<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no" ?>
<?rfc symrefs="yes"?>
<rfc category="std" docName="draft-ietf-i2rs-yang-network-topo-05.txt" ipr="pre5378Trust200902">
  <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

  <?rfc toc="yes" ?>

  <?rfc compact="yes" ?>

  <?rfc symrefs="yes" ?>

  <?rfc sortrefs="yes"?>

  <?rfc iprnotified="no" ?>

  <?rfc strict="yes" ?>

  <front>
    <title abbrev="draft-ietf-i2rs-yang-network-topo-05.txt">A Data Model for
    Network Topologies</title>

    <author fullname="Alexander Clemm" initials="A." surname="Clemm">
      <organization>Cisco</organization>

      <address>
        <email>alex@cisco.com</email>
      </address>
    </author>

    <author fullname="Jan Medved" initials="J." surname="Medved">
      <organization>Cisco</organization>

      <address>
        <email>jmedved@cisco.com</email>
      </address>
    </author>

    <author fullname="Robert Varga" initials="R." surname="Varga">
      <organization>Cisco</organization>

      <address>
        <email>rovarga@cisco.com</email>
      </address>
    </author>

    <author fullname="Tony Tkacik" initials="T." surname="Tkacik">

      <address>
        <email>tony.tkacik@gmail.com</email>
      </address>
    </author>

    <author fullname="Nitin Bahadur" initials="N." surname="Bahadur">
      <organization>Bracket Computing</organization>

      <address>
        <email>nitin_bahadur@yahoo.com</email>
      </address>
    </author>

    <author fullname="Hariharan Ananthakrishnan" initials="H."
            surname="Ananthakrishnan">
      <organization>Packet Design</organization>

      <address>
        <email>hari@packetdesign.com</email>
      </address>
    </author>
    
    <author fullname="Xufeng Liu" initials="X."
            surname="Liu">
      <organization>Ericsson</organization>

      <address>
        <email>xliu@kuatrotech.com</email>
      </address>
    </author>
    
  

    <date day="29" month="July" year="2016"/>

    <abstract>
      <t>This document defines an abstract (generic) YANG data model for
      network/service topologies and inventories. The model serves as a base
      model which is augmented with technology-specific details in other, more
      specific topology and inventory models.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>This document introduces an abstract (base) YANG <xref
      target="RFC6020"/> <xref target="RFC6021"/> data model to represent
      networks and topologies. The data model is divided into two parts. The
      first part of the model defines a network model that allows to define
      network hierarchies (i.e. network stacks) and to maintain an inventory
      of nodes contained in a network. The second part of the model augments
      the basic network model with information to describe topology
      information. Specifically, it adds the concepts of links and termination
      points to describe how nodes in a network are connected to each other.
      Moreover the model introduces vertical layering relationships between
      networks that can be augmented to cover both network inventories and
      network/service topologies.</t>
      
      <t>While it would be possible to combine both parts into a single 
      model, the separation facilitates integration of network topology 
      and network inventory models, by allowing to augment network inventory 
      information separately and without concern for topology into the 
      network model.</t>

      <t>The model can be augmented to describe specifics of particular types
      of networks and topologies. For example, an augmenting model can provide
      network node information with attributes that are specific to a
      particular network type. Examples of augmenting models include models
      for Layer 2 network topologies, Layer 3 network topologies, such as
      Unicast IGP, IS-IS <xref target="RFC1195"/> and OSPF <xref
      target="RFC2328"/>, traffic engineering (TE) data <xref
      target="RFC3209"/>, or any of the variety of transport and service
      topologies. Information specific to particular network types will be
      captured in separate, technology-specific models.</t>

      <t>The basic data models introduced in this document are generic in
      nature and can be applied to many network and service topologies and
      inventories. The models allow applications to operate on an inventory or
      topology of any network at a generic level, where specifics of
      particular inventory/topology types are not required. At the same time,
      where data specific to a network type does comes into play and the model
      is augmented, the instantiated data still adheres to the same structure
      and is represented in consistent fashion. This also facilitates the
      representation of network hierarchies and dependencies between different
      network components and network types.</t>

      <t>The abstract (base) network YANG module introduced in this document,
      entitled "network.yang", contains a list of abstract network nodes and
      defines the concept of network hierarchy (network stack). The abstract
      network node can be augmented in inventory and topology models with
      inventory and topology specific attributes. Network hierarchy (stack)
      allows any given network to have one or more "supporting networks". The
      relationship of the base network model, the inventory models and the
      topology models is shown in the following figure (dotted lines in the
      figure denote possible augmentations to models defined in this
      document).</t>

      <figure align="center" anchor="MODEL_STRUCTURE"
              title="The network model structure">
        <artwork align="left">
               +------------------------+
               |                        |
               | Abstract Network Model |
               |                        |
               +------------------------+
                            |
                    +-------+-------+
                    |               |
                    V               V
             +------------+  ..............
             |  Abstract  |  : Inventory  :
             |  Topology  |  :  Model(s)  :
             |   Model    |  :            :
             +------------+  ''''''''''''''
                    |
      +-------------+-------------+-------------+
      |             |             |             |
      V             V             V             V
............  ............  ............  ............
:    L1    :  :    L2    :  :    L3    :  :  Service : 
: Topology :  : Topology :  : Topology :  : Topology :
:   Model  :  :   Model  :  :   Model  :  :   Model  :
''''''''''''  ''''''''''''  ''''''''''''  ''''''''''''
          </artwork>
      </figure>

      <t>The network-topology YANG module introduced in this document,
      entitled "network-topology.yang", defines a generic topology model at
      its most general level of abstraction. The module defines a topology
      graph and components from which it is composed: nodes, edges and
      termination points. Nodes (from the network.yang module) represent graph
      vertices and links represent graph edges. Nodes also contain termination
      points that anchor the links. A network can contain multiple topologies,
      for example topologies at different layers and overlay topologies. The
      model therefore allows to capture relationships between topologies, as
      well as dependencies between nodes and termination points across
      topologies. An example of a topology stack is shown in the following
      figure.</t>

      <figure align="center" anchor="TOPOLOGY_HIERARCHY_1"
              title="Topology hierarchy (stack) example">
        <artwork align="left">
       +---------------------------------------+
      /            _[X1]_          "Service"  /
     /           _/  :   \_                  /
    /          _/     :    \_               /
   /         _/        :     \_            /
  /         /           :      \          /
 /       [X2]__________________[X3]      /
+---------:--------------:------:-------+
           :              :     :
       +----:--------------:----:--------------+
      /      :              :   :        "L3" /
     /        :              :  :            /
    /         :               : :           /
   /         [Y1]_____________[Y2]         /
  /           *               * *         /
 /            *              *  *        /
+--------------*-------------*--*-------+
                *           *   *
       +--------*----------*----*--------------+
      /     [Z1]_______________[Z1] "Optical" /
     /         \_         *   _/             /
    /            \_      *  _/              / 
   /               \_   * _/               /
  /                  \ * /                /
 /                    [Z]                /
+---------------------------------------+
          </artwork>
      </figure>

      <t>The figure shows three topology levels. At top, the "Service"
      topology shows relationships between service entities, such as service
      functions in a service chain. The "L3" topology shows network elements
      at Layer 3 (IP) and the "Optical" topology shows network elements at
      Layer 1. Service functions in the "Service" topology are mapped onto
      network elements in the "L3" topology, which in turn are mapped onto
      network elements in the "Optical" topology. The figure shows two Service
      Functions - X1 and X2 - mapping onto a single L3 network element; this
      could happen, for example, if two service functions reside in the same
      VM (or server) and share the same set of network interfaces. The figure
      shows a single "L3" network element mapped onto multiple "Optical"
      network elements. This could happen, for example, if a single IP router
      attaches to multiple ROADMs in the optical domain.</t>

      <t>Another example of a service topology stack is shown in the following
      figure.</t>

      <figure align="center" anchor="TOPOLOGY_HIERARCHY_2"
              title="Topology hierarchy (stack) example">
        <artwork align="left">
                        VPN1                       VPN2
      +---------------------+    +---------------------+
     /   [Y5]...           /    / [Z5]______[Z3]      /
    /    /  \  :          /    /  : \_       / :     /
   /    /    \  :        /    /   :   \_    /  :    /
  /    /      \  :      /    /   :      \  /   :   /
 /   [Y4]____[Y1] :    /    /   :       [Z2]   :  /
+------:-------:---:--+    +---:---------:-----:-+
       :        :   :         :          :     :
       :         :   :       :           :     :
       :  +-------:---:-----:------------:-----:-----+
       : /       [X1]__:___:___________[X2]   :     /
       :/         / \_  : :       _____/ /   :     /
       :         /    \_ :  _____/      /   :     /
      /:        /       \: /           /   :     /    
     / :       /        [X5]          /   :     /
    /   :     /       __/ \__        /   :     /
   /     :   /    ___/       \__    /   :     /
  /       : / ___/              \  /   :     /
 /        [X4]__________________[X3]..:     /
+------------------------------------------+
                               L3 Topology
          </artwork>
      </figure>

      <t>The figure shows two VPN service topologies (VPN1 and VPN2)
      instantiated over a common L3 topology. Each VPN service topology is
      mapped onto a subset of nodes from the common L3 topology.</t>

      <t>There are multiple applications for such a data model. For example,
      within the context of I2RS, nodes within the network can use the data
      model to capture their understanding of the overall network topology and
      expose it to a network controller. A network controller can then use the
      instantiated topology data to compare and reconcile its own view of the
      network topology with that of the network elements that it controls.
      Alternatively, nodes within the network could propagate this
      understanding to compare and reconcile this understanding either among
      themselves or with help of a controller. Beyond the network element and
      the immediate context of I2RS itself, a network controller might even
      use the data model to represent its view of the topology that it
      controls and expose it to applications north of itself. Further use
      cases that the data model can be applied to are described in <xref
      target="topology-use-cases"/>.</t>
    </section>

    <section title="Definitions and Acronyms">
      <t>Datastore: A conceptual store of instantiated management information,
      with individual data items represented by data nodes which are arranged
      in hierarchical manner.</t>

      <t>Data subtree: An instantiated data node and the data nodes that are
      hierarchically contained within it.</t>

      <t>HTTP: Hyper-Text Transfer Protocol</t>

      <t>IGP: Interior Gateway Protocol</t>

      <t>IS-IS: Intermediate System to Intermediate System protocol</t>

      <t>NETCONF: Network Configuration Protocol</t>

      <t>OSPF: Open Shortest Path First, a link state routing protocol</t>

      <t>URI: Uniform Resource Identifier</t>

      <t>ReST: Representational State Transfer, a style of stateless interface
      and protocol that is generally carried over HTTP</t>

      <t>YANG: A data definition language for NETCONF</t>
    </section>

    <section title="Model Structure Details">
      <section title="Base Network Model">
        <t>The abstract (base) network model is defined in the network.yang
        module. Its structure is shown in the following figure. Brackets
        enclose list keys, "rw" means configuration data, "ro" means
        operational state data, and "?" designates optional nodes.  
        A "+" indicates a line break. </t>

        <figure align="center" anchor="NETWORK_NODES_STRUCTURE"
                title="The structure of the abstract (base) network model">
          <artwork align="left">

         module: ietf-network
   +--rw networks
      +--rw network* [network-id]
         +--rw network-types
         +--rw network-id            network-id
         +--ro server-provided?      boolean
         +--rw supporting-network* [network-ref]
         |  +--rw network-ref    -> /networks/network/network-id
         +--rw node* [node-id]
            +--rw node-id            node-id
            +--rw supporting-node* [network-ref node-ref]
               +--rw network-ref    -> ../../../supporting-network/ +
               |                    network-ref
               +--rw node-ref       -> /networks/network/node/node-id

          </artwork>
        </figure>

        <t>The model contains a container with a list of networks.  
        Each network is captured in its
        own list entry, distinguished via a network-id. </t> 

        <t>A network has a certain type, such as L2, L3, OSPF or IS-IS. A
        network can even have multiple types simultaneously. The type, or
        types, are captured underneath the container "network-types". In this
        module it serves merely as an augmentation target; network-specific
        modules will later introduce new data nodes to represent new network
        types below this target, i.e. insert them below "network-types" by
        ways of YANG augmentation.</t>

        <t>When a network is of a certain type, it will contain a
        corresponding data node. Network types SHOULD always be represented
        using presence containers, not leafs of empty type. This allows to
        represent hierarchies of network subtypes within the instance
        information. For example, an instance of an OSPF network (which, at
        the same time, is a layer 3 unicast IGP network) would contain
        underneath "network-types" another container "l3-unicast-igp-network",
        which in turn would contain a container "ospf-network".</t>

        <t>A network can in turn be part of a hierarchy of networks, building
        on top of other networks. Any such networks are captured in the list
        "supporting-network". A supporting network is in effect an underlay
        network.</t>

        <t>Furthermore, a network contains an inventory of nodes that are part
        of the network. The nodes of a network are captured in their own list.
        Each node is identified relative to its containing network by a
        node-id.</t>

        <t>It should be noted that a node does not exist independently of a
        network; instead it is a part of the network that it is contained in.
        In cases where the same entity takes part in multiple networks, or at
        multiple layers of a networking stack, the same entity will be
        represented by multiple nodes, one for each network. In other words,
        the node represents an abstraction of the device for the particular
        network that it a is part of. To represent that the same entity or
        same device is part of multiple topologies or networks, it is possible
        to create one "physical" network with a list of nodes for each of the
        devices or entities. This (physical) network, respectively the
        (entities) nodes in that network, can then be referred to as underlay
        network and nodes from the other (logical) networks and nodes,
        respectively. Note that the model allows to define more than one
        underlay network (and node), allowing for simultaneous representation
        of layered network- and service topologies and physical
        instantiation.</t>

        <t>Similar to a network, a node can be supported by other nodes, and
        map onto one or more other nodes in an underlay network. This is
        captured in the list "supporting-node". The resulting hierarchy of
        nodes allows also to represent device stacks, where a node at one
        level is supported by a set of nodes at an underlying level. For
        example, a "router" node might be supported by a node representing a
        route processor and separate nodes for various line cards and service
        modules, a virtual router might be supported or hosted on a physical
        device represented by a separate node, and so on.</t>
        
        <t>Finally, there is an object "server-provided".  This object 
        is state that indicates how the network came into being.    
        Network data can come into being in one of two ways.   
        In one way, network data is configured by client applications, 
        for example in case of overlay networks that are configured by an
        SDN Controller application.  In annother way, it is populated 
        by the server, in case of networks that can be discovered.
        </t>
        <t>
        If server-provided is set to false, the network was configured by a 
        client application,
        for example in the case of an overlay network that is configured 
        by a controller application.  If server-provided is set to true, 
        the network was populated 
        by the server itself, respectively an application on the server 
        that is able to discover the network. 
        Client applications SHOULD NOT modify configurations of networks 
        for which "server-provided" is true. 
        When they do, they need to be aware that 
        any modifications they make are subject to be 
        reverted by the server.  
        For servers that support NACM (Netconf Access Control
        Model), data node rules should ideally prevent 
        write access by other clients to network instances for which  
        server-provided is set to true.
        </t>
        </section>

      <section title="Base Network Topology Model">
        <t>The abstract (base) network topology model is defined in the
        "network-topology.yang" module. It builds on the network model defined
        in the "network.yang" module, augmenting it with links (defining how
        nodes are connected) and termination-points (which anchor the links
        and are contained in nodes). The structure of the network topology
        module is shown in the following figure. Brackets enclose list keys,
        "rw" means configuration data, "ro" means operational state data, and
        "?" designates optional nodes.  A "+" indicates a line break.</t>

        <figure align="center" anchor="NETWORK_TOPOLOGY_STRUCTURE"
                title="The structure of the abstract (base) network topology model">
          <artwork align="left">         
module: ietf-network-topology
augment /nd:networks/nd:network:
   +--rw link* [link-id]
      +--rw source
      |  +--rw source-node?   -> ../../../nd:node/node-id
      |  +--rw source-tp?     -> ../../../nd:node[nd:node-id=current()/+
      |                       ../source-node]/termination-point/tp-id
      +--rw destination
      |  +--rw dest-node?   -> ../../../nd:node/node-id
      |  +--rw dest-tp?     -> ../../../nd:node[nd:node-id=current()/+
      |                     ../dest-node]/termination-point/tp-id
      +--rw link-id            link-id
      +--rw supporting-link* [network-ref link-ref]
         +--rw network-ref    -> ../../../nd:supporting-network/network-ref
         +--rw link-ref       -> /nd:networks/network+
                              [nd:network-id=current()/../network-ref]/+
                              link/link-id
augment /nd:networks/nd:network/nd:node:
   +--rw termination-point* [tp-id]
      +--rw tp-id                           tp-id
      +--rw supporting-termination-point* [network-ref node-ref tp-ref]
         +--rw network-ref    -> ../../../nd:supporting-node/network-ref
         +--rw node-ref       -> ../../../nd:supporting-node/node-ref
         +--rw tp-ref         -> /nd:networks/network[nd:network-id=+
                              current()/../network-ref]/node+
                              [nd:node-id=current()/../node-ref]/+
                              termination-point/tp-id                              
           </artwork>
        </figure>

        <t>A node has a list of termination points that are used to terminate
        links. An example of a termination point might be a physical or
        logical port or, more generally, an interface.</t>

        <t>Like a node, a termination point can in turn be supported by an
        underlying termination point, contained in the supporting node of the
        underlay network.</t>

        <t>A link is identified by a link-id that uniquely identifies the link
        within a given topology. Links are point-to-point and unidirectional.
        Accordingly, a link contains a source and a destination. Both source
        and destination reference a corresponding node, as well as a
        termination point on that node. Similar to a node, a link can map onto
        one or more links in an underlay topology (which are terminated by the
        corresponding underlay termination points). This is captured in the
        list "supporting-link".</t>
      </section>

      <section title="Extending the model">
        <t>In order to derive a model for a specific type of network, the base
        model can be extended. This can be done roughly as follows: for the
        new network type, a new YANG module is introduced. In this module, a
        number of augmentations are defined against the network and
        network-topology YANG modules.</t>

        <t>We start with augmentations against the network.yang module. First,
        a new network type needs to be defined. For this, a presence container
        that resembles the new network type is defined. It is inserted by
        means of augmentation below the network-types container. Subsequently,
        data nodes for any network-type specific node parameters are defined
        and augmented into the node list. The new data nodes can be defined as
        conditional ("when") on the presence of the corresponding network type
        in the containing network. In cases where there are any requirements
        or restrictions in terms of network hierarchies, such as when a
        network of a new network-type requires a specific type of underlay
        network, it is possible to define corresponding constraints as well
        and augment the supporting-network list accordingly. However, care
        should be taken to avoid excessive definitions of constraints.</t>

        <t>Subsequently, augmentations are defined against
        network-topology.yang. Data nodes are defined both for link
        parameters, as well as termination point parameters, that are specific
        to the new network type. Those data nodes are inserted by way of
        augmentation into the link and termination-point lists, respectively.
        Again, data nodes can be defined as conditional on the presence of the
        corresponding network-type in the containing network, by adding a
        corresponding "when"-statement.</t>

        <t>It is possible, but not required, to group data nodes for a given
        network-type under a dedicated container. Doing so introduces further
        structure, but lengthens data node path names.</t>

        <t>In cases where a hierarchy of network types is defined,
        augmentations can in turn against augmenting modules, with the module
        of a network "sub-type" augmenting the module of a network
        "super-type".</t>
      </section>

      <section title="Discussion and selected design decisions">
        <section title="Container structure">
          <t>Rather than maintaining lists in separate containers, the model
          is kept relatively flat in terms of its containment structure. Lists
          of nodes, links, termination-points, and supporting-nodes,
          supporting-links, and supporting-termination-points are not kept in
          separate containers. Therefore, path specifiers used to refer to
          specific nodes, be it in management operations or in specifications
          of constraints, can remain relatively compact. Of course, this means
          there is no separate structure in instance information that
          separates elements of different lists from one another. Such
          structure is semantically not required, although it might enhance
          human readability in some cases.</t>
        </section>

        <section title="Underlay hierarchies and mappings">
          <t>To minimize assumptions of what a particular entity might
          actually represent, mappings between networks, nodes, links, and
          termination points are kept strictly generic. For example, no
          assumptions are made whether a termination point actually refers to
          an interface, or whether a node refers to a specific "system" or
          device; the model at this generic level makes no provisions for
          that.</t>

          <t>Where additional specifics about mappings between upper and lower
          layers are required, those can be captured in augmenting modules.
          For example, to express that a termination point in a particular
          network type maps to an interface, an augmenting module can
          introduce an augmentation to the termination point which introduces
          a leaf of type ifref that references the corresponding interface
          <xref target="RFC7223"/>. Similarly, if a node maps to a particular
          device or network element, an augmenting module can augment the node
          data with a leaf that references the network element.</t>

          <t>It is possible for links at one level of a hierarchy to map to
          multiple links at another level of the hierarchy. For example, a VPN
          topology might model VPN tunnels as links. Where a VPN tunnel maps
          to a path that is composed of a chain of several links, the link
          will contain a list of those supporting links. Likewise, it is
          possible for a link at one level of a hierarchy to aggregate a
          bundle of links at another level of the hierarchy.</t>
        </section>

        <section title="Dealing with changes in underlay networks">
        <t>It is possible for a network to undergo churn even as other networks 
        are layered on top of it.  When a supporting node, link, or termination 
        point is deleted, the supporting leafrefs in the overlay will be 
        left dangling.  To allow for this possibility, the model makes use 
         of the "require-instance" construct of 
         YANG 1.1 <xref target="I.D.draft-ietf-netmod-rfc6020bis"/>. 
         </t>
         <t>It is the responsibility of the application maintaining the overlay 
         to deal with the possibility of churn in the underlay network.  
         When a server receives a request to configure an overlay network, 
         it SHOULD validate whether supporting nodes/links/tps refer to nodes in 
         the underlay are actually in existence.  Configuration requests 
         in which supporting nodes/links/tps refer to objects currently not 
         in existence SHOULD be rejected.  It is the responsibility of 
         the application to update the overlay when a supporting node/link/tp 
         is deleted at a later point in time.  For this purpose, an application 
         might subscribe to updates 
         when changes to the underlay occur, for example using mechanisms
         defined in <xref target="I-D.draft-ietf-netconf-yang-push"/>.         
         </t>
        </section>
        
        <section title="Use of groupings">
          <t>The model makes use of groupings, instead of simply defining data
          nodes "in-line". This allows to more easily include the
          corresponding data nodes in notifications, which then do not need to
          respecify each data node that is to be included. The tradeoff for
          this is that it makes the specification of constraints more complex,
          because constraints involving data nodes outside the grouping need
          to be specified in conjunction with a "uses" statement where the
          grouping is applied. This also means that constraints and
          XPath-statements need to specified in such a way that they navigate
          "down" first and select entire sets of nodes, as opposed to being
          able to simply specify them against individual data nodes.</t>
        </section>

        <section title="Cardinality and directionality of links">
          <t>The topology model includes links that are point-to-point and
          unidirectional. It does not directly support multipoint and
          bidirectional links. While this may appear as a limitation, it does
          keep the model simple, generic, and allows it to very easily be
          subjected to applications that make use of graph algorithms.
          Bi-directional connections can be represented through pairs of
          unidirectional links. Multipoint networks can be represented through
          pseudo-nodes (similar to IS-IS, for example). By introducing
          hierarchies of nodes, with nodes at one level mapping onto a set of
          other nodes at another level, and introducing new links for nodes at
          that level, topologies with connections representing
          non-point-to-point communication patterns can be represented.</t>
        </section>

        <section title="Multihoming and link aggregation">
          <t>Links are terminated by a single termination point, not sets of
          termination points. Connections involving multihoming or link
          aggregation schemes need to be represented using multiple
          point-to-point links, then defining a link at a higher layer that is
          supported by those individual links.</t>
        </section>

        <section title="Mapping redundancy">
          <t>In a hierarchy of networks, there are nodes mapping to nodes,
          links mapping to links, and termination points mapping to
          termination points. Some of this information is redundant.
          Specifically, if the link-to-links mapping known, and the
          termination points of each link known, termination point mapping
          information can be derived via transitive closure and does not have
          to be explicitly configured. Nonetheless, in order to not constrain
          applications regarding which mappings they want to configure and
          which should be derived, the model does provide for the option to
          configure this information explicitly. The model includes integrity
          constraints to allow for validating for consistency.</t>
        </section>

        <section title="Typing">
          <t>A network's network types are represented using a container which
          contains a data node for each of its network types. A network can
          encompass several types of network simultaneously, hence a container
          is used instead of a case construct, with each network type in turn
          represented by a dedicated presence container itself. The reason for
          not simply using an empty leaf, or even simpler, do away even with
          the network container and just use a leaf-list of network-type
          instead, is to be able to represent "class hierarchies" of network
          types, with one network type refining the other. Network-type
          specific containers are to be defined in the network-specific
          modules, augmenting the network-types container.</t>
        </section>

        <section title="Representing the same device in multiple networks">
          <t>One common requirement concerns the ability to represent that the
          same device can be part of multiple networks and topologies.
          However, the model defines a node as relative to the network that it
          is contained in. The same node cannot be part of multiple
          topologies. In many cases, a node will be the abstraction of a
          particular device in a network. To reflect that the same device is
          part of multiple topologies, the following approach might be chosen:
          A new type of network to represent a "physical" (or "device")
          network is introduced, with nodes representing devices. This network
          forms an underlay network for logical networks above it, with nodes
          of the logical network mapping onto nodes in the physical
          network.</t>

          <t>This scenario is depicted in the following figure. It depicts
          three networks with two nodes each. A physical network P consists of
          an inventory of two nodes, D1 and D2, each representing a device. A
          second network, X, has a third network, Y, as its underlay. Both X
          and Y also have the physical network P as underlay. X1 has both Y1
          and D1 as underlay nodes, while Y1 has D1 as underlay node.
          Likewise, X2 has both Y2 and D2 as underlay nodes, while Y2 has D2
          as underlay node. The fact that X1 and Y1 are both instantiated on
          the same physical node D1 can be easily derived.</t>

          <figure align="center" anchor="TOPOLOGY_HIERARCHY_3"
                  title="Topology hierarchy example - multiple underlays">
            <artwork align="left">

                      +---------------------+    
                     /   [X1]____[X2]      /  X(Service Overlay)
                    +----:--:----:--------+    
                      ..:    :..: :
             ........:     ....: : :....
      +-----:-------------:--+    :     :...
     /   [Y1]____[Y2]....:  /      :..      :
    +------|-------|-------+          :..    :...
     Y(L3) |       +---------------------:-----+ :
           |                         +----:----|-:----------+    
           +------------------------/---[D1]  [D2]         /   
                                   +----------------------+    
                                     P (Physical network)
          </artwork>
          </figure>

          <t>In the case of a physical network, nodes represent physical
          devices and termination points physical ports. It should be noted
          that it is also conceivable to augment the model for a physical
          network-type, defining augmentations that have nodes reference
          system information and termination points reference physical
          interfaces, in order to provide a bridge between network and device
          models.</t>
        </section>
      </section>

      <section title="Supporting client-configured and server-provided network topology">
        <t>YANG requires data nodes to be designated as either configuration
        or operational data, but not both, yet it is important to have all
        network information, including vertical cross-network dependencies,
        captured in one coherent model. In most cases, network topology
        information is discovered about a network; the topology is considered
        a property of the network that is reflected in the model. That said,
        it is conceivable that certain types of topology need to also be
        configurable by an application.  The model needs to support both cases.</t>

        <t>There are several alternatives in which this can be addressed. The
        alternative chosen in this draft does not restrict network topology
        information as read-only, but includes a state "server-provided" that 
        indicates for each
        network whether it is populated by the server or by a client 
        application.    
        Client applications that do attempt to modify network topology 
        may simply see their actions reverted, not unlike other client 
        applications that compete with one another, each wanting to "own"
        the same data.  When Netconf Access Control Model <xref target="RFC6536"/> 
        is supported, node 
        access rules SHOULD be automatically maintained by a server to deny client 
        write access to network and topology instances for which "server-provided"
        is true.   
        </t>
        <t>
        It should be noted that this solution stretches 
        its use of the configuration concept slightly.
        Configuration information
        in general is subject to backup and restore, which is not applicable to 
        server-provided information.  Perhaps more noteworthy is the potential ability 
        of a client to lock a configuration and thus prevent changes 
        to server-provided network topology while the lock is in effect.   
        As a result it would potentially incur a time lag until topology changes 
        that occur in the meantime are reflected, 
        unless implementations choose to provide 
        special treatment for network topology information.</t>
        
        <t>Other alternatives had been considered.  In one alternative, 
        all information about network topology  
        is in effect is represented as network state, 
        i.e. as read-only information, regardless of how it came into being.  
        For cases where 
        network topology needs to be configured, a second branch for 
        configurable topology information is introduced.  Any network 
        topology configuration is mirrored by network state information.
        A configurable network will thus be represented twice: once in the
        read-only list of all networks, a second time in a configuration
        sandbox. One implication of this solution would have been 
        significantly increased 
        complexity of augmentations due to multiple target branches.
        </t>
        <t>
        Another alternative would make use of a YANG extension to 
        tag specific network instances as "server-provided" instead of 
        defining a leaf object, or rely on the concept of YANG metadata 
        <xref target="I-D.draft-ietf-netmod-yang-metadata"/> for the same effect. 
        The tag would be automatically applied to any topology data that comes 
        into being (respectively is configured) by an embedded application on the network, 
        as opposed to e.g. a controller application.    
        </t>
        </section>
      <section title="Identifiers of string or URI type">
      <t>The current model defines identifiers of nodes, networks, links,
      and termination points as URIs.  An alternative would define them as 
      string.  
      </t>
      <t>The case for strings is that they will be  easier to implement.  
      The reason for choosing URIs is that the topology/node/tp exists 
      in a larger context, hence it is useful to be able to correlate 
      identifiers across systems. While strings, being the universal data type, 
      are easier for human beings (a string is a string is a string), 
      they also muddle things. 
      What typically happens is that strings have some structure which is 
      magically assigned and the knowledge of this structure has to be 
      communicated to each system working with the data. 
      A URI makes the structure explicit and also attaches additional semantics: 
      the URI, unlike a free-form string, can be fed into a URI resolver, 
      which can point to additional resources associated with the URI. 
      This property is important when the topology data is integrated 
      into a larger, more complex system.</t>
      </section>
    </section>

    <section title="YANG Modules">
      <section title="Defining the Abstract Network: network.yang">
        <t><figure>
            <artwork>
&lt;CODE BEGINS&gt; file "ietf-network@2016-07-29.yang"
module ietf-network {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-network";
  prefix nd;

  import ietf-inet-types {
    prefix inet;
  }

  organization 
    "IETF I2RS (Interface to the Routing System) Working Group";
    
  contact
    "WG Web:    &lt;http://tools.ietf.org/wg/i2rs/&gt;
     WG List:   &lt;mailto:i2rs@ietf.org&gt;
     
     WG Chair:  Susan Hares
                &lt;mailto:shares@ndzh.com&gt;
                
     WG Chair:  Russ White
                &lt;mailto:russ@riw.us&gt;
     
     Editor:    Alexander Clemm
                &lt;mailto:alex@cisco.com&gt;
                
     Editor:    Jan Medved
                &lt;mailto:jmedved@cisco.com&gt;
                
     Editor:    Robert Varga
                &lt;mailto:rovarga@cisco.com&gt;
                
     Editor:    Tony Tkacik
                &lt;mailto:tony.tkacik@gmail.com&gt;
                
     Editor:    Nitin Bahadur
                &lt;mailto:nitin_bahadur@yahoo.com&gt;
                
     Editor:    Hariharan Ananthakrishnan
                &lt;mailto:hari@packetdesign.com&gt;
                
     Editor:    Xufeng Liu
                &lt;mailto:xliu@kuatrotech.com&gt;";
                
  description
    "This module defines a common base model for a collection 
     of nodes in a network. Node definitions are further used
     in network topologies and inventories.
     
     Copyright (c) 2016 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Simplified BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents 
     (http://trustee.ietf.org/license-info).

     This version of this YANG module is part of 
     draft-ietf-i2rs-yang-network-topo-05; 
     see the RFC itself for full legal notices.
     
     NOTE TO RFC EDITOR: Please replace above reference to 
     draft-ietf-i2rs-yang-network-topo-05 with RFC 
     number when published (i.e. RFC xxxx).";

  revision 2016-07-29 {
    description
      "Initial revision.
       NOTE TO RFC EDITOR: Please replace the following reference 
       to draft-ietf-i2rs-yang-network-topo-05 with 
       RFC number when published (i.e. RFC xxxx).";
    reference 
      "draft-ietf-i2rs-yang-network-topo-05";
  }

  typedef node-id {
    type inet:uri;
    description
      "Identifier for a node.  The precise structure of the node-id 
       will be up to the implementation.  Some implementations MAY 
       for example, pick a uri that includes the network-id as 
       part of the path. The identifier SHOULD be chosen such that 
       the same node in a real network topology will always be 
       identified through the same identifier, even if the model is 
       instantiated in separate datastores. An implementation MAY 
       choose to capture semantics in the identifier, for example to 
       indicate the type of node.";
  }

  typedef network-id {
    type inet:uri;
    description 
      "Identifier for a network.  The precise structure of the 
      network-id will be up to an implementation.
      The identifier SHOULD be chosen such that the same network 
      will always be identified through the same identifier, 
      even if the model is instantiated in separate datastores. 
      An implementation MAY choose to capture semantics in the 
      identifier, for example to indicate the type of network.";
  }

  grouping network-ref {
    description
      "Contains the information necessary to reference a network,
       for example an underlay network.";
    leaf network-ref {
      type leafref {
        path "/nd:networks/nd:network/nd:network-id";
      require-instance false;
      }
      description
        "Used to reference a network, for example an underlay
         network.";
    }
  }

  grouping node-ref {
    description 
      "Contains the information necessary to reference a node.";
    leaf node-ref {
      type leafref {
        path "/nd:networks/nd:network[nd:network-id=current()/../"+
          "network-ref]/nd:node/nd:node-id";
        require-instance false;
      }
      description
        "Used to reference a node.  
         Nodes are identified relative to the network they are
         contained in.";
    }
    uses network-ref;
  }

  container networks {
    description
      "Serves as top-level container for a list of networks.";     
    list network {
      key "network-id";
      description
        "Describes a network.
         A network typically contains an inventory of nodes,
         topological information (augmented through 
         network-topology model), as well as layering 
         information.";
      container network-types {
        description
          "Serves as an augmentation target.  
           The network type is indicated through corresponding
           presence containers augmented into this container.";
      }
      leaf network-id {
        type network-id;
        description
          "Identifies a network.";
      }
      leaf server-provided {
        type boolean;
        config false;
        description
          "Indicates whether the information concerning this
           particular network is populated by the server 
           (server-provided true, the general case for network 
           information discovered from the server), 
           or whether it is configured by a client 
           (server-provided true, possible e.g. for 
           service overlays managed through a controller).
           Clients should not attempt to make modifications 
           to network instances with server-provided set to 
           true; when they do, they need to be aware that 
           any modifications they make are subject to be 
           reverted by the server.  
           For servers that support NACM (Netconf Access Control
           Model), data node rules should ideally prevent 
           write access by other clients to the network instance 
           when server-provided is set to true.";
      }
      list supporting-network {
        key "network-ref";
        description
          "An underlay network, used to represent layered network
           topologies.";
        leaf network-ref {
          type leafref {
            path "/networks/network/network-id";
          require-instance false;
          }
          description
            "References the underlay network.";
        }
      }
      list node {
        key "node-id";
        description
          "The inventory of nodes of this network.";
        leaf node-id {
          type node-id;
          description
            "Identifies a node uniquely within the containing 
             network.";
        }
        list supporting-node {
          key "network-ref node-ref";
          description
            "Represents another node, in an underlay network, that 
             this node is supported by.  Used to represent layering 
             structure.";
          leaf network-ref {
            type leafref {
              path "../../../supporting-network/network-ref";
            require-instance false;
            }
            description
              "References the underlay network that the 
               underlay node is part of.";
          }
          leaf node-ref {
            type leafref {
              path "/networks/network/node/node-id";
            require-instance false; 
            }
            description
              "References the underlay node itself.";
          }
        }
      }
    }
  }
}

&lt;CODE ENDS&gt;
            </artwork>
          </figure></t>
      </section>

      <section title="Creating Abstract Network Topology: network-topology.yang">
        <t><figure>
            <artwork>
&lt;CODE BEGINS&gt; file "ietf-network-topology@2016-07-29.yang"
module ietf-network-topology {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-network-topology";
  prefix lnk;

  import ietf-inet-types {
    prefix inet;
  }
  import ietf-network {
    prefix nd;
  }

  organization 
    "IETF I2RS (Interface to the Routing System) Working Group";
    
  contact
    "WG Web:    &lt;http://tools.ietf.org/wg/i2rs/&gt;
     WG List:   &lt;mailto:i2rs@ietf.org&gt;
     
     WG Chair:  Susan Hares
                &lt;mailto:shares@ndzh.com&gt;
                
     WG Chair:  Russ White
                &lt;mailto:russ@riw.us&gt;
     
     Editor:    Alexander Clemm
                &lt;mailto:alex@cisco.com&gt;
                
     Editor:    Jan Medved
                &lt;mailto:jmedved@cisco.com&gt;
                
     Editor:    Robert Varga
                &lt;mailto:rovarga@cisco.com&gt;
                
     Editor:    Tony Tkacik
                &lt;mailto:tony.tkacik@gmail.com&gt;
                
     Editor:    Nitin Bahadur
                &lt;mailto:nitin_bahadur@yahoo.com&gt;
                
     Editor:    Hariharan Ananthakrishnan
                &lt;mailto:hari@packetdesign.com&gt;
                
     Editor:    Xufeng Liu
                &lt;mailto:xliu@kuatrotech.com&gt;";
     
  description
    "This module defines a common base model for network topology, 
     augmenting the base network model with links to connect nodes, 
     as well as termination points to terminate links on nodes.
     
     Copyright (c) 2016 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Simplified BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents 
     (http://trustee.ietf.org/license-info).

     This version of this YANG module is part of 
     draft-ietf-i2rs-yang-network-topo-05; 
     see the RFC itself for full legal notices.
     
     NOTE TO RFC EDITOR: Please replace above reference to 
     draft-ietf-i2rs-yang-network-topo-05 with RFC 
     number when published (i.e. RFC xxxx).";

  revision 2016-07-29 {
    description
      "Initial revision.
       NOTE TO RFC EDITOR: Please replace the following reference 
       to draft-ietf-i2rs-yang-network-topo-05 with 
       RFC number when published (i.e. RFC xxxx).";
    reference 
      "draft-ietf-i2rs-yang-network-topo-05";
  }

  typedef link-id {
    type inet:uri;
    description
      "An identifier for a link in a topology. 
       The precise structure of the link-id 
       will be up to the implementation.  
       The identifier SHOULD be chosen such that the same link in a
       real network topology will always be identified through the
       same identifier, even if the model is instantiated in 
	   separate datastores. An implementation MAY choose to capture
       semantics in the identifier, for example to indicate the type
       of link and/or the type of topology that the link is a part 
       of.";
  }

  typedef tp-id {
    type inet:uri;
    description
      "An identifier for termination points (TPs) on a node.
       The precise structure of the tp-id 
       will be up to the implementation.  
       The identifier SHOULD be chosen such that the same termination
       point in a real network topology will always be identified 
       through the same identifier, even if the model is instantiated 
       in separate datastores. An implementation MAY choose to 
       capture semantics in the identifier, for example to indicate 
       the type of termination point and/or the type of node 
       that contains the termination point."; 
  }

  grouping link-ref {
    description
      "References a link in a specific network.";
    leaf link-ref {
      type leafref {
        path "/nd:networks/nd:network[nd:network-id=current()/../"+
          "network-ref]/lnk:link/lnk:link-id";
        require-instance false;
      }
      description
        "A type for an absolute reference a link instance.
         (This type should not be used for relative references.
         In such a case, a relative path should be used instead.)";
    }
    uses nd:network-ref;
  }

  grouping tp-ref {
    description
      "References a termination point in a specific node.";
    leaf tp-ref {
      type leafref {
        path "/nd:networks/nd:network[nd:network-id=current()/../"+
          "network-ref]/nd:node[nd:node-id=current()/../"+
          "node-ref]/lnk:termination-point/lnk:tp-id";
        require-instance false;
      }
      description
        "A type for an absolute reference to a termination point.
         (This type should not be used for relative references.
         In such a case, a relative path should be used instead.)";
    }
    uses nd:node-ref;
  }

  augment "/nd:networks/nd:network" {
    description 
      "Add links to the network model.";
    list link {
      key "link-id";
      description
        "A network link connects a local (source) node and
         a remote (destination) node via a set of 
         the respective node's termination points.
         It is possible to have several links between the same
         source and destination nodes.  Likewise, a link could
         potentially be re-homed between termination points.
         Therefore, in order to ensure that we would always know 
         to distinguish between links, every link is identified by 
         a dedicated link identifier.  Note that a link models a 
         point-to-point link, not a multipoint link.
         Layering dependencies on links in underlay topologies are
         not represented, as the layering information of nodes and of
         termination points is sufficient.";
      container source {
        description
          "This container holds the logical source of a particular
           link.";
        leaf source-node {
          type leafref {
            path "../../../nd:node/nd:node-id";
            require-instance false;
          }
          description
            "Source node identifier, must be in same topology.";
        }
        leaf source-tp {
          type leafref {
            path "../../../nd:node[nd:node-id=current()/../"+
              "source-node]/termination-point/tp-id";
            require-instance false;
          }
          description
            "Termination point within source node that terminates
             the link.";
        }
      }
      container destination {
        description
          "This container holds the logical destination of a
           particular link.";
        leaf dest-node {
          type leafref {
            path "../../../nd:node/nd:node-id";
          require-instance false;
          }
          description
            "Destination node identifier, must be in the same
             network.";
        }
        leaf dest-tp {
          type leafref {
            path "../../../nd:node[nd:node-id=current()/../"+
              "dest-node]/termination-point/tp-id";
            require-instance false;
          }
          description
            "Termination point within destination node that
             terminates the link.";
        }
      }
      leaf link-id {
        type link-id;
        description
          "The identifier of a link in the topology.
           A link is specific to a topology to which it belongs.";
      }
      list supporting-link {
        key "network-ref link-ref";
        description
          "Identifies the link, or links, that this link
           is dependent on.";
        leaf network-ref {
          type leafref {
            path "../../../nd:supporting-network/nd:network-ref";
          require-instance false;
          }
          description
            "This leaf identifies in which underlay topology
             the supporting link is present.";
        }
        leaf link-ref {
          type leafref {
            path "/nd:networks/nd:network[nd:network-id=current()/"+
              "../network-ref]/link/link-id";
            require-instance false;
          }
          description
            "This leaf identifies a link which is a part
             of this link's underlay. Reference loops in which
             a link identifies itself as its underlay, either
             directly or transitively, are not allowed.";
        }
      }
    }
  }
  augment "/nd:networks/nd:network/nd:node" {
    description
      "Augment termination points which terminate links.  
       Termination points can ultimately be mapped to interfaces.";
    list termination-point {
      key "tp-id";
      description
        "A termination point can terminate a link.
         Depending on the type of topology, a termination point
         could, for example, refer to a port or an interface.";
      leaf tp-id {
        type tp-id;
        description
          "Termination point identifier.";
      }
      list supporting-termination-point {
        key "network-ref node-ref tp-ref";
        description
          "This list identifies any termination points that
           the termination point is dependent on, or maps onto.
           Those termination points will themselves be contained
           in a supporting node.
           This dependency information can be inferred from
           the dependencies between links.  For this reason,
           this item is not separately configurable.  Hence no
           corresponding constraint needs to be articulated.
           The corresponding information is simply provided by the
           implementing system.";
        leaf network-ref {
          type leafref {
            path "../../../nd:supporting-node/nd:network-ref";
          require-instance false;
          }
          description
            "This leaf identifies in which topology the
             supporting termination point is present.";
        }
        leaf node-ref {
          type leafref {
            path "../../../nd:supporting-node/nd:node-ref";
          require-instance false;
          }
          description
            "This leaf identifies in which node the supporting
             termination point is present.";
        }
        leaf tp-ref {
          type leafref {
            path "/nd:networks/nd:network[nd:network-id=current()/"+
              "../network-ref]/nd:node[nd:node-id=current()/../"+
              "node-ref]/termination-point/tp-id";
            require-instance false;
          }
          description
            "Reference to the underlay node, must be in a
             different topology";
        }
      }
    }
  }
}

&lt;CODE ENDS&gt;
            </artwork>
          </figure></t>
      </section>
    </section>

    <section title="Security Considerations">
      <t>The transport protocol used for sending the topology data MUST
      support authentication and SHOULD support encryption. The data-model by
      itself does not create any security implications.</t>
    </section>

    <section title="Contributors">
      <t>The model presented in this paper was contributed to by more people
      than can be listed on the author list. Additional contributors include:
      <list style="symbols">
          <t>Ken Gray, Cisco Systems</t>
          <t>Tom Nadeau, Brocade</t>
          <t>Aleksandr Zhdankin, Cisco</t>
        </list></t>
    </section>

    <section title="Acknowledgements">
      <t>We wish to acknowledge the helpful contributions, comments, and
      suggestions that were received from Alia Atlas, Vishnu Pavan Beeram,
      Andy Bierman, Martin Bjorklund, Igor Bryskin, Benoit Claise, 
      Susan Hares, Ladislav Lhotka, 
      Carlos Pignataro, Juergen Schoenwaelder, Kent Watsen, and Xian Zhang.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">

      <reference anchor="RFC1195">
        <front>
            <title>Use of OSI IS-IS for Routing in TCP/IP and Dual Environments</title>
            <author initials='R.' surname='Callon' fullname='R. Callon'>
                <organization />
            </author>
            <date month='December' year='1990' />
        </front>
        <seriesInfo name='RFC' value='1195' />
      </reference>
      
      <reference anchor="RFC2328">
        <front>
            <title>OSPF Version 2</title>
            <author initials='J.' surname='Moy' fullname='J. Moy'>
                <organization />
            </author>
            <date month='April' year='1998' />
        </front>
        <seriesInfo name='RFC' value='2328' />      
      </reference>
      
      <reference anchor="RFC3209">
        <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author initials='D.' surname='Awduche' fullname='D. Awduche'>
                <organization />
            </author>
            <author initials='L.' surname='Berger' fullname='L. Berger'>
                <organization />
            </author>
            <author initials='D.' surname='Gan' fullname='D. Gan'>
                <organization />
            </author>
            <author initials='T.' surname='Li' fullname='T. Li'>
                <organization />
            </author>
            <author initials='V.' surname='Srinivasan' fullname='V. Srinivasan'>
                <organization />
            </author>
            <author initials='G.' surname='Swallow' fullname='G. Swallow'>
                <organization />
            </author>
            <date month='December' year='2001' />
        </front>
        <seriesInfo name='RFC' value='3209' />
      </reference>

      <reference anchor="RFC6020">
        <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'>
                <organization />
            </author>
            <date month='October' year='2010' />
        </front>
        <seriesInfo name='RFC' value='6020' />
      </reference>
      
      <reference anchor="RFC6021">
        <front>
            <title>Common YANG Data Types</title>
            <author initials='J.' surname='Schoenwaelder' fullname='J. Schoenwaelder'>
                <organization />
            </author>
            <date month='October' year='2010' />
        </front>
        <seriesInfo name='RFC' value='6021' />
      </reference>
     
      <reference anchor="RFC6241">
        <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author initials='R.' surname='Enns' fullname='R. Enns'>
                <organization />
            </author>
            <author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'>
                <organization />
            </author>
            <author initials='J.' surname='Schoenwaelder' fullname='J. Schoenwaelder'>
                <organization />
            </author>
            <author initials='A.' surname='Bierman' fullname='A. Bierman'>
                <organization />
            </author>            
            <date month='June' year='2011' />
        </front>
        <seriesInfo name='RFC' value='6241' />
      </reference>
      
      <reference anchor="RFC6536">
        <front>
            <title>Network Configuration Protocol (NETCONF) Access Control Model</title>
            <author initials='A.' surname='Bierman' fullname='A. Bierman'>
                <organization />
            </author>            
            <author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'>
                <organization />
            </author>
            <date month='March' year='2012' />
        </front>
        <seriesInfo name='RFC' value='6536' />
      </reference>
      
      <reference anchor="RFC7223">
        <front>
            <title>A YANG Data Model for Interface Management</title>
            <author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'>
                <organization />
            </author>
            <date month='May' year='2014' />
        </front>
        <seriesInfo name='RFC' value='7223' />
      </reference>
      
      <reference anchor="I.D.draft-ietf-netmod-rfc6020bis">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>

          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
            <organization/>
          </author>

          <date month="June" year="2016"/>
        </front>

        <seriesInfo name="I-D" value="draft-ietf-netmod-rfc6020bis-14"/>
      </reference>
      
    </references>

    <references title="Informative References">

      <reference anchor="I-D.draft-ietf-netmod-yang-metadata">
          <front>
          <title>Defining and Using Metadata with YANG</title>

          <author fullname="L. Lhotka" initials="L." surname="Lhotka">
            <organization/>
          </author>

          <date month="March" year="2016"/>
        </front>

        <seriesInfo name="I-D" value="draft-ietf-netmod-yang-metadata-07"/>
      </reference>
      <reference anchor="topology-use-cases">
        <front>
          <title>Topology API Use Cases</title>

          <author fullname="J.Medved" initials="J." surname="Medved">
            <organization/>
          </author>

          <author fullname="S. Previdi" initials="S." surname="Previdi">
            <organization/>
          </author>

          <author fullname="V. Lopez" initials="V." surname="Lopez">
            <organization/>
          </author>

          <author fullname="S. Amante" initials="S." surname="Amante">
            <organization/>
          </author>

          <date month="October" year="2013"/>
        </front>

        <seriesInfo name="I-D" value="draft-amante-i2rs-topology-use-cases-01"/>
      </reference>
      <reference anchor="I-D.draft-ietf-netconf-yang-push">
        <front>
          <title>Subscribing to YANG datastore push updates</title>

          <author fullname="Alexander Clemm" initials="A" surname="Clemm">
            <organization/>
          </author>

          <author fullname="Eric Voit" initials="E" surname="Voit">
            <organization/>
          </author>

          <author fullname="Alberto Gonzalez Prieto" initials="A" surname="Gonzalez Prieto">
            <organization/>
          </author>

          <author fullname="Ambika Tripathy" initials="A" surname="Tripathy">
            <organization/>
          </author>
          
          <author fullname="Einar Nilsen-Nygaard" initials="E" surname="Nilsen-Nygaard">
            <organization/>
          </author>
          
          <date day="16" month="June" year="2016"/>
        </front>

        <seriesInfo name="I-D" value="draft-ietf-netconf-yang-push-03"/>

      </reference>

    </references>
  </back>
</rfc>
