<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-marcas-nmop-knowledge-graph-yang-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="knowledge-graph-yang">Knowledge Graphs for YANG-based Network Management</title>
    <seriesInfo name="Internet-Draft" value="draft-marcas-nmop-knowledge-graph-yang-04"/>
    <author initials="I. D." surname="Martinez-Casanueva" fullname="Ignacio Dominguez Martinez-Casanueva">
      <organization>Telefonica</organization>
      <address>
        <email>ignacio.dominguezmartinez@telefonica.com</email>
      </address>
    </author>
    <author initials="L." surname="Cabanillas" fullname="Lucia Cabanillas">
      <organization>Telefonica</organization>
      <address>
        <email>lucia.cabanillasrodriguez@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>knowledge graph</keyword>
    <keyword>semantics</keyword>
    <keyword>data integration</keyword>
    <keyword>RDF</keyword>
    <abstract>
      <?line 124?>

<t>The success of the YANG language and YANG-based protocols for managing the network has unlocked new opportunities in network analytics. However, the wide heterogeneity of YANG models hinders the consumption and analysis of network data. Besides, data encoding formats and transport protocols will differ depending on the network management protocol supported by the network device. These challenges call for new data management paradigms that facilitate the discovery, understanding, integration and access to silos of heterogenous YANG data, abstracting from the complexities of the network devices.</t>
      <t>This document introduces the knowledge graph paradigm as a solution to this data management problem, with focus on YANG-based network management. The document provides background on related topics such as ontologies and graph standards, and shares guidelines for implementing knowledge graphs from YANG data.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://idomingu.github.io/knowledge-graph-yang/draft-marcas-knowledge-graph-yang.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-marcas-nmop-knowledge-graph-yang/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Management Operations Working Group mailing list (<eref target="mailto:nmop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nmop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/idomingu/knowledge-graph-yang"/>.</t>
    </note>
  </front>
  <middle>
    <?line 130?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The size and complexity of networks keeps increasing, thus the path towards enabling an autonomous network requires the combination of network telemetry mechanisms <xref target="RFC9232"/>. These mechanisms range from legacy protocols like SNMP to the recent model-driven telemetry (MDT) based on the YANG language <xref target="RFC7950"/> and network management protocols such as NETCONF <xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>, or gNMI <xref target="GNMI"/>.</t>
      <t>MDT, in particular, has drawn the attention of the network industry owing to the benefits of modeling configuration and status data of the network with a formal data modeling language like YANG. However, since the inception of YANG, the network industry has experienced the massive creation of YANG data models developed by vendors, standards developing organizations (e.g., IETF), and consortia (e.g., OpenConfig). In turn, these data models target different abstraction layers of the network, namely, network elements, and network service <xref target="RFC8199"/>. Additionally, YANG data models may augment (or deviate from) other models to define new features (or remove or adjust existing ones) depending on the implementation. In summary, this trend has resulted into a wide variety of independent YANG data models, hence, the creation of data silos in the network. Refer to Sections 4.1 and 4.4 of <xref target="I-D.boucadair-nmop-rfc3535-20years-later"/> for a discussion on the fragmented YANG ecosystem and the integration complexity issues.</t>
      <t>Such amount and heterogeneity of YANG data models has hindered the collection and combination of network data for advanced network analytics. The current landscape shows different YANG models referencing the same concepts in a different way. For example, the IETF "ietf-interface" <xref target="RFC8343"/> and OpenConfig "openconfig-interfaces" <xref target="oc-interfaces"/> follow different structures and syntax, but both reference the same "interface" concept.</t>
      <t>Similarly, there are YANG models, like Service Assurance <xref target="RFC9418"/>, that convey semantic relationships with other concepts via identifiers. <xref target="ex-sain-device-tree"/> depicts the YANG tree diagram <xref target="RFC8340"/> for a subservice augmentation where the leaf "device" hints a relationship between the "subservice" concept and the "device" concept.</t>
      <figure anchor="ex-sain-device-tree">
        <name>YANG tree diagram of a subservice augmentation.</name>
        <artwork align="center"><![CDATA[
module: ietf-service-assurance-device

  augment /sain:subservices/sain:subservice/sain:parameter:
    +--rw parameters
      +--rw device    string
]]></artwork>
      </figure>
      <t>The extraction of this hidden knowledge from YANG models would enable the integration of YANG data silos at a conceptual level, regardless of the physical implementation (i.e., the YANG schema, syntax, and encoding format). In this regard, the knowledge graph is a promising technology that can link data silos based on common concepts like "device" that are captured in ontologies. Besides, by transforming the YANG data into a graph structure the relationships between data silos are represented as first class citizens in the graph instead of "foreign keys" where the relationship is made implicit. This document provides guidelines for building a knowledge graph for data sources based on the YANG language.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <t>This document defines the following terms:</t>
        <t>Data materialization: Technique that collects data from remote data source and persists a copy the data in a target data storage. This process can also be seen as Extract-Transform-Load (ETL).</t>
        <t>Data virtualization: Technique wherein an intermediate component (i.e., data virtualization layer) exposes data available in a remote data sources without creating an copy of the data. The data virtualization layer keeps pointers to the original location of data, so when a data consumer asks for these data, the virtualization layer collects the data from the source and directly serves the data to the consumer.</t>
        <t>Ontology: Formal, shared representation of knowledge in a domain.</t>
      </section>
      <section anchor="acronyms">
        <name>Acronyms</name>
        <t>CQ: Competency Question</t>
        <t>ETL: Extract-Transform-Load</t>
        <t>KG: Knowledge Graph</t>
        <t>KGC: Knowledge Graph Construction</t>
        <t>LOT: Linked Open Terms</t>
        <t>LPG: Labelled Property Graph</t>
        <t>OWL: Web Ontology Language</t>
        <t>RDF: Resource Description Framework</t>
        <t>RDFS: RDF Schema</t>
        <t>RML: RDF Mapping Language</t>
        <t>SAREF: Smart Applications REFerence</t>
        <t>SHACL: Shapes Constraint Language</t>
        <t>W3C: World Wide Web Consortium</t>
      </section>
    </section>
    <section anchor="a-bief-introduction-to-knowledge-graphs">
      <name>A Bief Introduction to Knowledge Graphs</name>
      <section anchor="what-is-a-knowledge-graph">
        <name>What is a Knowledge Graph?</name>
        <t>A knowledge graph contains a collection of facts alongside what know we about them and represents following a graph structure. Knowledge graphs enable a contextualized understanding of data as the data (e.g., the individuals, instance) travel with the meaning of the data themselves (e.g., the concepts, knowledge). For example, a knowledge graph may contain data about an interface "eth0", but also, that an interface can be physical or virtual, belongs to a network device, and has a name, description, and an MTU.</t>
        <t>To this end, knowledge graphs build upon on ontologies, which are explicit representations of conceptualizations in a specific domains. In other words, ontologies can be seen as representations of conceptual models following a formal logic that allows machines to understand and reason over them. In this regard, a conceptual model model, also known as information model, may translate into different data models depending on the data source technology <xref target="RFC3444"/>.</t>
        <t>By mapping data models (i.e., physical level) with the concepts represented in ontologies (i.e., conceptual level), we can find heterogenous datasets scattered in the network that reference common concepts such as "interface" or "device". Based on this semantic mapping, in addition to the flexibility of the graph structure, knowledge graphs enable the integration of heterogenous data based their semantics is what knowledge graphs can deliver.</t>
      </section>
      <section anchor="key-graph-standards">
        <name>Key Graph Standards</name>
        <t>The Resource Description Framework (RDF) <xref target="RDF"/> data model from the W3C Semantic Web has been considered as the standard graph data model given its maturity. For that reason, most of the knowledge graph implementations have relied upon the RDF standard and other standards from the Semantic Web like RDF Schema (RDFS) <xref target="RDFS"/>, Ontology Language (OWL) <xref target="OWL"/>, Shapes Constraint Language (SHACL) <xref target="SHACL"/>, and SPARQL <xref target="SPARQL"/>.</t>
        <t>However, the late success of graph databases like Neo4j have proved the Labelled Property Graph (LPG) data model as an alternative for implementing knowledge graphs. Aiming to bridge the gap between these two graph data models, the W3C RDF-Star working group is investigating evolving RDF to facilitate the representation of statement about statements.</t>
        <t>Similarly, the ETSI ISG CIM defined the NGSI-LD standard <xref target="ETSI-GS-CIM-009"/>, which builds upon two:</t>
        <ul spacing="normal">
          <li>
            <t>An NGSI-LD information model which derives from the Labeled Property Graph (LPG) model and grounds on the RDF for a semantic annotation of the data in the graph.</t>
          </li>
          <li>
            <t>The NGSI-LD API, which defines a REST API for building and interacting with the graph.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="knowledge-graph-construction-kgc">
      <name>Knowledge Graph Construction (KGC)</name>
      <t>The construction of a knowledge graph can be divided into two main activities: ontology development (<xref target="sec-onto"/>) and knowledge graph construction pipeline (<xref target="sec-pipe"/>).</t>
      <section anchor="sec-onto">
        <name>Ontology Development</name>
        <t>Ontologies provide the formal representation of the conceptual models that capture the semantics of data, and building on this, the integration of data in the knowledge graph. Ontologies can be developed following different techniques, ranging from manual to fully automated, depending on the characteristics of the data to be integrated in the knowledge graph (e.g., format or schema).</t>
        <section anchor="automatic-knowledge-extraction-from-yang-models">
          <name>Automatic knowledge Extraction from YANG Models</name>
          <t>The extraction of knowledge from YANG models can be automated, in particular, by analyzing YANG identities to generate controlled vocabularies and taxonomies.</t>
          <t><xref target="RFC7950"/> defines a YANG identity as "globally unique, abstract, and untyped identity", therefore, a relation between a YANG identity and a concept is straightforward. Additionally, YANG identities can inherit from other YANG identities via the "base" statement. These ideas align with the notion of a taxonomy, where concepts are hierarchically linked with other concepts.</t>
          <t>To support the creation of knowledge structures like taxonomies or thesauri, the W3C standardized the Simple Knowledge Organization System (SKOS). In such ontology, a concept scheme comprises a set of concepts that can be linked with other concepts via hierarchical and associative relations. Typically, a YANG model containing YANG identities can be represented as an instance of the "skos:ConceptScheme" class. Next, all YANG identities included in a YANG model can be represented as "skos:Concept instances" that are contained in the concept scheme. Lastly, those YANG identities that include the "base" statement, the respective SKOS concept will include a relation "skos:broader" whose range is the SKOS concept representing the parent YANG identity.</t>
        </section>
        <section anchor="standard-development-methodologies">
          <name>Standard Development Methodologies</name>
          <t>Automating the extraction of all the knowledge from YANG models is impossible, and therefore, manual intervention from domain experts is required. To ease this process, a recommended practice is to develop the ontology by following a standard methodology like Linked Open Terms (LOT) <xref target="Poveda-Villalon2022"/>.</t>
          <t>LOT is an ontology development methodology that adopts best practices from agile software development. The methodology has been widely used in European projects as well as in the creation of the ETSI SAREF ontology and its extensions. Precisely, with SAREF Ontology ETSI tackled a similar problem in the scope of IoT, where there is a heterogeneous variety of standard data models and protocols. The methodology iterates over a workflow of the following four activities:</t>
          <ol spacing="normal" type="1"><li>
              <t>ontology requirements specification</t>
            </li>
            <li>
              <t>ontology implementation</t>
            </li>
            <li>
              <t>ontology publication, and</t>
            </li>
            <li>
              <t>ontology maintenance.</t>
            </li>
          </ol>
          <t>The workflow starts with the specification of requirements that the ontology must fulfill. To that aim, the methodology requires collecting knowledge from domain experts, but also by analyzing the data sources (e.g., network devices) and schemas for the data (e.g., YANG models) to be ingested and integrated in the knowledge graph. LOT recommends several approaches such as competency questions (CQs), natural language statements, or tabular information inspired by METHONTOLOGY.</t>
        </section>
      </section>
      <section anchor="sec-pipe">
        <name>Knowledge Graph Construction Pipeline</name>
        <t>The construction of a knowledge graph is supported by a data pipeline that follows the archetypical Extract-Transform-Load (ETL), wherein the raw data is collected from the source(s), transformed, and finally, stored for consumption. The knowledge graph creation pipeline can thus be split into multiple steps as depicted in <xref target="ex-construction"/>.</t>
        <figure anchor="ex-construction">
          <name>High-level architecture of a Knowledge Graph Construction Pipeline</name>
          <artwork align="center"><![CDATA[
+-----------+       +---------+       +-----------------+
|           |       |         |       |                 |
| Ingestion +------>| Mapping +------>| Materialization |
|           | Raw   |         | RDF   |                 |
+-----------+ data  +---------+ data  +--------+--------+
      ^      (YANG)                            |
 Raw  |                                        | RDF
 data |                                        | data
(YANG)|                                        |
      |                                        v
+-----+----+                             +-----------+
|   Data   |                             | Knowledge |
|  Source  |                             |   Graph   |
| (device) |                             +-----------+
+----------+
]]></artwork>
        </figure>
        <t>These steps are the following: ingestion, mapping, and materialization.</t>
        <section anchor="ingestion">
          <name>Ingestion</name>
          <t>Represents the first step in the creation of the knowledge graph. This step is realized by means of collectors that ingest raw data from the selected data source. These collectors implement data access protocols which are specific to the technology and type of the data source. When it comes to network management protocols based on YANG, these protocols can be NETCONF <xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/> and gNMI <xref target="GNMI"/>.</t>
          <t>Two main types of data sources are identified based on the techniques used to ingest the data, namely, batch and streaming. In the case of batch data sources data are pulled (once or periodically) from the data source. This could be represented by queries sent to a YANG server like an SDN controller to fetch the network topology <xref target="RFC8345"/>.</t>
          <t>Regarding streaming data sources, the collector subscribes to a YANG server to receive notifications of YANG data periodically or upon changes in the data source (e.g., a network device whose interface goes down). These subscriptions can be realized, either based on configuration or dynamically, using mechanisms like YANG Push <xref target="RFC8641"/>. But additionally, another common scenario is the use of message broker systems like Apache Kafka for decoupling the ingestion of streams of YANG data <xref target="I-D.netana-nmop-yang-message-broker-integration"/>. Hence, knowledge graph collectors could also support the ingestion of YANG data from these kinds of message brokers.</t>
        </section>
        <section anchor="mapping">
          <name>Mapping</name>
          <t>This second step consists at receiving the raw data data from the Ingestion step. Here, the raw data is mapped to the concepts capture in one or more ontologies. By applying these mapping rules, the raw data is semantically annotated and transformed into RDF data. These mappings can be declared using declarative languages like RDF Mapping Language (RML) <xref target="Iglesias-Molina2023"/>.</t>
          <t>RML is a declarative language that is currently being standardized within the W3C Knowledge Graph Construction Community group <xref target="W3C-KGC"/> that allows for defining mappings rules for raw data encoded in semi-structured formats like XML or JSON. The benefits of using a declarative language like RML are twofold: i) the engine that implements the RML rules is generic, thus the mappings rules are decoupled from the code; ii) the explicit representation of mapping and transformation rules as part of the knowledge graph provides data lineage insights that can greatly improve data quality and the troubleshooting of data pipelines. RML is making progress towards becoming a standard, but support of additional YANG encoding formats like CBOR <xref target="RFC8949"/> or Protobuf remains a challenge.</t>
        </section>
        <section anchor="materialization">
          <name>Materialization</name>
          <t>This is the final step of the knowledge graph creation. This step receives as an input the RDF data generated in the Mapping step. At this point, the RDF data can be sent to an RDF triple store like Apache Jena Fuseki <xref target="Fuseki"/> for consumption via SPARQL. But alternatively, this step may transform the RDF data into an LPG structure and store the resulting data in a graph database like Neoj4 <xref target="Neo4j"/>. Similarly, the RDF data could also be transformed into the ETSI NGSI-LD standard and stored in an NGSI-LD Context Broker.</t>
        </section>
      </section>
    </section>
    <section anchor="knowledge-graph-applications">
      <name>Knowledge Graph Applications</name>
      <dl>
        <dt>Network performance KPIs:</dt>
        <dd>
          <t>The integration of data at different levels of abstraction in the network can facilitate the computation of network performance KPIs, such as throughput or packet loss ratio. By integrating data silos such as the network topology with the status of network interfaces, a network analytics application could ask the knowledge graph to compute the throughput or packets loss ratio at a specific link in the network.</t>
        </dd>
        <dt>Anomaly detection and incident management:</dt>
        <dd>
          <t>Projects like NORIA <xref target="Tailhardat2023"/> have demonstrated how knowledge graphs can help in the detection of anomalies in network systems. This approach links data pertaining to different data silos like network infrastructure, logs, alarms, and ticketing. In another example, the combination network topology data with data about network interface status, consumers of the knowledge graph can detect network anomalies like link fault because an network interface has been unexpectedly disabled but it was configured to be enabled.</t>
        </dd>
        <dt>Service assurance:</dt>
        <dd>
          <t>A knowledge graph can enable the implementation of the service assurance for intent-based networking architecture defined in <xref target="RFC9417"/>. Precisely, this architecture,  and the companion YANG data models from RFC 9418, define an assurance graph where dependencies among network services and their associated health and symptoms are captured. All these data, which can be further linked with other data silos like network topology or network interface status, can be naturally integrated and represented in a knowledge graph.</t>
        </dd>
        <dt>Network digital twin:</dt>
        <dd>
          <t>Knowledge graph are considered promising candidates for the realization of network digital twins <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>. The ability to integrate heterogenous silos of data, in combination with the explicit representation of the semantics of the data, make knowledge graph a powerful technology for building and connecting multiple network digital twins. In addition, the representation of concepts by means of ontologies, produces abstract representations of network digital twins, regardless of the complexities of the underlying technologies. For instance, an abstract representation of a network topology Digital Map <xref target="I-D.havel-nmop-digital-map"/> in the knowledge graph can be translated into a descriptor or data model that is specific to the technology used (e.g., KNE, ContainerLab, or OSM).</t>
        </dd>
        <dt>Evolution of YANG Catalog:</dt>
        <dd>
          <t>The flexibility and extensibility of knowledge graphs have made them a popular choice for implementing data catalogs. The purpose of a data catalog is to provide consumers with a registry of datasets exposed by data sources where to find data of interest. Additionally, these datasets can be linked to the (business) concepts that they refer to, so that consumers can search for datasets based on relevant concepts such as “interface”. Taking inspiration from these implementations, and building on a knowledge graph, the YANG Catalog could evolve towards a data catalog, where the YANG modules represent those datasets of interest. The dependencies between YANG models (import, deviations, augments) can be naturally represented in the knowledge graph. In turn, these YANG models can be linked with concepts that are represented in ontologies. Additionally, these YANG models, can be combined with the implementation details of network devices yang lib augment <xref target="I-D.lincla-netconf-yang-library-augmentation"/> that could be part of an inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
        </dd>
        <dt>Contextualized telemetry data:</dt>
        <dd>
          <t>Having context of how YANG telemetry data <xref target="I-D.ietf-opsawg-collected-data-manifest"/> is being collected can improve the understanding of the data for network analytics or closed-loop automation. Knowledge graphs can help in this task by linking the collected data with: (i) the metadata that characterizes the platform producing the data; and (ii) the metadata that characterizes how and when the data were metered.</t>
        </dd>
      </dl>
    </section>
    <section anchor="challenges">
      <name>Challenges</name>
      <dl>
        <dt>Ontology development:</dt>
        <dd>
          <t>Time-consuming task that requires skills in knowledge management and conceptual modeling. Additionally, ontology developers should maintain a tight coordination with domain owners and ontology users. Following a standard methodology like LOT provides guidance in the process but still, the development of the ontology requires manual work. Tools that can produce or bootstrap ontologies from existing YANG data models in a semi-automatic, or even automatic, are desirable. In this sense, the future release of the YANG language could be extended to facilitate this task at design time. YANG data models could include explicit semantics in the data models, in the same way that JSON-LD <xref target="JSON-LD"/> or CSVW <xref target="CSVW"/> include metadata indicating which concepts from concepts are referenced by the data. In the current version of YANG, this could be achieved at runtime using the YANG Metadata extension <xref target="RFC7952"/>. With this extension, YANG data models could include additional metadata to indicate the ontology concept a YANG data node is referring to, though this approach only works at runtime, and additionally, it would require augmenting existing YANG data models.</t>
        </dd>
        <dt>Pipeline performance:</dt>
        <dd>
          <t>To integrate the raw data from the original source into the knowledge graph entails several steps as described before. This steps add an extra latency before having the data stored in the knowledge graph for consumption. This latency can be an important limitation for real-time analytics use cases.</t>
        </dd>
        <dt>Scalability:</dt>
        <dd>
          <t>The knowledge graph must be able to integrate massive amounts of data collected from the network. Distributed and federated architectures can improve the scalability of a global, composable knowledge graph. However, these architectures add complexity to the management of knowledge graph as well as extra latency when federating requests.</t>
        </dd>
        <dt>Virtualization:</dt>
        <dd>
          <t>The common approach for data integration is by materializing the data in the knowledge graph, which entails duplicating the data. However, this approach presents multiple limitations in terms of data governance and data cadence. Regarding data governance, having copies of the original data hampers keeping track of all the available data. With respect to data cadence, in particular for batch data sources, data are periodically pulled from the source at particular frequency, which might not be optimal depending on the use case. In this sense, data virtualization introduces a new data access technique that can overcome these limitations. With this technique, the knowledge graph defines pointers to the data at the original source, and the KGC pipeline performs the ingestion and mapping of the data, and eventually the delivery of data to the consumer, only when requested on demand.</t>
        </dd>
        <dt>Network configuration:</dt>
        <dd>
          <t>This document has focused on integrating telemetry data in the knowledge graph for monitoring purposes. But knowledge graphs could also be leveraged for integrating data related to the configuration of devices and services in the network. This approach could enable closed-loop network management since both configuration and operational data are stored in the knowledge graph.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <dl>
        <dt>Access control to data:</dt>
        <dd>
          <t>The knowledge graph becomes an integrator of data, and, in many cases, sensible. Therefore, data access control mechanisms must be present to ensure that only authorized consumers can discover and access data from the knowledge graph. Access control policies based on roles or attributes are common approaches, but additional aspects like sensitivity of data could be included in the policy.</t>
        </dd>
        <dt>Integrity and authenticity of mappings:</dt>
        <dd>
          <t>The declaration of mappings of raw data to concepts in ontologies is a critical step in the knowledge graph construction. Unauthorized mappings, or even tampered mappings, can lead to security breaches and anomalies producing a great impact on  analytics and machine learning applications that consume data from the knowledge graph. To protect consumers from these scenarios, the knowledge graph must include mechanisms that verify the correctness, authenticity, and integrity of the mappings used in the construction of the graph. Only data owners, as accountable of their data, should be authorized to define and deploy mappings for the knowledge graph construction.</t>
        </dd>
        <dt>Data provenance:</dt>
        <dd>
          <t>Keeping track of the history of data as they go through the knowledge graph construction pipeline can improve the quality of the data of the knowledge graph. As part of the knowledge graph construction, signatures can be appended to the data <xref target="I-D.lopez-opsawg-yang-provenance"/>, can help in verifying that such data come from the golden data source, and therefore, that the data can be trusted.</t>
        </dd>
      </dl>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <ul spacing="normal">
        <li>
          <t>Should RML mappings reference data at the YANG level using XPath or subtree filters? Or references should remain based on the actual encoding format used by the network management protocol, e.g., JSON, XML.</t>
        </li>
        <li>
          <t>Should this document provide guidelines for generating URIs of nodes/subjects in the knowledge graph? Take into account there are several levels of abstraction device vs network/service level. For example, the URI that identifies a network interface cannot be generated only from the name of the interface as there could conflicts with other interfaces of other network devices having the same name.</t>
        </li>
        <li>
          <t>Definition of YANG data sources with formal vocabulary, similar to what Web of Things ontology has done for MQTT or REST APIs or D2RQ ontology for relational databases. Having the specification of the data source in the knowledge graph improves provenance and decouples the configuration from the implementation, e.g., via custom INI config file.</t>
        </li>
        <li>
          <t>Implementations? References to examples based on open-source implementations. Integration with YANG-Push-Kafka architecture. Target future hackathons.</t>
        </li>
        <li>
          <t>Document focused on YANG data sources. Should the document open the scope to other kinds of data sources like IPFIX?</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CSVW" target="https://csvw.org">
          <front>
            <title>CSVW - CSV on the Web</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ETSI-GS-CIM-009" target="https://www.etsi.org/deliver/etsi_gs/CIM/001_099/009/01.08.01_60/gs_CIM009v010801p.pdf">
          <front>
            <title>Context Information Management (CIM); NGSI-LD API</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="GNMI" target="https://github.com/openconfig/reference/blob/master/rpc/gnmi/gnmi-specification.md">
          <front>
            <title>gRPC Network Management Interface (gNMI)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Fuseki" target="https://jena.apache.org/documentation/fuseki2/">
          <front>
            <title>Apache Jena Fuseki</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JSON-LD" target="https://www.w3.org/TR/json-ld11/">
          <front>
            <title>JSON-LD 1.1: A JSON-based Serialization for Linked Data</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="oc-interfaces" target="https://openconfig.net/projects/models/schemadocs/yangdoc/openconfig-interfaces.html">
          <front>
            <title>openconfig-interfaces modules</title>
            <author>
              <organization>OpenConfig</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Poveda-Villalon2022" target="https://doi.org/10.1016/j.engappai.2022.104755">
          <front>
            <title>LOT: An industrial oriented ontology engineering framework</title>
            <author>
              <organization>Engineering Applications of Artificial Intelligence</organization>
            </author>
            <date year="2022" month="May"/>
          </front>
        </reference>
        <reference anchor="Iglesias-Molina2023" target="https://doi.org/10.1007/978-3-031-47243-5_9">
          <front>
            <title>The RML Ontology: A Community-Driven Modular Redesign After a Decade of Experience in Mapping Heterogeneous Data to RDF</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="October"/>
          </front>
        </reference>
        <reference anchor="Neo4j" target="https://github.com/neo4j-labs/rdflib-neo4j">
          <front>
            <title>rdflib-neo4j - RDFLib Store backed by neo4j</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OWL" target="https://www.w3.org/TR/owl2-overview/">
          <front>
            <title>OWL 2 Web Ontology Language Document Overview (Second Edition)</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2012" month="December"/>
          </front>
        </reference>
        <reference anchor="RDF" target="https://www.w3.org/TR/rdf11-concepts/">
          <front>
            <title>Resource Description Framework (RDF): Concepts and Abstract Syntax</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="RDFS" target="https://www.w3.org/TR/rdf-schema/">
          <front>
            <title>RDF Schema 1.1</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="SHACL" target="https://www.w3.org/TR/shacl/">
          <front>
            <title>Shapes Constraint Language (SHACL)</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2017" month="July"/>
          </front>
        </reference>
        <reference anchor="SPARQL" target="https://www.w3.org/TR/sparql11-query/">
          <front>
            <title>SPARQL 1.1 Query Language</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2013" month="March"/>
          </front>
        </reference>
        <reference anchor="Tailhardat2023" target="https://ceur-ws.org/Vol-3471/paper3.pdf">
          <front>
            <title>Designing NORIA: a Knowledge Graph-based Platform for Anomaly Detection and Incident Management in ICT Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May"/>
          </front>
        </reference>
        <reference anchor="W3C-KGC" target="https://www.w3.org/community/kg-construct/">
          <front>
            <title>Knowledge Graph Construction Community Group</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9232">
          <front>
            <title>Network Telemetry Framework</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="A. Wang" initials="A." surname="Wang"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9232"/>
          <seriesInfo name="DOI" value="10.17487/RFC9232"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="I-D.boucadair-nmop-rfc3535-20years-later">
          <front>
            <title>RFC 3535, 20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Reshad Rahman" initials="R." surname="Rahman">
              <organization>Equinix</organization>
            </author>
            <author fullname="Lionel Tailhardat" initials="L." surname="Tailhardat">
              <organization>Orange</organization>
            </author>
            <date day="16" month="October" year="2024"/>
            <abstract>
              <t>   The IAB organized an important workshop to establish a dialog between
   network operators and protocol developers, and to guide the IETF
   focus on work regarding network management.  The outcome of that
   workshop was documented in the "IAB Network Management Workshop" (RFC
   3535) which was instrumental for developing NETCONF and YANG, in
   particular.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boucadair-nmop-rfc3535-20years-later-05"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.netana-nmop-yang-message-broker-integration">
          <front>
            <title>An Architecture for YANG-Push to Message Broker Integration</title>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Ahmed Elhassany" initials="A." surname="Elhassany">
              <organization>Swisscom</organization>
            </author>
            <date day="22" month="April" year="2024"/>
            <abstract>
              <t>   This document describes the motivation and architecture of a native
   YANG-Push notifications and YANG Schema integration into a Message
   Broker and YANG Schema Registry.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-netana-nmop-yang-message-broker-integration-00"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="16" month="October" year="2024"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications, realize efficient and cost-effective data-driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Digital Twin
   Network, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-08"/>
        </reference>
        <reference anchor="I-D.havel-nmop-digital-map">
          <front>
            <title>Modeling the Digital Map based on RFC 8345: Sharing Experience and Perspectives</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ahmed Elhassany" initials="A." surname="Elhassany">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document shares experience in modelling Digital Map based on the
   IETF RFC 8345 topology YANG modules and some of its augmentations.
   The document identifies a set of open issues encountered during the
   modelling phases, the missing features in RFC 8345, and some
   perspectives on how to address them.  For definition of Digital Map
   concepts, requirements and use cases please refer to the "Digital
   Map: Concept, Requirements, and Use Cases" document.

   Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/OlgaHuawei.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-havel-nmop-digital-map-02"/>
        </reference>
        <reference anchor="I-D.lincla-netconf-yang-library-augmentation">
          <front>
            <title>Augmented-by Addition into the IETF-YANG-Library</title>
            <author fullname="Zhuoyao Lin" initials="Z." surname="Lin">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica Innovacion Digital</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document augments the ietf-yang-library in [RFC8525] to provide
   the augmented-by list.  It facilitates the process of obtaining the
   entire dependencies of YANG model, by directly querying the server's
   YANG module.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/Zephyre777/draft-lincla-netconf-yang-library-
   augmentation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lincla-netconf-yang-library-augmentation-01"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-03"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-collected-data-manifest">
          <front>
            <title>A Data Manifest for Contextualized Telemetry Data</title>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jean Quilbeuf" initials="J." surname="Quilbeuf">
              <organization>Huawei</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica I+D</organization>
            </author>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica I+D</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   Network platforms use Model-driven Telemetry, and in particular YANG-
   Push, to continuously stream information, including both counters and
   state information.  This document documents the metadata that ensure
   that the collected data can be interpreted correctly.  This document
   specifies the Data Manifest, composed of two YANG data models (the
   Platform Manifest and the Data Collection Manifest).  These YANG
   modules are specified at the network (i.e. controller) level to
   provide a model that encompasses several network platforms.  The Data
   Manifest must be streamed and stored along with the data, up to the
   collection and analytics system in order to keep the collected data
   fully exploitable by the data scientists.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-collected-data-manifest-05"/>
        </reference>
        <reference anchor="RFC7952">
          <front>
            <title>Defining and Using Metadata with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines a YANG extension that allows for defining metadata annotations in YANG modules. The document also specifies XML and JSON encoding of annotations and other rules for annotating instances of YANG data nodes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7952"/>
          <seriesInfo name="DOI" value="10.17487/RFC7952"/>
        </reference>
        <reference anchor="I-D.lopez-opsawg-yang-provenance">
          <front>
            <title>Applying COSE Signatures for YANG Data Provenance</title>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Sofia Garcia" initials="S." surname="Garcia">
              <organization>UC3M</organization>
            </author>
            <date day="6" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism based on COSE signatures to provide
   and verify the provenance of YANG data, so it is possible to verify
   the origin and integrity of a dataset, even when those data are going
   to be processed and/or applied in workflows where a crypto-enabled
   data transport directly from the original data stream is not
   available.  As the application of evidence-based OAM automation and
   the use of tools such as AI/ML grow, provenance validation becomes
   more relevant in all scenarios.  The use of compact signatures
   facilitates the inclusion of provenance strings in any YANG schema
   requiring them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lopez-opsawg-yang-provenance-03"/>
        </reference>
      </references>
    </references>
    <?line 370?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the EU Horizon Europe projects aerOS (grant agreement no. 101069732) and ROBUST-6G (grant agreement no. 101139068).</t>
      <t>The authors would like to thank Mohamed Boucadair and Benoit Claise for their review and valuable comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
