<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-marcas-nmop-knowledge-graph-yang-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="knowledge-graph-yang">Knowledge Graphs for YANG-based Network Management</title>
    <seriesInfo name="Internet-Draft" value="draft-marcas-nmop-knowledge-graph-yang-00"/>
    <author initials="I. D." surname="Martinez-Casanueva" fullname="Ignacio Dominguez Martinez-Casanueva">
      <organization>Telefonica Innovacion Digital</organization>
      <address>
        <email>ignacio.dominguezmartinez@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="07"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>knowledge graph</keyword>
    <keyword>semantics</keyword>
    <keyword>data integration</keyword>
    <keyword>RDF</keyword>
    <abstract>
      <?line 73?>

<t>The success of the YANG language and YANG-based protocols for managing the network has unlocked new opportunities in network analytics. However, the wide heterogeneity of YANG models hinders the consumption and analysis of network data. Besides, data encoding formats and transport protocols will differ depending on the network management protocol supported by the network device. These challenges call for new data management paradigms that facilitate the discovery, understanding, integration and access to silos of heterogenous YANG data, abstracting from the complexities of the network devices.</t>
      <t>This document introduces the knowledge graph paradigm has a solution to this data management problem, with focus on YANG-based network management. The document provides background on related topics such as ontologies and graph standards, and shares guidelines for implementing knowledge graphs from YANG data.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://idomingu.github.io/knowledge-graph-yang/draft-marcas-knowledge-graph-yang.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-marcas-nmop-knowledge-graph-yang/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Management Operations Working Group mailing list (<eref target="mailto:nmop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nmop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/idomingu/knowledge-graph-yang"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The size and complexity of networks keeps increasing, thus the path towards enabling an autonomous network requires the combination of network telemetry mechanisms <xref target="RFC9232"/>. These mechanisms range from legacy protocols like SNMP to the recent model-driven telemetry (MDT) based on the YANG language <xref target="RFC7950"/> and network management protocols such as NETCONF <xref target="RFC6241"/> or gNMI <xref target="gnmi"/>.</t>
      <t>MDT in particular has drawn the attention of the network industry due to the benefits of modeling configuration and status data of the network with a formal data modeling language like YANG. However, since the inception of YANG, the network industry has experienced the massive creation of YANG data models developed by vendors, standards developing organizations (e.g., IETF), and consortia (e.g., OpenConfig). In turn, these data models target different abstraction layers of the network, namely, network element, and network service <xref target="RFC8199"/>. Additionally, YANG data models may augment or deviate other models to respectively define new features or remove existing ones depending on the device implementation. In summary, this tendency has resulted into a wide variety of independent YANG data models, hence, the creation of data silos in the network.</t>
      <t>Such amount and heterogeneity of YANG data models has hindered the collection and combination of network data for advanced network analytics. The current landscape shows different YANG models referencing the same concepts in a different way. For example, ietf-interface from the IETF and openconfig-interfaces from OpenConfig follow different structures and syntax, but both reference the same “interface” concept. On the other, YANG models conveying semantic relationships with other concepts via identifiers as shown in <xref target="RFC9418"/>, where the leaf “device” hints a relationship between the “subservice “concept and the “device” concept.</t>
      <artwork><![CDATA[
module: ietf-service-assurance-device

     augment /sain:subservices/sain:subservice/sain:parameter:
       +--rw parameters
          +--rw device    string
]]></artwork>
      <t>The extraction of this hidden knowledge from YANG models would enable the integration of YANG data silos at a conceptual level, regardless of the physical implementation (i.e., the YANG schema, syntax, and encoding format). In this regard, the knowledge graph is getting traction as promising technology that can link data silos based on common concepts like “device” that are captured in ontologies. Besides, by transforming the YANG data into a graph structure the relationships between data silos are represented as first class citizens in the graph instead of “foreign keys” where the relationship is made implicit. In the following, this document provides guidelines for building a knowledge graph for data sources based on the YANG language.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="background">
      <name>Background</name>
      <section anchor="knowledge-graphs">
        <name>Knowledge Graphs</name>
        <t>A knowledge graph contains a collection of facts alongside what know we about them and represents following a graph structure. Knowledge graphs enable a contextualized understanding of data as the data (i.e., the individuals, instance) travel with the meaning of the data themselves (i.e., the concepts, knowledge). For example, a knowledge graph can contain data about an interface “eth0”, but also, that an interface can be physical or virtual, belongs to a network device, and has a name, description, and an mtu.</t>
        <t>To this end, knowledge graphs build upon on ontologies, which are explicit representations of conceptualizations in a specific domains. In other words, ontologies can be seen as representations of conceptual models following a formal logic that allows machines to understand and reason over them. In this regard, a conceptual model model, also known as information model, may translate into different data models depending on the data source technology <xref target="RFC3444"/>.</t>
        <t>By mapping the data models (i.e., physical level) with the concepts represented in ontologies (i.e., conceptual level), we can find heterogenous datasets scattered in the network that reference common concepts such as “interface” or “device”. Based on this semantic mapping, in addition to the flexibility of the graph structure, knowledge graphs enable the integration of heterogenous data based their semantics is what knowledge graphs can deliver.</t>
      </section>
      <section anchor="graph-standards">
        <name>Graph standards</name>
        <t>The RDF data model from the W3C Semantic Web has been considered the standard graph data model given its maturity. For this reason, most of the knowledge graph implementation have relied upon the RDF standard and other standards from the Semantic Web like RDFS, OWL, SHACL, and SPARQL.</t>
        <t>However, the late success of graph databases like Neo4j have proved the Labelled Property Graph (LPG) data model as an alternative for implementing knowledge graphs. Aiming to bridge the gap between these two graph data models, the W3C RDF-Star working group is working towards evolving RDF to facilitate the representation of statement about statements.</t>
        <t>Similarly, the ETSI ISG CIM defined the NGSI-LD standard, which builds upon two novelties: i) NGSI-LD information model that derives from the LPG model and grounds on the RDF for a semantic annotation of the data in the graph; ii) the NGSI-LD API, which defines a REST API for building and interacting with the graph.</t>
      </section>
    </section>
    <section anchor="knowledge-graph-construction">
      <name>Knowledge Graph Construction</name>
      <t>The construction of a knowledge graph can be divided into two main activities: ontology development and knowledge graph construction pipeline.</t>
      <section anchor="ontology-development">
        <name>Ontology Development</name>
        <t>Ontologies provide the formal representation of the conceptual models that capture the semantics of data, and building on this, the integration of data in the knowledge graph. Ontologies can be developed following different techniques, ranging from manual to fully automated, depending on the characteristics of the data to be integrated in the knowledge graph (e.g., format, schema).</t>
        <section anchor="automatic-knowledge-extraction-from-yang-models">
          <name>Automatic knowledge extraction from YANG models</name>
          <t>The extraction of knowledge from YANG models can be automated, in particular, by analyzing YANG identities to generate controlled vocabularies and taxonomies.</t>
          <t>RFC 7950 defines a YANG identity as “globally unique, abstract, and untyped identity”, therefore, a relation between a YANG identity and a concept is straightforward. Additionally, YANG identities can inherit from other YANG identities via the “base” statement. These ideas align with the notion of a taxonomy, where concepts are hierarchically linked with other concepts.</t>
          <t>To support the creation of knowledge structures like taxonomies or thesauri, the W3C standardized the Simple Knowledge Organization System (SKOS). In this ontology, a concept scheme comprises a set of concepts that can be linked with other concepts via hierarchical and associative relations. In the case of YANG, a YANG model containing YANG identities can be represented as an instance of the skos:ConceptScheme class. Next, all YANG identities included in the YANG model can be represented as skos:Concept instances that are contained in the concept scheme. Lastly, those YANG identities that include the “base” statement, the respective SKOS concept will include a relation skos:broader whose range is the SKOS concept representing the parent YANG identity.</t>
          <t>TBD: Include an example here or in the annex</t>
        </section>
        <section anchor="standard-development-methodologies">
          <name>Standard development methodologies</name>
          <t>Automating the extraction of all the knowledge from YANG models is not possible, and therefore, manual intervention from domain experts is required. To ease this process a recommended practice is to develop the ontology by following a standard methodology like Linked Open Terms (LOT).</t>
          <t>LOT is an ontology development methodology that adopts best practices from agile software development. The methodology has been widely used in European projects as well as in the creation of the ETSI SAREF ontology and its extensions. Precisely, with SAREF Ontology ETSI tackled a similar problem in the scope of IoT, where there is a heterogeneous variety of standard data models and protocols. The methodology iterates over a workflow of the following four activities: i) ontology requirements specification; ii) ontology implementation; iii) ontology publication, and iv) ontology maintenance.</t>
          <t>The workflow starts with the specification of requirements that the ontology must fulfill. For this the methodology proposes collecting knowledge from domain experts, but also by analyzing the data sources (e.g., network devices) and schemas for the data (e.g., YANG models) to be ingested and integrated in the knowledge graph. LOT recommends several approaches such as competency questions (CQs), natural language statements, or tabular information inspired by METHONTOLOGY.</t>
          <t>TBD: Include sample requirements of network topology YANG model (RFC 8345).</t>
        </section>
      </section>
      <section anchor="construction-pipeline">
        <name>Construction Pipeline</name>
        <t>The construction of a knowledge graph is supported by a data pipeline that follows the archetypical Extract-Transform-Load (ETL), wherein the raw data is collected from the source, transformed, and finally, stored for consumption. In this sense, the knowledge graph creation can be split into multiple steps as depicted in Fig X.</t>
        <artwork><![CDATA[
+-----------+       +---------+       +-----------------+
|           |       |         |       |                 |
| Ingestion +------>| Mapping +------>| Materialization |
|           | Raw   |         | RDF   |                 |
+-----------+ data  +---------+ data  +--------+--------+
      ^      (YANG)                            |
 Raw  |                                        | RDF
 data |                                        | data
(YANG)|                                        |
      |                                        v
+-----+----+                             +-----------+
|   Data   |                             | Knowledge |
|  Source  |                             |   Graph   |
| (device) |                             +-----------+
+----------+
]]></artwork>
        <t>These steps are the following: ingestion, mapping, and materialization.</t>
        <section anchor="ingestion">
          <name>Ingestion</name>
          <t>Represents the first step in the creation of the knowledge graph. This step is realized by means of collectors that ingest raw data from the selected data source. These collectors implement data access protocols which are specific to the technology and type of the data source. When it comes to network management protocols based on YANG, these protocols can be NETCONF <xref target="RFC6241"/>, RESTCONF<xref target="RFC8040"/> and gNMI<xref target="gnmi"/>.</t>
          <t>Two main types of data sources are identified based on the techniques used to ingest the data, namely, batch and streaming. In the case of batch data sources data are pulled (once or periodically) from the data source. This could be represented by queries sent to a YANG-server like an SDN controller to fetch the network topology <xref target="RFC8345"/>.</t>
          <t>Regarding streaming data sources, the collector subscribes to the YANG-server to receives notifications of YANG data periodically or upon changes in the data source (e.g., a network device whose interface goes down). These subscriptions can be realized, either based on configurations or dynamically, using mechanisms like YANG Push<xref target="RFC8641"/>. But additionally, another common scenario is the use of message broker systems like Apache Kafka for decoupling the ingestion of streams of YANG data <xref target="I-D.netana-nmop-yang-message-broker-integration"/>. Hence, knowledge graph collectors could also support the ingestion of YANG data from these kinds of message brokers, as shown in Fig X.</t>
          <artwork><![CDATA[
   +------------------------------------------------------------+
   |                  Knowledge Graph Database                  |
   +------------------------------------------------------------+
                                  ^
                                  | (11) RDF data
                                  |
   +------------------------------------------------------------+
   |            Knowledge Graph Construction Pipeline           |
   +------------------------------------------------------------+
(9) Get  |  ^                                   ^ (8) Validate serialized Message
 Schema  |  |                                   | Against Schema on Consumer
         |  |                                   |
         |  |                                   |
         |  | (10) Issue                        | (7) Serialize YANG-Push Message
         v  | Schema             (5) Post       | annotated Schema ID
   +--------------------+          Schema  +--------------------+
   |       YANG         | <--------------  |  Data Collection   |
   |  Schema Registry   | -------------->  | YANG-Push Receiver |
   +--------------------+ (6) Issue        +--------------------+
                          Schema ID     (3) Get |  ^ (2) Receive YANG-Push
                                         Schema |  | Subscription Start Message
                                                |  |   ^
                                                |  |   |
                                                |  |   | (4) Publish YANG-Push
                                                v  |   | Message with Subscription ID
   +--------------------+                  +--------------------+
   |      Network       | (1) Subscribe    |   Network Node     |
   |   Orchestration    | ---------------> | YANG-Push Publisher|
   +--------------------+                  +--------------------+

]]></artwork>
          <t>TBD: Fig X (Integration of KG construcion pipeline with YANG-kafka pipeline)</t>
        </section>
        <section anchor="mapping">
          <name>Mapping</name>
          <t>This second step receives the raw data data from the Ingestion step. Here, the raw data is mapped to the concepts capture in one or more ontologies. By applying these mapping rules, the raw data is semantically annotated and transformed into RDF data. These mappings can be declared using declarative languages like RDF Mapping Language (RML).</t>
          <t>RML is a declarative language that is currently being standardized within the W3C KGC that allows for defining mappings rules for raw data encoded in semi-structured formats like XML or JSON. The benefits of using a declarative language like RML are twofold: i) the engine that implements the RML rules is generic, thus the mappings rules are decoupled from the code; ii) the explicit representation of mapping and transformation rules as part of the knowledge graph provides data lineage insights that can greatly improve data quality and the troubleshooting of data pipelines. RML is making progress towards becoming a standard, but support of additional YANG encoding formats like CBOR <xref target="RFC8949"/> or Protobuf remains a challenge.</t>
        </section>
        <section anchor="materialization">
          <name>Materialization</name>
          <t>This is the final step of the knowledge graph creation. This step receives as an input the RDF data generated in the Mapping step. At this point, the RDF data can be sent to an RDF triple store like Apache Fuseki <xref target="fuseki"/> for consumption via SPARQL. But alternatively, this step may transform the RDF data into an LPG structure and store the resulting data in a graph database like Neoj4 <xref target="neo4j"/>. Similarly, the RDF data could also be transformed into the ETSI NGSI-LD standard and stored in an NGSI-LD Context Broker.</t>
        </section>
      </section>
    </section>
    <section anchor="knowledge-graph-applications">
      <name>Knowledge Graph Applications</name>
      <ul spacing="normal">
        <li>
          <t>Network performance KPIs: The integration of data at different levels of abstraction in the network can facilitate the computation of network performance KPIs, such as throughput or packet loss ratio. By integrating data silos such as the network topology with the status of network interfaces, a network analytics application could ask the knowledge graph to compute the throughput or packets loss ratio at a specific link in the network.</t>
        </li>
        <li>
          <t>Anomaly detection and incident management: Projects like NORIA have demonstrated how knowledge graphs can help in the detection of anomalies in network systems. This approach links data pertaining to different data silos like network infrastructure, logs, alarms, and ticketing. In another example, the combination network topology data with data about network interface status, consumers of the knowledge graph can detect network anomalies like link fault because an network interface has been unexpectedly disabled but it was configured to be enabled.</t>
        </li>
        <li>
          <t>Service assurance: A knowledge graph can enable the implementation of the service assurance for intent-based networking architecture defined in <xref target="RFC9417"/>. Precisely, this architecture,  and the companion YANG data models from RFC 9418, define an assurance graph where dependencies among network services and their associated health and symptoms are captured. All these data, which can be further linked with other data silos like network topology or network interface status, can be naturally integrated and represented in a knowledge graph.</t>
        </li>
        <li>
          <t>Network digital twins: Knowledge graph are considered promising candidates for the realization of network digital twins <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>. The ability to integrate heterogenous silos of data, in combination with the explicit representation of the semantics of the data, make knowledge graph a powerful technology for building and connecting multiple network digital twins. In addition, the representation of concepts by means of ontologies, produces abstract representations of network digital twins, regardless of the complexities of the underlying technologies. For instance, an abstract representation of a network topology Digital Map <xref target="I-D.havel-nmop-digital-map"/> in the knowledge graph can be translated into a descriptor or data model that is specific to the technology used (e.g., KNE, ContainerLab, OSM).</t>
        </li>
        <li>
          <t>Evolution of YANG Catalog: The flexibility and extensibility of knowledge graphs have made them a popular choice for implementing data catalogs. The purpose of a data catalog is to provide consumers with a registry of datasets exposed by data sources where to find data of interest. Additionally, these datasets can be linked to the (business) concepts that they refer to, so that consumers can search for datasets based on relevant concepts such as “interface”. Taking inspiration from these implementations, and building on a knowledge graph, the YANG Catalog could evolve towards a data catalog, where the YANG modules represent those datasets of interest. The dependencies between YANG models (import, deviations, augments) can be naturally represented in the knowledge graph. In turn, these YANG models can be linked with concepts that are represented in ontologies. Additionally, these YANG models, can be combined with the implementation details of network devices yang lib augment <xref target="I-D.lincla-netconf-yang-library-augmentation"/> that could be part of an inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
        </li>
        <li>
          <t>Contextualized telemetry data: Having context of how YANG telemetry data <xref target="I-D.ietf-opsawg-collected-data-manifest"/> is being collected can improve the understanding of the data for network analytics or closed-loop automation. Knowledge graphs can help in this task by linking the collected data with: i) the metadata that characterizes the platform producing the data; and ii) the metadata that characterizes how and when the data were metered.</t>
        </li>
      </ul>
    </section>
    <section anchor="challenges">
      <name>Challenges</name>
      <ul spacing="normal">
        <li>
          <t>Ontology development: Time-consuming task that requires skills in knowledge management and conceptual modeling. Additionally, ontology developers should maintain a tight coordination with domain owners and ontology users. Following a standard methodology like LOT provides guidance in the process but still, the development of the ontology requires manual work. Tools that can produce or bootstrap ontologies from existing YANG data models in a semi-automatic, or even automatic, are desirable. In this sense, the future release of the YANG language could be extended to facilitate this task at design time. YANG data models could include explicit semantics in the data models, in the same way that JSON-LD <xref target="jsonld"/> or CSVW <xref target="csvw"/> include metadata indicating which concepts from concepts are referenced by the data. In the current version of YANG, this could be achieved at runtime using the YANG Metadata extension <xref target="RFC7952"/>. With this extension, YANG data models could include additional metadata to indicate the ontology concept a YANG data node is referring to, though this approach only works at runtime, and additionally, it would require augmenting existing YANG data models.</t>
        </li>
        <li>
          <t>Pipeline performance: To integrate the raw data from the original source into the knowledge graph entails several steps as described before. This steps add an extra latency before having the data stored in the knowledge graph for consumption. This latency can be an important limitation for real-time analytics use cases.</t>
        </li>
        <li>
          <t>Scalability: The knowledge graph must be able to integrate massive amounts of data collected from the network. Distributed and federated architectures can improve the scalability of a global, composable knowledge graph. However, these architectures add complexity to the management of knowledge graph as well as extra latency when federating requests.</t>
        </li>
        <li>
          <t>Virtualization: The common approach for data integration is by materializing the data in the knowledge graph, which entails duplicating the data. However, this approach presents multiple limitations in terms of data governance and data cadence. Regarding data governance, having copies of the original data hampers keeping track of all the available data. With respect to data cadence, in particular for batch data sources, data are periodically pulled from the source at particular frequency, which might not be optimal depending on the use case. In this sense, data virtualization introduces a new data access technique that can overcome these limitations. With this technique, the knowledge graph defines pointers to the data at the original source, and the KGC pipeline performs the ingestion and mapping of the data, and eventually the delivery of data to the consumer, only when requested on demand.</t>
        </li>
        <li>
          <t>Network configuration: This document has focused on integrating telemetry data in the knowledge graph for monitoring purposes. But knowledge graphs could also be leveraged for integrating data related to the configuration of devices and services in the network. This approach could enable closed-loop network management since both configuration and operational data are stored in the knowledge graph.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Access control to data: The knowledge graph becomes an integrator of data, and, in many cases, sensible. Therefore, data access control mechanisms must be present to ensure that only authorized consumers can discover and access data from the knowledge graph. Access control policies based on roles or attributes are common approaches, but additional aspects like sensitivity of data could be included in the policy.</t>
        </li>
        <li>
          <t>Integrity and authenticity of mappings: The declaration of mappings of raw data to concepts in ontologies is a critical step in the knowledge graph construction. Unauthorized mappings, or even tampered mappings, can lead to security breaches and anomalies producing a great impact on  analytics and machine learning applications that consume data from the knowledge graph. To protect consumers from these scenarios, the knowledge graph must include mechanisms that verify the correctness, authenticity, and integrity of the mappings used in the construction of the graph. Only data owners, as accountable of their data, should be authorized to define and deploy mappings for the knowledge graph construction.</t>
        </li>
        <li>
          <t>Data provenance: Keeping track of the history of data as they go through the knowledge graph construction pipeline can improve the quality of the data of the knowledge graph. As part of the knowledge graph construction, signatures can be appended to the data <xref target="I-D.lopez-opsawg-yang-provenance"/>, can help in verifying that such data come from the golden data source, and therefore, that the data can be trusted.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <ul spacing="normal">
        <li>
          <t>Should RML mappings reference data at the YANG level using XPath or subtree filters? Or references should remain based on the actual encoding format used by the network management protocol, e.g., JSON, XML.</t>
        </li>
        <li>
          <t>Should this document provide guidelines for generating URIs of nodes/subjects in the knowledge graph? Take into account there are several levels of abstraction device vs network/service level. For example, the URI that identifies a network interface cannot be generated only from the name of the interface as there could conflicts with other interfaces of other network devices having the same name.</t>
        </li>
        <li>
          <t>Definition of YANG data sources with formal vocabulary, similar to what Web of Things ontology has done for MQTT or REST APIs or D2RQ ontology for relational databases. Having the specification of the data source in the knowledge graph improves provenance and decouples the configuration from the implementation, e.g., via custom INI config file.</t>
        </li>
        <li>
          <t>More examples? References to implementations based on open-source implementations, shown in hackathon</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7952">
          <front>
            <title>Defining and Using Metadata with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines a YANG extension that allows for defining metadata annotations in YANG modules. The document also specifies XML and JSON encoding of annotations and other rules for annotating instances of YANG data nodes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7952"/>
          <seriesInfo name="DOI" value="10.17487/RFC7952"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9232">
          <front>
            <title>Network Telemetry Framework</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="A. Wang" initials="A." surname="Wang"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9232"/>
          <seriesInfo name="DOI" value="10.17487/RFC9232"/>
        </reference>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="I-D.netana-nmop-yang-message-broker-integration">
          <front>
            <title>An Architecture for YANG-Push to Message Broker Integration</title>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Ahmed Elhassany" initials="A." surname="Elhassany">
              <organization>Swisscom</organization>
            </author>
            <date day="22" month="April" year="2024"/>
            <abstract>
              <t>   This document describes the motivation and architecture of a native
   YANG-Push notifications and YANG Schema integration into a Message
   Broker and YANG Schema Registry.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-netana-nmop-yang-message-broker-integration-00"/>
        </reference>
        <reference anchor="I-D.havel-nmop-digital-map">
          <front>
            <title>Modeling the Digital Map based on RFC 8345: Sharing Experience and Perspectives</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ahmed Elhassany" initials="A." surname="Elhassany">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This document shares experience in modelling Digital Map based on the
   IETF RFC 8345 topology YANG modules and some of its augmentations.
   First, the concept of Digital Map is defined and its connection to
   the Digital Twin is explained.  Next to Digital Map requirements and
   use cases, the document identifies a set of open issues encountered
   during the modelling phases, the missing features in RFC 8345, and
   some perspectives on how to address them.

   Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/OlgaHuawei.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-havel-nmop-digital-map-00"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-collected-data-manifest">
          <front>
            <title>A Data Manifest for Contextualized Telemetry Data</title>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jean Quilbeuf" initials="J." surname="Quilbeuf">
              <organization>Huawei</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica I+D</organization>
            </author>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica I+D</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   Network platforms use Model-driven Telemetry, and in particular YANG-
   Push, to continuously stream information, including both counters and
   state information.  This document documents the metadata that ensure
   that the collected data can be interpreted correctly.  This document
   specifies the Data Manifest, composed of two YANG data models (the
   Platform Manifest and the Data Collection Manifest).  These YANG
   modules are specified at the network (i.e. controller) level to
   provide a model that encompasses several network platforms.  The Data
   Manifest must be streamed and stored along with the data, up to the
   collection and analytics system in order to keep the collected data
   fully exploitable by the data scientists.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-collected-data-manifest-03"/>
        </reference>
        <reference anchor="I-D.lopez-opsawg-yang-provenance">
          <front>
            <title>Applying COSE Signatures for YANG Data Provenance</title>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="1" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism based on COSE signatures to provide
   and verify the provenance of YANG data, so it is possible to verify
   the origin and integrity of a dataset, even when those data are going
   to be processed and/or applied in workflows where a crypto-enabled
   data transport directly from the original data stream is not
   available.  As the application of evidence-based OAM automation and
   the use of tools such as AI/ML grow, provenance validation becomes
   more relevant in all scenarios.  The use of compact signatures
   facilitates the inclusion of provenance strings in any YANG schema
   requiring them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lopez-opsawg-yang-provenance-02"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-01"/>
        </reference>
        <reference anchor="I-D.lincla-netconf-yang-library-augmentation">
          <front>
            <title>Augmented-by Addition into the IETF-YANG-Library</title>
            <author fullname="Zhuoyao Lin" initials="Z." surname="Lin">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica Innovacion Digital</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document augments the ietf-yang-library in [RFC8525] to provide
   the augmented-by list.  It facilitates the process of obtaining the
   entire dependencies of YANG model, by directly querying the server's
   YANG module.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/Zephyre777/draft-lincla-netconf-yang-library-
   augmentation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lincla-netconf-yang-library-augmentation-01"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications and realize efficient and cost effective data driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Digital Twin
   Network, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses the benefits and
   key challenges of such technology.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-05"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="csvw" target="https://csvw.org">
          <front>
            <title>CSVW</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="gnmi" target="https://github.com/openconfig/reference/blob/master/rpc/gnmi/gnmi-specification.md">
          <front>
            <title>gnmi spec</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="fuseki" target="https://jena.apache.org/documentation/fuseki2/">
          <front>
            <title>Apache Fuseki</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="jsonld" target="https://json-ld.org">
          <front>
            <title>JSON-LD</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="neo4j" target="https://github.com/neo4j-labs/rdflib-neo4j">
          <front>
            <title>Neo4j</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 292?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the EU Horizon Europe projects aerOS (grant 101069732) and ROBUST-6G (grant 101139068).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
