (D)TLS.</t>
            <t>This document updates the SNMP-TLS-TM-MIB as defined in RFC 6353.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9456"/>
        <seriesInfo name="DOI" value="10.17487/RFC9456"/>
      </reference>
      <reference anchor="RFC7860">
        <front>
          <title>HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3</title>
          <author fullname="J. Merkle" initials="J." role="editor" surname="Merkle"/>
          <author fullname="M. Lochter" initials="M." surname="Lochter"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This document specifies several authentication protocols based on the SHA-2 hash functions for the User-based Security Model (USM) for SNMPv3 defined in RFC 3414. It obsoletes RFC 7630, in which the MIB MODULE-IDENTITY value was incorrectly specified.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7860"/>
        <seriesInfo name="DOI" value="10.17487/RFC7860"/>
      </reference>
      <reference anchor="RFC3084">
        <front>
          <title>COPS Usage for Policy Provisioning (COPS-PR)</title>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="J. Seligson" initials="J." surname="Seligson"/>
          <author fullname="D. Durham" initials="D." surname="Durham"/>
          <author fullname="S. Gai" initials="S." surname="Gai"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="F. Reichmeyer" initials="F." surname="Reichmeyer"/>
          <author fullname="R. Yavatkar" initials="R." surname="Yavatkar"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <date month="March" year="2001"/>
          <abstract>
            <t>This document describes the use of the Common Open Policy Service (COPS) protocol for support of policy provisioning (COPS-PR). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3084"/>
        <seriesInfo name="DOI" value="10.17487/RFC3084"/>
      </reference>
      <reference anchor="RFC3159">
        <front>
          <title>Structure of Policy Provisioning Information (SPPI)</title>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="M. Fine" initials="M." surname="Fine"/>
          <author fullname="J. Seligson" initials="J." surname="Seligson"/>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="S. Hahn" initials="S." surname="Hahn"/>
          <author fullname="R. Sahita" initials="R." surname="Sahita"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <author fullname="F. Reichmeyer" initials="F." surname="Reichmeyer"/>
          <date month="August" year="2001"/>
          <abstract>
            <t>This document, the Structure of Policy Provisioning Information (SPPI), defines the adapted subset of SNMP's Structure of Management Information (SMI) used to write Policy Information Base (PIB) modules. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3159"/>
        <seriesInfo name="DOI" value="10.17487/RFC3159"/>
      </reference>
      <reference anchor="RFC3317">
        <front>
          <title>Differentiated Services Quality of Service Policy Information Base</title>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="R. Sahita" initials="R." surname="Sahita"/>
          <author fullname="S. Hahn" initials="S." surname="Hahn"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <date month="March" year="2003"/>
        </front>
        <seriesInfo name="RFC" value="3317"/>
        <seriesInfo name="DOI" value="10.17487/RFC3317"/>
      </reference>
      <reference anchor="RFC3318">
        <front>
          <title>Framework Policy Information Base</title>
          <author fullname="R. Sahita" initials="R." role="editor" surname="Sahita"/>
          <author fullname="S. Hahn" initials="S." surname="Hahn"/>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <date month="March" year="2003"/>
          <abstract>
            <t>This document defines a set of PRovisioning Classes (PRCs) and textual conventions that are common to all clients that provision policy using Common Open Policy Service (COPS) protocol for Provisioning.</t>
            <t>Structure of Policy Provisioning Information (SPPI) describes a structure for specifying policy information that can then be transmitted to a network device for the purpose of configuring policy at that device. The model underlying this structure is one of well-defined (PRCs) and instances of these classes (PRIs) residing in a virtual information store called the Policy Information Base (PIB).</t>
            <t>One way to provision policy is by means of the (COPS) protocol with the extensions for provisioning. This protocol supports multiple clients, each of which may provision policy for a specific policy domain such as QoS, virtual private networks, or security.</t>
            <t>As described in COPS usage for Policy Provisioning (COPS-PR), each client supports a non-overlapping and independent set of PIB modules. However, some PRovisioning Classes are common to all subject-categories (client-types) and need to be present in each.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3318"/>
        <seriesInfo name="DOI" value="10.17487/RFC3318"/>
      </reference>
      <reference anchor="RFC3571">
        <front>
          <title>Framework Policy Information Base for Usage Feedback</title>
          <author fullname="D. Rawlins" initials="D." surname="Rawlins"/>
          <author fullname="A. Kulkarni" initials="A." surname="Kulkarni"/>
          <author fullname="K. Ho Chan" initials="K." surname="Ho Chan"/>
          <author fullname="M. Bokaemper" initials="M." surname="Bokaemper"/>
          <author fullname="D. Dutt" initials="D." surname="Dutt"/>
          <date month="August" year="2003"/>
          <abstract>
            <t>This document describes a portion of the Policy Information Base (PIB) to control policy usage collection and reporting in a device. The provisioning classes specified here allow a Policy Decision Point (PDP) to select which policy objects should collect usage information, what information should be collected and when it should be reported. This PIB requires the presence of other PIBs (defined elsewhere) that provide the policy objects from which usage information is collected. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3571"/>
        <seriesInfo name="DOI" value="10.17487/RFC3571"/>
      </reference>
      <referencegroup anchor="BCP127" target="https://www.rfc-editor.org/info/bcp127">
        <reference anchor="RFC4787" target="https://www.rfc-editor.org/info/rfc4787">
          <front>
            <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="4787"/>
          <seriesInfo name="DOI" value="10.17487/RFC4787"/>
        </reference>
        <reference anchor="RFC6888" target="https://www.rfc-editor.org/info/rfc6888">
          <front>
            <title>Common Requirements for Carrier-Grade NATs (CGNs)</title>
            <author fullname="S. Perreault" initials="S." role="editor" surname="Perreault"/>
            <author fullname="I. Yamagata" initials="I." surname="Yamagata"/>
            <author fullname="S. Miyakawa" initials="S." surname="Miyakawa"/>
            <author fullname="A. Nakagawa" initials="A." surname="Nakagawa"/>
            <author fullname="H. Ashida" initials="H." surname="Ashida"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document defines common requirements for Carrier-Grade NATs (CGNs). It updates RFC 4787.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="6888"/>
          <seriesInfo name="DOI" value="10.17487/RFC6888"/>
        </reference>
        <reference anchor="RFC7857" target="https://www.rfc-editor.org/info/rfc7857">
          <front>
            <title>Updates to Network Address Translation (NAT) Behavioral Requirements</title>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Sivakumar" initials="S." surname="Sivakumar"/>
            <author fullname="K. Naito" initials="K." surname="Naito"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document clarifies and updates several requirements of RFCs 4787, 5382, and 5508 based on operational and development experience. The focus of this document is Network Address Translation from IPv4 to IPv4 (NAT44).</t>
              <t>This document updates RFCs 4787, 5382, and 5508.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="7857"/>
          <seriesInfo name="DOI" value="10.17487/RFC7857"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7414">
        <front>
          <title>A Roadmap for Transmission Control Protocol (TCP) Specification Documents</title>
          <author fullname="M. Duke" initials="M." surname="Duke"/>
          <author fullname="R. Braden" initials="R." surname="Braden"/>
          <author fullname="W. Eddy" initials="W." surname="Eddy"/>
          <author fullname="E. Blanton" initials="E." surname="Blanton"/>
          <author fullname="A. Zimmermann" initials="A." surname="Zimmermann"/>
          <date month="February" year="2015"/>
          <abstract>
            <t>This document contains a roadmap to the Request for Comments (RFC) documents relating to the Internet's Transmission Control Protocol (TCP). This roadmap provides a brief summary of the documents defining TCP and various TCP extensions that have accumulated in the RFC series. This serves as a guide and quick reference for both TCP implementers and other parties who desire information contained in the TCP-related RFCs.</t>
            <t>This document obsoletes RFC 4614.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7414"/>
        <seriesInfo name="DOI" value="10.17487/RFC7414"/>
      </reference>
      <reference anchor="RFC6244">
        <front>
          <title>An Architecture for Network Management Using NETCONF and YANG</title>
          <author fullname="P. Shafer" initials="P." surname="Shafer"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) gives access to native capabilities of the devices within a network, defining methods for manipulating configuration databases, retrieving operational data, and invoking specific operations. YANG provides the means to define the content carried via NETCONF, both data and operations. Using both technologies, standard modules can be defined to give interoperability and commonality to devices, while still allowing devices to express their unique capabilities.</t>
            <t>This document describes how NETCONF and YANG help build network management applications that meet the needs of network operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6244"/>
        <seriesInfo name="DOI" value="10.17487/RFC6244"/>
      </reference>
      <reference anchor="RFC8639">
        <front>
          <title>Subscription to YANG Notifications</title>
          <author fullname="E. Voit" initials="E." surname="Voit"/>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
          <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
          <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
          <date month="September" year="2019"/>
          <abstract>
            <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8639"/>
        <seriesInfo name="DOI" value="10.17487/RFC8639"/>
      </reference>
      <reference anchor="RFC8640">
        <front>
          <title>Dynamic Subscription to YANG Events and Datastores over NETCONF</title>
          <author fullname="E. Voit" initials="E." surname="Voit"/>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
          <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
          <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
          <date month="September" year="2019"/>
          <abstract>
            <t>This document provides a Network Configuration Protocol (NETCONF) binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8640"/>
        <seriesInfo name="DOI" value="10.17487/RFC8640"/>
      </reference>
      <reference anchor="RFC8641">
        <front>
          <title>Subscription to YANG Notifications for Datastore Updates</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="E. Voit" initials="E." surname="Voit"/>
          <date month="September" year="2019"/>
          <abstract>
            <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8641"/>
        <seriesInfo name="DOI" value="10.17487/RFC8641"/>
      </reference>
      <reference anchor="I-D.ietf-netconf-https-notif">
        <front>
          <title>An HTTPS-based Transport for YANG Notifications</title>
          <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
            <organization>Kloud Services</organization>
          </author>
          <author fullname="Kent Watsen" initials="K." surname="Watsen">
            <organization>Watsen Networks</organization>
          </author>
          <date day="1" month="February" year="2024"/>
          <abstract>
            <t>   This document defines a protocol for sending asynchronous event
   notifications similar to notifications defined in RFC 5277, but over
   HTTPS.  YANG modules for configuring publishers are also defined.
   Examples are provided illustrating how to configure various
   publishers.

   This document requires that the publisher is a "server" (e.g., a
   NETCONF or RESTCONF server), but does not assume that the receiver is
   a server.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-https-notif-15"/>
      </reference>
      <reference anchor="I-D.ietf-netconf-udp-notif">
        <front>
          <title>UDP-based Transport for Configured Subscriptions</title>
          <author fullname="Guangying Zheng" initials="G." surname="Zheng">
            <organization>Huawei</organization>
          </author>
          <author fullname="Tianran Zhou" initials="T." surname="Zhou">
            <organization>Huawei</organization>
          </author>
          <author fullname="Thomas Graf" initials="T." surname="Graf">
            <organization>Swisscom</organization>
          </author>
          <author fullname="Pierre Francois" initials="P." surname="Francois">
            <organization>INSA-Lyon</organization>
          </author>
          <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
            <organization>INSA-Lyon</organization>
          </author>
          <author fullname="Paolo Lucente" initials="P." surname="Lucente">
            <organization>NTT</organization>
          </author>
          <date day="4" month="July" year="2024"/>
          <abstract>
            <t>   This document describes a UDP-based protocol for YANG notifications
   to collect data from network nodes.  A shim header is proposed to
   facilitate the data streaming directly from the publishing process on
   network processor of line cards to receivers.  The objective is to
   provide a lightweight approach to enable higher frequency and less
   performance impact on publisher and receiver processes compared to
   already established notification mechanisms.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-udp-notif-14"/>
      </reference>
      <reference anchor="I-D.openconfig-rtgwg-gnmi-spec">
        <front>
          <title>gRPC Network Management Interface (gNMI)</title>
          <author fullname="Rob Shakir" initials="R." surname="Shakir">
            <organization>Google</organization>
          </author>
          <author fullname="Anees Shaikh" initials="A." surname="Shaikh">
            <organization>Google</organization>
          </author>
          <author fullname="Paul Borman" initials="P." surname="Borman">
            <organization>Google</organization>
          </author>
          <author fullname="Marcus Hines" initials="M." surname="Hines">
            <organization>Google</organization>
          </author>
          <author fullname="Carl Lebsack" initials="C." surname="Lebsack">
            <organization>Google</organization>
          </author>
          <author fullname="Chris Morrow" initials="C." surname="Morrow">
            <organization>Google</organization>
          </author>
          <date day="5" month="March" year="2018"/>
          <abstract>
            <t>   This document describes the gRPC Network Management Interface (gNMI),
   a network management protocol based on the gRPC framework.  gNMI
   supports retrieval and manipulation of state from network elements
   where the data is represented by a tree structure, and addressable by
   paths.  The gNMI service defines operations for configuration
   management, operational state retrieval, and bulk data collection via
   streaming telemetry.  The authoritative gNMI specification is
   maintained at [GNMI-SPEC].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-openconfig-rtgwg-gnmi-spec-01"/>
      </reference>
      <reference anchor="RFC7854">
        <front>
          <title>BGP Monitoring Protocol (BMP)</title>
          <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
          <author fullname="R. Fernando" initials="R." surname="Fernando"/>
          <author fullname="S. Stuart" initials="S." surname="Stuart"/>
          <date month="June" year="2016"/>
          <abstract>
            <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7854"/>
        <seriesInfo name="DOI" value="10.17487/RFC7854"/>
      </reference>
      <reference anchor="RFC7011">
        <front>
          <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <author fullname="P. Aitken" initials="P." surname="Aitken"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="77"/>
        <seriesInfo name="RFC" value="7011"/>
        <seriesInfo name="DOI" value="10.17487/RFC7011"/>
      </reference>
      <reference anchor="RFC7012">
        <front>
          <title>Information Model for IP Flow Information Export (IPFIX)</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7012"/>
        <seriesInfo name="DOI" value="10.17487/RFC7012"/>
      </reference>
      <reference anchor="RFC5472">
        <front>
          <title>IP Flow Information Export (IPFIX) Applicability</title>
          <author fullname="T. Zseby" initials="T." surname="Zseby"/>
          <author fullname="E. Boschi" initials="E." surname="Boschi"/>
          <author fullname="N. Brownlee" initials="N." surname="Brownlee"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>In this document, we describe the applicability of the IP Flow Information eXport (IPFIX) protocol for a variety of applications. We show how applications can use IPFIX, describe the relevant Information Elements (IEs) for those applications, and present opportunities and limitations of the protocol. Furthermore, we describe relations of the IPFIX framework to other architectures and frameworks. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5472"/>
        <seriesInfo name="DOI" value="10.17487/RFC5472"/>
      </reference>
      <reference anchor="RFC5476">
        <front>
          <title>Packet Sampling (PSAMP) Protocol Specifications</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="A. Johnson" initials="A." surname="Johnson"/>
          <author fullname="J. Quittek" initials="J." surname="Quittek"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document specifies the export of packet information from a Packet SAMPling (PSAMP) Exporting Process to a PSAMP Collecting Process. For export of packet information, the IP Flow Information eXport (IPFIX) protocol is used, as both the IPFIX and PSAMP architecture match very well, and the means provided by the IPFIX protocol are sufficient. The document specifies in detail how the IPFIX protocol is used for PSAMP export of packet information. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5476"/>
        <seriesInfo name="DOI" value="10.17487/RFC5476"/>
      </reference>
      <reference anchor="RFC5477">
        <front>
          <title>Information Model for Packet Sampling Exports</title>
          <author fullname="T. Dietz" initials="T." surname="Dietz"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <author fullname="P. Aitken" initials="P." surname="Aitken"/>
          <author fullname="F. Dressler" initials="F." surname="Dressler"/>
          <author fullname="G. Carle" initials="G." surname="Carle"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This memo defines an information model for the Packet SAMPling (PSAMP) protocol. It is used by the PSAMP protocol for encoding sampled packet data and information related to the Sampling process. As the PSAMP protocol is based on the IP Flow Information eXport (IPFIX) protocol, this information model is an extension to the IPFIX information model. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5477"/>
        <seriesInfo name="DOI" value="10.17487/RFC5477"/>
      </reference>
      <reference anchor="RFC7015">
        <front>
          <title>Flow Aggregation for the IP Flow Information Export (IPFIX) Protocol</title>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="A. Wagner" initials="A." surname="Wagner"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document provides a common implementation-independent basis for the interoperable application of the IP Flow Information Export (IPFIX) protocol to the handling of Aggregated Flows, which are IPFIX Flows representing packets from multiple Original Flows sharing some set of common properties. It does this through a detailed terminology and a descriptive Intermediate Aggregation Process architecture, including a specification of methods for Original Flow counting and counter distribution across intervals.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7015"/>
        <seriesInfo name="DOI" value="10.17487/RFC7015"/>
      </reference>
      <reference anchor="RFC1213">
        <front>
          <title>Management Information Base for Network Management of TCP/IP-based internets: MIB-II</title>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="M. Rose" initials="M." surname="Rose"/>
          <date month="March" year="1991"/>
          <abstract>
            <t>This memo defines the second version of the Management Information Base (MIB-II) for use with network management protocols in TCP/IP-based internets. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="17"/>
        <seriesInfo name="RFC" value="1213"/>
        <seriesInfo name="DOI" value="10.17487/RFC1213"/>
      </reference>
      <reference anchor="RFC838">
        <front>
          <title>Who talks TCP?</title>
          <author fullname="D. Smallberg" initials="D." surname="Smallberg"/>
          <date month="January" year="1983"/>
          <abstract>
            <t>This RFC is a survey of hosts to identify the implementation status of Telnet, FTP, and Mail on TCP. The list of hosts was taken from the NIC hostname table of 31-Dec-82. The tests were run on 18-Jan-83.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="838"/>
        <seriesInfo name="DOI" value="10.17487/RFC0838"/>
      </reference>
      <reference anchor="RFC8667">
        <front>
          <title>IS-IS Extensions for Segment Routing</title>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
          <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
          <author fullname="A. Bashandy" initials="A." surname="Bashandy"/>
          <author fullname="H. Gredler" initials="H." surname="Gredler"/>
          <author fullname="B. Decraene" initials="B." surname="Decraene"/>
          <date month="December" year="2019"/>
          <abstract>
            <t>Segment Routing (SR) allows for a flexible definition of end-to-end paths within IGP topologies by encoding paths as sequences of topological sub-paths, called "segments". These segments are advertised by the link-state routing protocols (IS-IS and OSPF).</t>
            <t>This document describes the IS-IS extensions that need to be introduced for Segment Routing operating on an MPLS data plane.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8667"/>
        <seriesInfo name="DOI" value="10.17487/RFC8667"/>
      </reference>
      <reference anchor="I-D.ietf-isis-sr-yang">
        <front>
          <title>A YANG Data Model for IS-IS Segment Routing for the MPLS Data Plane</title>
          <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
            <organization>Futurewei Technologies</organization>
          </author>
          <author fullname="Pushpasis Sarkar" initials="P." surname="Sarkar">
            <organization>Individual</organization>
          </author>
          <author fullname="Ing-Wher (Helen) Chen" initials="H." surname="Chen">
            <organization>The MITRE Corporation</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Nvidia</organization>
          </author>
          <date day="1" month="July" year="2024"/>
          <abstract>
            <t>   This document defines a YANG data module that can be used to
   configure and manage IS-IS Segment Routing for MPLS data plane.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-isis-sr-yang-22"/>
      </reference>
      <reference anchor="I-D.ramseyer-grow-peering-api">
        <front>
          <title>Peering API</title>
          <author fullname="Carlos Aguado" initials="C." surname="Aguado">
            <organization>Amazon</organization>
          </author>
          <author fullname="Matt Griswold" initials="M." surname="Griswold">
            <organization>FullCtl</organization>
          </author>
          <author fullname="Jenny Ramseyer" initials="J." surname="Ramseyer">
            <organization>Meta</organization>
          </author>
          <author fullname="Arturo L. Servin" initials="A. L." surname="Servin">
            <organization>Google</organization>
          </author>
          <author fullname="Tom Strickx" initials="T." surname="Strickx">
            <organization>Cloudflare</organization>
          </author>
          <date day="30" month="May" year="2024"/>
          <abstract>
            <t>   We propose an API standard for BGP Peering, also known as interdomain
   interconnection through global Internet Routing.  This API offers a
   standard way to request public (settlement-free) peering, verify the
   status of a request or BGP session, and list potential connection
   locations.  The API is backed by PeeringDB OIDC, the industry
   standard for peering authentication.  We also propose future work to
   cover private peering, and alternative authentication methods.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ramseyer-grow-peering-api-05"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="29" month="May" year="2024"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-13"/>
      </reference>
      <reference anchor="RFC9543">
        <front>
          <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
          <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
          <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
          <author fullname="R. Rokui" initials="R." surname="Rokui"/>
          <author fullname="S. Homma" initials="S." surname="Homma"/>
          <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
          <author fullname="L. Contreras" initials="L." surname="Contreras"/>
          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
            <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
            <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9543"/>
        <seriesInfo name="DOI" value="10.17487/RFC9543"/>
      </reference>
    </references>
    <?line 373?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
