<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.22 (Ruby 3.3.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bormann-nemops-coreconf-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="CORECONF">CORECONF: Managing IoT Devices with YANG Models</title>
    <seriesInfo name="Internet-Draft" value="draft-bormann-nemops-coreconf-00"/>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2024" month="December" day="03"/>
    <workgroup>Submission to IAB NEMOPS Workshop</workgroup>
    <abstract>
      <?line 150?>

<t>This short paper provides an overview over the CORECONF architecture
for employing YANG models in managing IoT devices.
CORECONF is based on CoAP as a transfer protocol and YANG-CBOR as its
data representation format, analogous to the way the original
RESTCONF was defined to use HTTP and YANG-XML or YANG-JSON, and the way
NETCONF uses SSH and YANG-XML.</t>
    </abstract>
  </front>
  <middle>
    <?line 159?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This short paper provides an overview over the CORECONF architecture
for employing YANG models in managing IoT devices.
CORECONF is based on CoAP <xref target="RFC7252"/> as a transfer protocol and YANG-CBOR
<xref target="RFC9254"/> as its data representation format, analogous to the way
the original RESTCONF <xref target="RFC8040"/> was defined to use HTTP <xref target="STD97"/>
        <xref target="STD98"/> and YANG-XML <xref target="RFC7950"/> or YANG-JSON <xref target="RFC7951"/>, and
the way NETCONF <xref target="RFC6241"/> uses SSH <xref target="RFC4251"/> and YANG-XML <xref target="RFC7950"/>.
The mapping of the CORECONF interactions to CoAP is described in <xref target="I-D.ietf-core-comi"/>.
In support of CORECONF, early contributions exist for supporting YANG
metadata <xref target="RFC7952"/> in YANG-CBOR <xref target="I-D.bormann-cbor-yang-metadata"/> and for a
significant performance optimization further shedding the text-based
heritage of YANG <xref target="I-D.bormann-cbor-yang-standin"/>.</t>
    </section>
    <section anchor="background">
      <name>Background</name>
      <section anchor="iot">
        <name>IoT</name>
        <t>One definition of the Internet of Things is that it aims to connect
devices ("Things") via the Internet that are embedded in everyday
physical items, making them "available for interaction over a network,
thereby enabling digital interaction with the physical world for
humans, services, and/or other Things" <xref target="REST-IOT"/>.</t>
        <t>The number of Internet nodes that could be called "Things" in this
sense has been steadily growing, and is currently estimated to be on
the order of 20 billion, possibly doubling in the next eight years
<xref target="IOT-SCALE"/>.</t>
        <t>While Things vary wildly in their technical characteristics, the scale
of their deployment creates a practical limit to the power resources
available to them:
If we were willing to spend 1 % of the global electricity generation
just on the connectedness of those Things, we would have a total power
budget of about 35 GW for all of them <xref target="POWER"/>, leaving less than 2 W
on average for each of them.
Since there will be many Things that need significantly more than 2 W
(and 1 % is maybe too spendy at an energy cost of several dollars per
year per Thing),
the majority of the Things will need to get by with significantly less
than 1 W average sustained power each.
If operation from primary batteries is essential to the function of
the Thing and battery lifetimes of a few years are desired, this
upper boundary shrinks to the order of a few 10s or 100s of µW (for a
single CR2032 button cell or 2 AA batteries, respectively).</t>
        <t>Together with the need to also limit the non-energy per-device cost of
ownership at this scale, this turns a significant part of the Things
into devices with low resources available to them, or <em>constrained</em>
devices <xref target="RFC7228"/> <xref target="I-D.ietf-iotops-7228bis"/>.</t>
        <t>Architectures that aim to support IoT therefore need to be able to
accommodate constrained (low-resource) devices, even if not all IoT
devices are subject to the same constraints.</t>
      </section>
      <section anchor="ietf-network-management">
        <name>IETF Network Management</name>
        <t>In the late 1980s, at a time when the Internet Protocol Suite was
still in active competition with OSI-based proposals, the IETF
converged on a <em>simple</em> network management solution, SNMP (Simple
Network Management Protocol, <xref target="RFC1067"/>).</t>
        <t>As with the proposals it initially competed with <xref target="RFC1095"/>, SNMP based its
data modeling language on ASN.1 (standardized as <xref target="X.208"/> at the time,
also known as ISO 8824, previously as the X.409 component of the X.400
messaging standardization project).
SNMP employed ASN.1 macros as a textual convention to create the SMIv2
data modeling language as a specialization of ASN.1's eponymous
datatype declaration language <xref target="STD58"/>.
(In ISO, ASN.1 macros were not much later deprecated in favor of ASN.1
Information Objects, which could not easily be adapted to SNMP's
needs; as a result, SNMP continued to stay tied to the 1988 version of
ASN.1.)
SMIv2 has been criticized for requiring significant, non-trivial
transformations of the intended information model <xref target="RFC3444"/> into
the limited expressiveness of its generic data model (such as
constructing conceptual tables from columnar data objects, see
<xref section="7.1" sectionFormat="of" target="RFC6643"/> for a description of recovering the
structure in an inverse process).</t>
        <t>With its data model specification language, SNMP imported the concept
of ASN.1 Object Identifiers (OIDs), identifiers represented as
sequences of unsigned integers, each of which addresses one level of a
hierarchy of potentially delegated registries.
The representation of OIDs in ASN.1's Basic Encoding Rules (BER,
<xref target="X.209"/>) can be reasonably efficient, and the more human-readable
presentation is a simple sequence of decimal unsigned integers
separated by dots.
OIDs' delegation technique allows anyone to coin OIDs, once they have
received the delegation of an OID prefix ("arc") somewhere in the OID
hierarchy.
This keeps OIDs popular in many environments, such as in the IETF
Security area, but also makes it hard to enforce any structure or
semantics on namespaces represented by OIDs.</t>
        <t>When IETF standardization of network management for IoT began in
earnest in the early 2010s, SNMP was already in the process of being
obsoleted by NETCONF <xref target="RFC6241"/> for many applications, in particular
those involving remote configuration and not just monitoring.
However, the simplicity and low resource requirements of the SNMP
protocol compared to the XML-based NETCONF <xref target="SNMP-NETCONF"/> were a good
match for constrained nodes, and SNMP MIBs (SMIv2 modules) were widely
available for many areas of application relevant to IoT.
This caused initial efforts in the IoT network management space to be
based on SNMP (for example, the 6LoWPAN MIB <xref target="RFC7388"/>).</t>
        <t>At the same time, the NETCONF protocol (<xref target="RFC6241"/>, originally
<xref target="RFC4741"/>) was getting established in the wider Internet, and with
it the modeling language YANG <xref target="RFC6020"/>.
Both efforts were closely tied to the idiosyncrasies of XML,
which was popular at the time as a framework for text-based data
representation formats, even though its predecessor SGML was
originally created for document interchange <xref target="SGML"/>.</t>
        <t>In addition to allowing the monitoring of state data, NETCONF was
specifically addressing the configuration of network devices, which
was supported by SNMP implementations only in a limited way.
NETCONF was designed to allow "the functionality of the
   management protocol to closely mirror the native functionality of the
   device" (<xref section="1" sectionFormat="of" target="RFC4741"/>).</t>
        <t>"The YANG data modeling language <xref target="RFC6020"/> has been developed for
   specifying NETCONF data models [...]" (<xref section="1.2" sectionFormat="of" target="RFC6241"/>).
Instead of employing the ASN.1 macro language used for SMIv2, YANG has
   been designed as a new (directly human-readable) computer language,
   initially with an XML-based representation format and thus generic
   data model (which we call YANG-XML).</t>
        <t>Since YANG was created, the popularity of XML has faded away towards
an increased popularity of JSON <xref target="STD90"/>.
A JSON-based representation (which we call YANG-JSON, <xref target="RFC7951"/>)
has been added to YANG with YANG 1.1 <xref target="RFC7950"/>, for use as an
alternative format that can be used with the RESTCONF protocol
<xref target="RFC8040"/>.
This has to work around both JSON's own interoperability problems
<xref target="RFC7493"/> and the need to be bug-compatible with XML idiosyncrasies
(for instance, see <xref section="6.10" sectionFormat="of" target="RFC7951"/>).</t>
        <t>Both YANG-XML and YANG-JSON build an identifier from names that
resemble XML QNames (Qualified Names, i.e., colon-separated pairs of
an optional prefix and a name; the prefix is usually registered).
Instance-identifiers, i.e., pointers into a data tree, are constructed
by separating a sequence of (qualified) names and index values with
slash characters and square brackets, respectively.
This is similar in concept as, but dramatically less efficient (both in
space and processing time) than, the ASN.1 BER representation of OIDs
known from SNMP.</t>
      </section>
      <section anchor="coap">
        <name>CoAP</name>
        <t>The Constrained Application Protocol (CoAP, <xref target="RFC7252"/>) was designed as
an application protocol for constrained nodes that is based on the
Representational State Transfer <xref target="REST"/> architecture it has in common
with HTTP.
Initially, CoAP provided the usual basic complement of methods known
from HTTP (GET, PUT, POST, DELETE).
This was later extended by three additional methods: FETCH to perform
the equivalent of a GET with additional parameters sent in the body of
the request, and PATCH/iPATCH (idempotent PATCH) for updating a
resource based on data in the body of the request <xref target="RFC8132"/>.</t>
        <t>CoAP's "observe" extension can be used to automatically obtain updates to a
previously obtained representation of a resource <xref target="RFC7641"/>.
The "block-wise" extension enables the transfer of data items that
would not fit into (or are otherwise considered too large for) a
single packet <xref target="RFC7959"/>.</t>
        <t>Independent of the discussion here, CoAP is already used by
ecosystem-specific IoT management protocols such as OMA's Lightweight
M2M (LwM2M) <xref target="LWM2M"/>.</t>
      </section>
    </section>
    <section anchor="coreconf-approach">
      <name>CORECONF: Approach</name>
      <t>In 2012, Ersue, Romascanu and Schönwälder described eight IoT use cases
and derived requirements for "Management of Networks of Constrained
Devices" <xref target="COMAN"/>.</t>
      <t>The CORECONF effort was started in 2013 by van der Stok as "CoAP
Management Interfaces" (COMI) <xref target="I-D.draft-vanderstok-core-comi-00"/>, initially focused on the
simpler SNMP ecosystem, replacing just the SNMP protocol (and its security
solution) by CoAP, but keeping the data model.
This enabled a device to share code and complexity between the network
management and the device's application protocol.</t>
      <t>Veillette and Pelov, among others, joined the effort
soon with the "Constrained Objects Language" (CoOL) proposal <xref target="I-D.draft-veillette-core-cool-00"/>.
At the time, the management community had started work on RESTCONF
<xref target="I-D.draft-bierman-netconf-restconf-00"/>, replacing the custom NETCONF protocol by a simplified
REST-based architecture (i.e., employing HTTP), which lent itself
to realizing a further simplified variant over CoAP as well.
CoOL provided a first representation of YANG data structures in the
Concise Binary Object Representation (CBOR) format (<xref target="RFC7049"/>, now
<xref target="STD94"/>).
This allowed leaving behind the inefficient text-based representation
formats on which YANG-XML (and later YANG-JSON) were built.</t>
      <t>CoOL also pioneered the idea of a Fully-qualified data node ID
(FQDNID), which was a 31-bit integer standing in for the (text-based)
YANG data name.
The intention was to annotate YANG models by information that would
allow deriving FQDNIDs and related numbers.
The CoAP protocol would be extended by a <tt>Fields</tt> Option, which would
extend the URI by descending into the YANG tree based on a list of
FQDNIDs.
(This was later replaced by a special syntax that could be used within
the request URI, and ultimately by switching to CoAP's FETCH and
iPATCH methods <xref target="RFC8132"/> instead of GET/PUT, supplying the identifying
information in the CoAP request payload.)</t>
      <t>Discussion about the best way to derive an efficient form of the YANG
data name dominated the early discussion about CORECONF.
Briefly, a hash-based approach was favored <xref target="I-D.draft-vanderstok-core-comi-05"/>, but it turned
out to be too hard to manage the collisions during model evolution,
and hash values also didn't provide a main benefit of a more
structured allocation of integer IDs:
Since related IDs usually occur in a cluster, a simple delta encoding
of the IDs can provide excellent encoding efficiency.
A hierarchical delta encoding of IDs is the basis of today's YANG-CBOR
representation <xref target="RFC9254"/>.</t>
      <t>To obtain an integer ID that exhibits good locality, boosting the
benefits from delta-encoding, the community arrived at large (63-bit)
unsigned integers.
These integers are called YANG SIDs, YANG Schema Item iDentifiers, and
can identify YANG schema nodes, YANG identities, YANG modules, or YANG
features.
The huge linear SID space is managed by employing a hierarchy of IANA
registries <xref target="RFC9595"/>, first carving up the large space into
million-plus "mega-ranges", then, for an individual YANG model,
allocating out of a chosen mega-range a SID range of, say, 100 integers.
Each YANG model can in turn assign its individual SIDs from its SID
range automatically (or even have them assigned automatically after
the fact via a designated expert) or make use of an optimized
assignment method tailored to the individual model <xref target="I-D.toutain-lpwan-sid-allocation"/>.</t>
    </section>
    <section anchor="discussion">
      <name>Discussion</name>
      <t>The complete CORECONF architecture is built from four specifications:</t>
      <ol spacing="normal" type="1" start="1"><li>
          <t>YANG-CBOR <xref target="RFC9254"/>, published July 2022.
  This maps YANG data into CBOR as a representation format, similar to
  how YANG-XML <xref target="RFC7950"/> maps into XML and YANG-JSON <xref target="RFC7951"/> maps
  into JSON.
  It is itself quite efficient, but carries data in text form that
  YANG modules (such as those exported from <xref target="RFC6991"/>) define as
  text-based (such as date/time or IP/MAC addresses).
  <xref target="I-D.bormann-cbor-yang-standin"/> proposes a remedy.
  Discussion is ongoing on whether this should be added in the
  transparent way the current document chooses (so it can be
  seamlessly applied to existing modules such as those from
  <xref target="RFC6991"/>) and/or by adding information to the YANG modules in a
  future YANG extension.
  <xref target="I-D.bormann-cbor-yang-metadata"/> proposes a way to represent YANG metadata
  <xref target="RFC7952"/>, which essentially offer compatibility to the use of XML
  attributes in YANG-XML, efficiently and in a much less contorted way
  than that defined for JSON.</t>
        </li>
        <li>
          <t>YANG-SID <xref target="RFC9595"/>, published July 2024.
  This defines the registration and assignment processes for
  YANG-SIDs, the efficient binary unsigned integer representation for
  the text-based names found in YANG-XML and YANG-JSON, as well as a
  representation format ("SID file") for recording the mapping
  between YANG names and YANG SIDs that applies to each YANG module in
  use.
  These detailed processes need to take into account that YANG SIDs
  will be needed for many existing YANG modules, as well as YANG
  modules that are newly being developed and stay in this stage for a
  while.</t>
        </li>
      </ol>
      <t>Both YANG-CBOR and YANG-SID are designed so they can be used in any
YANG environment, including outside CORECONF, e.g., in a RESTCONF
environment to provide an efficient binary representation there as
well.</t>
      <ol spacing="normal" type="1" start="3"><li>
          <t>COMI (CoAP Management Interface for CORECONF, <xref target="I-D.ietf-core-comi"/>).
  COMI employs YANG-CBOR, YANG-SID, and CoAP to provide simplified
  network management operations for constrained devices.
  The datastore model supported today is that of a single unified
  datastore (with potential later extensions possible; e.g., for
  obtaining some of the benefits discussed in <xref section="2" sectionFormat="of" target="RFC8342"/>).
  As a replacement for SNMP's traps and special YANG notification
  protocols, COMI employs CoAP's "observe" mechanism, applied to
  "event stream resources".
  A potential extension to be added in a separate document could
  handle the remaining problem of how to control the amount of data
  that may be in a response to a request operating on a non-trivial
  data tree, potentially including, but not limited to, pagination
  <xref target="I-D.ietf-netconf-list-pagination"/>.  </t>
          <t>
Revision <tt>-16</tt> has passed Working Group Last Call (WGLC) on 2023-09-15.
This (and previous revisions) has been implemented in several
research environments and, during discussions in conjunction with
the May 2024 T2TRG interim meeting in Paris, was considered to meet
the goals these environments planned to achieve.
Based on implementation experience, the WG has since explored a
number of further rounds of simplification, one of which is still
outstanding; completion is considered imminent.</t>
        </li>
        <li>
          <t>Constrained YANG Module Library <xref target="I-D.ietf-core-yang-library"/>.
This document describes a simplified constrained version of the
YANG library <xref target="RFC8525"/> that provides information about the
YANG modules, datastores, and datastore schemas used by a
constrained network management server (e.g., a CORECONF server).
This document has passed Working Group Last Call (WGLC) already in
2020, but has been in hibernation since, while the other parts of
CORECONF were completed.
With renewed discussion about the "big" YANG library
<xref target="I-D.ietf-netconf-yang-library-augmentedby"/>, some fallout can be expected for the constrained
version as well.
(Note that basic resource discovery is already provided in the CoRE
ecosystem by <tt>/.well-known/core</tt>, the Link format employed there
<xref target="RFC6690"/>, as well as the CoRE Resource Directory <xref target="RFC9176"/>.)</t>
        </li>
      </ol>
      <t>In summary, CORECONF makes the use of YANG models accessible for
managing low-resource devices.
Beyond this immediate objective, there is a more general discussion
about the use of data/interaction modeling languages for IoT in
general, not just for network management.</t>
      <t>For instance, IETF's ASDF WG has specified the Semantic Definition Format
(SDF, <xref target="I-D.ietf-asdf-sdf"/>).
SDF describes Things in terms of their interaction opportunities
("affordances"), structured into properties, actions, and events, as
well as the data models behind these.</t>
      <t>It is just a convention that YANG is used for modeling network
management affordances and SDF for application-level affordances.
To potentially cross-pollinate between these techniques,
Kiesewalter explored bidirectional automatic translation between SDF
and YANG based forms of a data/interaction model <xref target="I-D.kiesewalter-asdf-yang-sdf"/>.
To obtain productive interworking between YANG, other relevant
modeling techniques, and different fields of application, one
discussion that will become necessary is how to consolidate support
for the rather different evolution patterns used by network management
specifications and application interactions (APIs).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>CORECONF uses CoAP, which can be protected using DTLS <xref target="RFC6347"/>
        <xref target="RFC9147"/> or OSCORE <xref target="RFC8613"/> with EDHOC <xref target="RFC9528"/>.
While both SNMP <xref target="STD62"/> <xref target="STD78"/> and NETCONF/RESTCONF <xref target="STD91"/> came with
elaborate network-management-focused security data models, CORECONF
acknowledges that the security models for network management of
constrained devices will often need to align with application security
models, such as <xref target="RFC9200"/> or the specific security model used in an
IoT ecosystem and its approach to commissioning <xref target="NORDIC-COMMISSIONING"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="SGML" to="ISO 8879:1986"/>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC1067">
        <front>
          <title>Simple Network Management Protocol</title>
          <author fullname="J.D. Case" initials="J.D." surname="Case"/>
          <author fullname="M. Fedor" initials="M." surname="Fedor"/>
          <author fullname="M.L. Schoffstall" initials="M.L." surname="Schoffstall"/>
          <author fullname="J. Davin" initials="J." surname="Davin"/>
          <date month="August" year="1988"/>
          <abstract>
            <t>This RFC defines a simple protocol by which management information for a network element may be inspected or altered by logically remote users. In particular, together with its companion memos which describe the structure of management information along with the initial management information base, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets and in particular, the Internet. This memo specifies a draft standard for the Internet community. TCP/IP implementations in the Internet which are network manageable are expected to adopt and implement this specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1067"/>
        <seriesInfo name="DOI" value="10.17487/RFC1067"/>
      </reference>
      <reference anchor="RFC1095">
        <front>
          <title>Common Management Information Services and Protocol over TCP/IP (CMOT)</title>
          <author fullname="U.S. Warrier" initials="U.S." surname="Warrier"/>
          <author fullname="L. Besaw" initials="L." surname="Besaw"/>
          <date month="April" year="1989"/>
          <abstract>
            <t>This memo defines a network management architecture that uses the International Organization for Standardization's (ISO) Common Management Information Services/Common Management Information Protocol (CMIS/CMIP) in a TCP/IP environment. This architecture provides a means by which control and monitoring information can be exchanged between a manager and a remote network element. In particular, this memo defines the means for implementing the Draft International Standard (DIS) version of CMIS/CMIP on top of Internet transport protocols for the purpose of carrying management information defined in the Internet-standard management information base. DIS CMIS/CMIP is suitable for deployment in TCP/IP networks while CMIS/CMIP moves toward becoming an International Standard. Together with the relevant ISO standards and the companion RFCs that describe the initial structure of management information and management information base, these documents provide the basis for a comprehensive architecture and system for managing TCP/IP- based internets, and in particular the Internet.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1095"/>
        <seriesInfo name="DOI" value="10.17487/RFC1095"/>
      </reference>
      <reference anchor="RFC4251">
        <front>
          <title>The Secure Shell (SSH) Protocol Architecture</title>
          <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
          <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4251"/>
        <seriesInfo name="DOI" value="10.17487/RFC4251"/>
      </reference>
      <reference anchor="SGML">
        <front>
          <title>Information processing - Text and office systems - Standard generalized markup language (SGML)</title>
          <author>
            <organization>International Organization for Standardization</organization>
          </author>
          <date year="1986"/>
        </front>
        <seriesInfo name="ISO" value="Standard 8879"/>
        <annotation> 
A scan of the paper form of ISO 8879:1986 is available at: https://nvlpubs.nist.gov/nistpubs/Legacy/FIPS/fipspub152.pdf</annotation>
      </reference>
      <reference anchor="RFC4741">
        <front>
          <title>NETCONF Configuration Protocol</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <date month="December" year="2006"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized on top of a simple Remote Procedure Call (RPC) layer. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4741"/>
        <seriesInfo name="DOI" value="10.17487/RFC4741"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <referencegroup anchor="STD58" target="https://www.rfc-editor.org/info/std58">
        <reference anchor="RFC2578" target="https://www.rfc-editor.org/info/rfc2578">
          <front>
            <title>Structure of Management Information Version 2 (SMIv2)</title>
            <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
            <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="April" year="1999"/>
            <abstract>
              <t>It is the purpose of this document, the Structure of Management Information Version 2 (SMIv2), to define that adapted subset, and to assign a set of associated administrative values. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="58"/>
          <seriesInfo name="RFC" value="2578"/>
          <seriesInfo name="DOI" value="10.17487/RFC2578"/>
        </reference>
        <reference anchor="RFC2579" target="https://www.rfc-editor.org/info/rfc2579">
          <front>
            <title>Textual Conventions for SMIv2</title>
            <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
            <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="April" year="1999"/>
            <abstract>
              <t>It is the purpose of this document to define the initial set of textual conventions available to all MIB modules. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="58"/>
          <seriesInfo name="RFC" value="2579"/>
          <seriesInfo name="DOI" value="10.17487/RFC2579"/>
        </reference>
        <reference anchor="RFC2580" target="https://www.rfc-editor.org/info/rfc2580">
          <front>
            <title>Conformance Statements for SMIv2</title>
            <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
            <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="April" year="1999"/>
            <abstract>
              <t>Collections of related objects are defined in MIB modules. It may be useful to define the acceptable lower-bounds of implementation, along with the actual level of implementation achieved. It is the purpose of this document to define the notation used for these purposes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="58"/>
          <seriesInfo name="RFC" value="2580"/>
          <seriesInfo name="DOI" value="10.17487/RFC2580"/>
        </reference>
      </referencegroup>
      <reference anchor="X.208">
        <front>
          <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
          <author>
            <organization>International Telephone and Telegraph
Consultative Committee</organization>
          </author>
          <date month="November" year="1988"/>
        </front>
        <seriesInfo name="CCITT" value="Recommendation X.208"/>
        <annotation>Technically identical with ISO 8824:1988.</annotation>
      </reference>
      <reference anchor="X.209">
        <front>
          <title>Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)</title>
          <author>
            <organization>International Telephone and Telegraph Consultative Committee</organization>
          </author>
          <date year="1988"/>
        </front>
        <seriesInfo name="CCITT" value="Recommendation X.209"/>
        <annotation>Technically identical with ISO 8825:1988.</annotation>
      </reference>
      <referencegroup anchor="STD62" target="https://www.rfc-editor.org/info/std62">
        <reference anchor="RFC3411" target="https://www.rfc-editor.org/info/rfc3411">
          <front>
            <title>An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes an architecture for describing Simple Network Management Protocol (SNMP) Management Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing a Message Processing Subsystem, a Security Subsystem and an Access Control Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data. This document obsoletes RFC 2571. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3411"/>
          <seriesInfo name="DOI" value="10.17487/RFC3411"/>
        </reference>
        <reference anchor="RFC3412" target="https://www.rfc-editor.org/info/rfc3412">
          <front>
            <title>Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="J. Case" initials="J." surname="Case"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the Message Processing and Dispatching for Simple Network Management Protocol (SNMP) messages within the SNMP architecture. It defines the procedures for dispatching potentially multiple versions of SNMP messages to the proper SNMP Message Processing Models, and for dispatching PDUs to SNMP applications. This document also describes one Message Processing Model - the SNMPv3 Message Processing Model. This document obsoletes RFC 2572. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3412"/>
          <seriesInfo name="DOI" value="10.17487/RFC3412"/>
        </reference>
        <reference anchor="RFC3413" target="https://www.rfc-editor.org/info/rfc3413">
          <front>
            <title>Simple Network Management Protocol (SNMP) Applications</title>
            <author fullname="D. Levi" initials="D." surname="Levi"/>
            <author fullname="P. Meyer" initials="P." surname="Meyer"/>
            <author fullname="B. Stewart" initials="B." surname="Stewart"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes five types of Simple Network Management Protocol (SNMP) applications which make use of an SNMP engine as described in STD 62, RFC 3411. The types of application described are Command Generators, Command Responders, Notification Originators, Notification Receivers, and Proxy Forwarders. This document also defines Management Information Base (MIB) modules for specifying targets of management operations, for notification filtering, and for proxy forwarding. This document obsoletes RFC 2573. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3413"/>
          <seriesInfo name="DOI" value="10.17487/RFC3413"/>
        </reference>
        <reference anchor="RFC3414" target="https://www.rfc-editor.org/info/rfc3414">
          <front>
            <title>User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the User-based Security Model (USM) for Simple Network Management Protocol (SNMP) version 3 for use in the SNMP architecture. It defines the Elements of Procedure for providing SNMP message level security. This document also includes a Management Information Base (MIB) for remotely monitoring/managing the configuration parameters for this Security Model. This document obsoletes RFC 2574. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3414"/>
          <seriesInfo name="DOI" value="10.17487/RFC3414"/>
        </reference>
        <reference anchor="RFC3415" target="https://www.rfc-editor.org/info/rfc3415">
          <front>
            <title>View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the View-based Access Control Model (VACM) for use in the Simple Network Management Protocol (SNMP) architecture. It defines the Elements of Procedure for controlling access to management information. This document also includes a Management Information Base (MIB) for remotely managing the configuration parameters for the View- based Access Control Model. This document obsoletes RFC 2575. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3415"/>
          <seriesInfo name="DOI" value="10.17487/RFC3415"/>
        </reference>
        <reference anchor="RFC3416" target="https://www.rfc-editor.org/info/rfc3416">
          <front>
            <title>Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="R. Presuhn" initials="R." role="editor" surname="Presuhn"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document defines version 2 of the protocol operations for the Simple Network Management Protocol (SNMP). It defines the syntax and elements of procedure for sending, receiving, and processing SNMP PDUs. This document obsoletes RFC 1905. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3416"/>
          <seriesInfo name="DOI" value="10.17487/RFC3416"/>
        </reference>
        <reference anchor="RFC3417" target="https://www.rfc-editor.org/info/rfc3417">
          <front>
            <title>Transport Mappings for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="R. Presuhn" initials="R." role="editor" surname="Presuhn"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document defines the transport of Simple Network Management Protocol (SNMP) messages over various protocols. This document obsoletes RFC 1906. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3417"/>
          <seriesInfo name="DOI" value="10.17487/RFC3417"/>
        </reference>
        <reference anchor="RFC3418" target="https://www.rfc-editor.org/info/rfc3418">
          <front>
            <title>Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="R. Presuhn" initials="R." role="editor" surname="Presuhn"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document defines managed objects which describe the behavior of a Simple Network Management Protocol (SNMP) entity. This document obsoletes RFC 1907, Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3418"/>
          <seriesInfo name="DOI" value="10.17487/RFC3418"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="STD78" target="https://www.rfc-editor.org/info/std78">
        <reference anchor="RFC5343" target="https://www.rfc-editor.org/info/rfc5343">
          <front>
            <title>Simple Network Management Protocol (SNMP) Context EngineID Discovery</title>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>The Simple Network Management Protocol (SNMP) version three (SNMPv3) requires that an application know the identifier (snmpEngineID) of the remote SNMP protocol engine in order to retrieve or manipulate objects maintained on the remote SNMP entity.</t>
              <t>This document introduces a well-known localEngineID and a discovery mechanism that can be used to learn the snmpEngineID of a remote SNMP protocol engine. The proposed mechanism is independent of the features provided by SNMP security models and may also be used by other protocol interfaces providing access to managed objects.</t>
              <t>This document updates RFC 3411. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="78"/>
          <seriesInfo name="RFC" value="5343"/>
          <seriesInfo name="DOI" value="10.17487/RFC5343"/>
        </reference>
        <reference anchor="RFC5590" target="https://www.rfc-editor.org/info/rfc5590">
          <front>
            <title>Transport Subsystem for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="June" year="2009"/>
            <abstract>
              <t>This document defines a Transport Subsystem, extending the Simple Network Management Protocol (SNMP) architecture defined in RFC 3411. This document defines a subsystem to contain Transport Models that is comparable to other subsystems in the RFC 3411 architecture. As work is being done to expand the transports to include secure transports, such as the Secure Shell (SSH) Protocol and Transport Layer Security (TLS), using a subsystem will enable consistent design and modularity of such Transport Models. This document identifies and describes some key aspects that need to be considered for any Transport Model for SNMP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="78"/>
          <seriesInfo name="RFC" value="5590"/>
          <seriesInfo name="DOI" value="10.17487/RFC5590"/>
        </reference>
        <reference anchor="RFC5591" target="https://www.rfc-editor.org/info/rfc5591">
          <front>
            <title>Transport Security Model for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="June" year="2009"/>
            <abstract>
              <t>This memo describes a Transport Security Model for the Simple Network Management Protocol (SNMP).</t>
              <t>This memo also defines a portion of the Management Information Base (MIB) for monitoring and managing the Transport Security Model for SNMP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="78"/>
          <seriesInfo name="RFC" value="5591"/>
          <seriesInfo name="DOI" value="10.17487/RFC5591"/>
        </reference>
        <reference anchor="RFC6353" target="https://www.rfc-editor.org/info/rfc6353">
          <front>
            <title>Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document describes a Transport Model for the Simple Network Management Protocol (SNMP), that uses either the Transport Layer Security protocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS protocols provide authentication and privacy services for SNMP applications. This document describes how the TLS Transport Model (TLSTM) implements the needed features of an SNMP Transport Subsystem to make this protection possible in an interoperable way.</t>
              <t>This Transport Model is designed to meet the security and operational needs of network administrators. It supports the sending of SNMP messages over TLS/TCP and DTLS/UDP. The TLS mode can make use of TCP's improved support for larger packet sizes and the DTLS mode provides potentially superior operation in environments where a connectionless (e.g., UDP) transport is preferred. Both TLS and DTLS integrate well into existing public keying infrastructures.</t>
              <t>This document also defines a portion of the Management Information Base (MIB) for use with network management protocols. In particular, it defines objects for managing the TLS Transport Model for SNMP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="78"/>
          <seriesInfo name="RFC" value="6353"/>
          <seriesInfo name="DOI" value="10.17487/RFC6353"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="STD91" target="https://www.rfc-editor.org/info/std91">
        <reference anchor="RFC8341" target="https://www.rfc-editor.org/info/rfc8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7388">
        <front>
          <title>Definition of Managed Objects for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
          <author fullname="T. Tsou" initials="T." surname="Tsou"/>
          <author fullname="C. Zhou" initials="C." surname="Zhou"/>
          <date month="October" year="2014"/>
          <abstract>
            <t>This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7388"/>
        <seriesInfo name="DOI" value="10.17487/RFC7388"/>
      </reference>
      <reference anchor="RFC7049">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="October" year="2013"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7049"/>
        <seriesInfo name="DOI" value="10.17487/RFC7049"/>
      </reference>
      <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7228">
        <front>
          <title>Terminology for Constrained-Node Networks</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="M. Ersue" initials="M." surname="Ersue"/>
          <author fullname="A. Keranen" initials="A." surname="Keranen"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7228"/>
        <seriesInfo name="DOI" value="10.17487/RFC7228"/>
      </reference>
      <reference anchor="I-D.ietf-iotops-7228bis">
        <front>
          <title>Terminology for Constrained-Node Networks</title>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
          <author fullname="Ari Keränen" initials="A." surname="Keränen">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Carles Gomez" initials="C." surname="Gomez">
            <organization>Universitat Politecnica de Catalunya</organization>
          </author>
          <date day="8" month="July" year="2024"/>
          <abstract>
            <t>   The Internet Protocol Suite is increasingly used on small devices
   with severe constraints on power, memory, and processing resources,
   creating constrained-node networks.  This document provides a number
   of basic terms that have been useful in the standardization work for
   constrained-node networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-00"/>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC3444">
        <front>
          <title>On the Difference between Information Models and Data Models</title>
          <author fullname="A. Pras" initials="A." surname="Pras"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3444"/>
        <seriesInfo name="DOI" value="10.17487/RFC3444"/>
      </reference>
      <reference anchor="RFC6643">
        <front>
          <title>Translation of Structure of Management Information Version 2 (SMIv2) MIB Modules to YANG Modules</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="July" year="2012"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. The Structure of Management Information (SMIv2) defines fundamental data types, an object model, and the rules for writing and revising MIB modules for use with the Simple Network Management Protocol (SNMP). This document defines a translation of SMIv2 MIB modules into YANG modules, enabling read-only (config false) access to data objects defined in SMIv2 MIB modules via NETCONF. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6643"/>
        <seriesInfo name="DOI" value="10.17487/RFC6643"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC7951">
        <front>
          <title>JSON Encoding of Data Modeled with YANG</title>
          <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7951"/>
        <seriesInfo name="DOI" value="10.17487/RFC7951"/>
      </reference>
      <reference anchor="RFC6991">
        <front>
          <title>Common YANG Data Types</title>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6991"/>
        <seriesInfo name="DOI" value="10.17487/RFC6991"/>
      </reference>
      <reference anchor="RFC7959">
        <front>
          <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
            <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
            <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7959"/>
        <seriesInfo name="DOI" value="10.17487/RFC7959"/>
      </reference>
      <reference anchor="RFC7641">
        <front>
          <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <date month="September" year="2015"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7641"/>
        <seriesInfo name="DOI" value="10.17487/RFC7641"/>
      </reference>
      <reference anchor="RFC8132">
        <front>
          <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
          <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
          <date month="April" year="2017"/>
          <abstract>
            <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
            <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8132"/>
        <seriesInfo name="DOI" value="10.17487/RFC8132"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC7493">
        <front>
          <title>The I-JSON Message Format</title>
          <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7493"/>
        <seriesInfo name="DOI" value="10.17487/RFC7493"/>
      </reference>
      <referencegroup anchor="STD90" target="https://www.rfc-editor.org/info/std90">
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC8525">
        <front>
          <title>YANG Library</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <author fullname="R. Wilton" initials="R." surname="Wilton"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8525"/>
        <seriesInfo name="DOI" value="10.17487/RFC8525"/>
      </reference>
      <reference anchor="RFC9254">
        <front>
          <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
          <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
          <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
          <author fullname="A. Pelov" initials="A." surname="Pelov"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <date month="July" year="2022"/>
          <abstract>
            <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
            <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9254"/>
        <seriesInfo name="DOI" value="10.17487/RFC9254"/>
      </reference>
      <reference anchor="RFC9595">
        <front>
          <title>YANG Schema Item iDentifier (YANG SID)</title>
          <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
          <author fullname="A. Pelov" initials="A." role="editor" surname="Pelov"/>
          <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <date month="July" year="2024"/>
          <abstract>
            <t>YANG Schema Item iDentifiers (YANG SIDs) are globally unique 63-bit unsigned integers used to identify YANG items. SIDs provide a more compact method for identifying those YANG items that can be used efficiently, notably in constrained environments (RFC 7228). This document defines the semantics, registration processes, and assignment processes for YANG SIDs for IETF-managed YANG modules. To enable the implementation of these processes, this document also defines a file format used to persist and publish assigned YANG SIDs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9595"/>
        <seriesInfo name="DOI" value="10.17487/RFC9595"/>
      </reference>
      <reference anchor="I-D.ietf-core-comi">
        <front>
          <title>CoAP Management Interface (CORECONF)</title>
          <author fullname="Michel Veillette" initials="M." surname="Veillette">
            <organization>Trilliant Networks Inc.</organization>
          </author>
          <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
            <organization>consultant</organization>
          </author>
          <author fullname="Alexander Pelov" initials="A." surname="Pelov">
            <organization>IMT Atlantique</organization>
          </author>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
            <organization>YumaWorks</organization>
          </author>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="3" month="November" year="2024"/>
          <abstract>
            <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-19"/>
      </reference>
      <reference anchor="I-D.ietf-core-yang-library">
        <front>
          <title>Constrained YANG Module Library</title>
          <author fullname="Michel Veillette" initials="M." surname="Veillette">
            <organization>Trilliant Networks Inc.</organization>
          </author>
          <author fullname="Ivaylo Petrov" initials="I." surname="Petrov">
            <organization>Acklio</organization>
          </author>
          <date day="11" month="January" year="2021"/>
          <abstract>
            <t>   This document describes a constrained version of the YANG library
   that provides information about the YANG modules, datastores, and
   datastore schemas used by a constrained network management server
   (e.g., a CORECONF server).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-yang-library-03"/>
      </reference>
      <reference anchor="I-D.ietf-netconf-yang-library-augmentedby">
        <front>
          <title>Augmented-by Addition into the IETF-YANG-Library</title>
          <author fullname="Zhuoyao Lin" initials="Z." surname="Lin">
            <organization>Huawei</organization>
          </author>
          <author fullname="Benoît Claise" initials="B." surname="Claise">
            <organization>Huawei</organization>
          </author>
          <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
            <organization>Telefonica</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   This document augments the ietf-yang-library to provide the
   augmented-by list.  It facilitates the process of obtaining the
   entire dependencies between YANG modules, by directly querying the
   server's YANG module.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/Zephyre777/draft-lincla-netconf-yang-library-
   augmentation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-yang-library-augmentedby-01"/>
      </reference>
      <reference anchor="I-D.ietf-netconf-list-pagination">
        <front>
          <title>List Pagination for YANG-driven Protocols</title>
          <author fullname="Kent Watsen" initials="K." surname="Watsen">
            <organization>Watsen Networks</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Per Andersson" initials="P." surname="Andersson">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Olof Hagsand" initials="O." surname="Hagsand">
            <organization>SUNET</organization>
          </author>
          <author fullname="Hongwei Li" initials="H." surname="Li">
            <organization>Hewlett Packard Enterprise</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   In some circumstances, instances of YANG modeled "list" and "leaf-
   list" nodes may contain numerous entries.  Retrieval of all the
   entries can lead to inefficiencies in the server, the client, and the
   network in between.

   This document defines a model for list pagination that can be
   implemented by YANG-driven management protocols such as NETCONF and
   RESTCONF.  The model supports paging over optionally filtered and/or
   sorted entries.  The solution additionally enables servers to
   constrain query expressions on some "config false" lists or leaf-
   lists.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-list-pagination-05"/>
      </reference>
      <reference anchor="RFC8342">
        <front>
          <title>Network Management Datastore Architecture (NMDA)</title>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <author fullname="P. Shafer" initials="P." surname="Shafer"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <author fullname="R. Wilton" initials="R." surname="Wilton"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8342"/>
        <seriesInfo name="DOI" value="10.17487/RFC8342"/>
      </reference>
      <reference anchor="RFC6347">
        <front>
          <title>Datagram Transport Layer Security Version 1.2</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
          <date month="January" year="2012"/>
          <abstract>
            <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6347"/>
        <seriesInfo name="DOI" value="10.17487/RFC6347"/>
      </reference>
      <reference anchor="RFC6690">
        <front>
          <title>Constrained RESTful Environments (CoRE) Link Format</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <date month="August" year="2012"/>
          <abstract>
            <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6690"/>
        <seriesInfo name="DOI" value="10.17487/RFC6690"/>
      </reference>
      <reference anchor="RFC9176">
        <front>
          <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
          <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="M. Koster" initials="M." surname="Koster"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
          <date month="April" year="2022"/>
          <abstract>
            <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9176"/>
        <seriesInfo name="DOI" value="10.17487/RFC9176"/>
      </reference>
      <reference anchor="RFC8613">
        <front>
          <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
            <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8613"/>
        <seriesInfo name="DOI" value="10.17487/RFC8613"/>
      </reference>
      <reference anchor="RFC9528">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9528"/>
        <seriesInfo name="DOI" value="10.17487/RFC9528"/>
      </reference>
      <reference anchor="RFC9147">
        <front>
          <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
          <date month="April" year="2022"/>
          <abstract>
            <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
            <t>This document obsoletes RFC 6347.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9147"/>
        <seriesInfo name="DOI" value="10.17487/RFC9147"/>
      </reference>
      <reference anchor="RFC9200">
        <front>
          <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9200"/>
        <seriesInfo name="DOI" value="10.17487/RFC9200"/>
      </reference>
      <referencegroup anchor="STD97" target="https://www.rfc-editor.org/info/std97">
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="STD98" target="https://www.rfc-editor.org/info/std98">
        <reference anchor="RFC9111" target="https://www.rfc-editor.org/info/rfc9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7952">
        <front>
          <title>Defining and Using Metadata with YANG</title>
          <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>This document defines a YANG extension that allows for defining metadata annotations in YANG modules. The document also specifies XML and JSON encoding of annotations and other rules for annotating instances of YANG data nodes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7952"/>
        <seriesInfo name="DOI" value="10.17487/RFC7952"/>
      </reference>
      <reference anchor="I-D.bormann-cbor-yang-metadata">
        <front>
          <title>Representing metadata annotations in YANG-CBOR</title>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="18" month="April" year="2024"/>
          <abstract>
            <t>   This specification defines the representation of metadata annotations
   (RFC 7952) in YANG-CBOR (RFC 9254).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-yang-metadata-00"/>
      </reference>
      <reference anchor="I-D.bormann-cbor-yang-standin">
        <front>
          <title>Stand-in Tags for YANG-CBOR</title>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <author fullname="Maria Matějka" initials="M." surname="Matějka">
            <organization>CZ.NIC</organization>
          </author>
          <date day="21" month="February" year="2024"/>
          <abstract>
            <t>   YANG (RFC 7950) is a data modeling language used to model
   configuration data, state data, parameters and results of Remote
   Procedure Call (RPC) operations or actions, and notifications.

   YANG-CBOR (RFC 9254) defines encoding rules for YANG in the Concise
   Binary Object Representation (CBOR) (RFC 8949).  While the overall
   structure of YANG-CBOR is encoded in an efficient, binary format,
   YANG itself has its roots in XML and therefore traditionally encodes
   some information such as date/times and IP addresses/prefixes in a
   verbose text form.

   This document defines how to use existing CBOR tags for this kind of
   information in YANG-CBOR as a "stand-in" for the text-based
   information that would be found in the original form of YANG-CBOR.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-yang-standin-00"/>
      </reference>
      <reference anchor="IOT-SCALE" target="https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/">
        <front>
          <title>Number of Internet of Things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2033</title>
          <author>
            <organization>Statista</organization>
          </author>
          <date year="2024" month="June"/>
        </front>
      </reference>
      <reference anchor="POWER" target="https://www.statista.com/statistics/270281/electricity-generation-worldwide/">
        <front>
          <title>Electricity generation worldwide from 1990 to 2023</title>
          <author>
            <organization>Statista</organization>
          </author>
          <date year="2024" month="June"/>
        </front>
      </reference>
      <reference anchor="REST-IOT">
        <front>
          <title>Guidance on RESTful Design for Internet of Things Systems</title>
          <author fullname="Ari Keränen" initials="A." surname="Keränen">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
            <organization>Siemens</organization>
          </author>
          <author fullname="Klaus Hartke" initials="K." surname="Hartke">
         </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   This document gives guidance for designing Internet of Things (IoT)
   systems that follow the principles of the Representational State
   Transfer (REST) architectural style.  This document is a product of
   the IRTF Thing-to-Thing Research Group (T2TRG).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-15"/>
      </reference>
      <reference anchor="SNMP-NETCONF">
        <front>
          <title>Management of resource constrained devices in the internet of things</title>
          <author fullname="Anuj Sehgal" initials="A." surname="Sehgal">
            <organization/>
          </author>
          <author fullname="Vladislav Perelman" initials="V." surname="Perelman">
            <organization/>
          </author>
          <author fullname="Siarhei Kuryla" initials="S." surname="Kuryla">
            <organization/>
          </author>
          <author fullname="Jurgen Schonwalder" initials="J." surname="Schonwalder">
            <organization/>
          </author>
          <date month="December" year="2012"/>
        </front>
        <seriesInfo name="IEEE Communications Magazine" value="vol. 50, no. 12, pp. 144-149"/>
        <seriesInfo name="DOI" value="10.1109/mcom.2012.6384464"/>
        <refcontent>Institute of Electrical and Electronics Engineers (IEEE)</refcontent>
      </reference>
      <reference anchor="LWM2M" target="https://www.openmobilealliance.org/lwm2m">
        <front>
          <title>About LwM2M</title>
          <author>
            <organization>OMA SpecWorks</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="I-D.ietf-asdf-sdf">
        <front>
          <title>Semantic Definition Format (SDF) for Data and Interactions of Things</title>
          <author fullname="Michael Koster" initials="M." surname="Koster">
            <organization>KTC</organization>
          </author>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <author fullname="Ari Keränen" initials="A." surname="Keränen">
            <organization>Ericsson</organization>
          </author>
          <date day="28" month="February" year="2024"/>
          <abstract>
            <t>   The Semantic Definition Format (SDF) is a format for domain experts
   to use in the creation and maintenance of data and interaction models
   that describe Things, i.e., physical objects that are available for
   interaction over a network.  An SDF specification describes
   definitions of SDF Objects/SDF Things and their associated
   interactions (Events, Actions, Properties), as well as the Data types
   for the information exchanged in those interactions.  Tools convert
   this format to database formats and other serializations as needed.


   // The present revision (-18) adds security considerations, a few
   // editorial cleanups, discusses JSON pointer encodings, and adds
   // sockets to the CDDL for easier future extension.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-asdf-sdf-18"/>
      </reference>
      <reference anchor="I-D.kiesewalter-asdf-yang-sdf">
        <front>
          <title>Mapping between YANG and SDF</title>
          <author fullname="Jana Kiesewalter" initials="J." surname="Kiesewalter">
            <organization>Universität Bremen</organization>
          </author>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="6" month="November" year="2021"/>
          <abstract>
            <t>   YANG and SDF are two languages for modelling the interaction with and
   the data interchanged with devices in the network.  As their areas of
   application (network management, IoT, resp.) overlap, it is useful to
   be able to translate between the two.

   The present specification provides information about how models in
   one of the two languages can be translated into the other.  This
   specification is not intended to be normative, but to help with
   creating translators.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kiesewalter-asdf-yang-sdf-01"/>
      </reference>
      <reference anchor="COMAN">
        <front>
          <title>Management of Networks of Constrained Devices: Use Cases and Requirements</title>
          <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
          <author fullname="Dan Romascanu" initials="D." surname="Romascanu">
         </author>
          <author fullname="Jürgen Schönwälder" initials="J." surname="Schönwälder">
         </author>
          <date day="9" month="July" year="2012"/>
          <abstract>
            <t>   This document raises the questions on and discusses the use cases,
   requirements and the solutions required for the management of a
   network with constrained devices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ersue-constrained-mgmt-00"/>
      </reference>
      <reference anchor="I-D.draft-bierman-netconf-restconf-00">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
         </author>
          <author fullname="Martin Björklund" initials="M." surname="Björklund">
         </author>
          <author fullname="Kent Watsen" initials="K." surname="Watsen">
         </author>
          <author fullname="Rex Fernando" initials="R." surname="Fernando">
         </author>
          <date day="4" month="September" year="2013"/>
          <abstract>
            <t>   This document describes a RESTful protocol that provides a
   programmatic interface over HTTP for accessing data defined in YANG,
   using the datastores defined in NETCONF.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-bierman-netconf-restconf-00"/>
      </reference>
      <reference anchor="I-D.draft-vanderstok-core-comi-00">
        <front>
          <title>CoAp Management Interfaces</title>
          <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         </author>
          <date day="28" month="June" year="2013"/>
          <abstract>
            <t>   The draft describes an interface based on CoAP to manage constrained
   devices.  Access to existing MIBs is included.  The proposed
   integration of CoAP with SNMP reduces the code size by removing an
   important part of the SNMP code.  The draft lists a set of CoMI
   objects that describe the operational settings of the applications on
   the device.  A majority of them is taken over from other drafts to
   provide one uniform CoMI based access.

Note

   Discussion and suggestions for improvement are requested, and should
   be sent to core@ietf.org.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-vanderstok-core-comi-00"/>
      </reference>
      <reference anchor="I-D.draft-vanderstok-core-comi-05">
        <front>
          <title>CoAP Management Interface</title>
          <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         </author>
          <author fullname="Bert Greevenbosch" initials="B." surname="Greevenbosch">
         </author>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
         </author>
          <author fullname="Jürgen Schönwälder" initials="J." surname="Schönwälder">
         </author>
          <author fullname="Anuj Sehgal" initials="A." surname="Sehgal">
         </author>
          <date day="27" month="October" year="2014"/>
          <abstract>
            <t>   This document describes a network management interface for
   constrained devices, called CoMI.  CoMI is an adaptation of the
   RESTCONF protocol for use in constrained devices and networks.  It is
   designed to reduce the message sizes, server code size, and
   application development complexity.  The Constrained Application
   Protocol (CoAP) is used to access management data resources specified
   in YANG, or SMIv2 converted to YANG.  The payload of the CoMI message
   is encoded in Concise Binary Object Representation (CBOR).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-vanderstok-core-comi-05"/>
      </reference>
      <reference anchor="I-D.draft-veillette-core-cool-00">
        <front>
          <title>Constrained Objects Language</title>
          <author fullname="Michel Veillette" initials="M." surname="Veillette">
         </author>
          <author fullname="Alexander Pelov" initials="A." surname="Pelov">
         </author>
          <date day="1" month="November" year="2015"/>
          <abstract>
            <t>   This document describes a management interface adapted to constrained
   devices and constrained (e.g., low-power, lossy) networks.  CoOL
   resources (datastores, protocol operations and notifications) are
   defined using the YANG modelling language [RFC6020].  Interactions
   with these resources are performed using the CoAP web transfer
   protocol [RFC7252].  Payloads and specific CoAP options are encoded
   using the CBOR data format [RFC7049].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-veillette-core-cool-00"/>
      </reference>
      <reference anchor="I-D.toutain-lpwan-sid-allocation">
        <front>
          <title>SCHC Rule Access Control</title>
          <author fullname="Ana Minaburo" initials="A." surname="Minaburo">
            <organization>Acklio</organization>
          </author>
          <author fullname="Laurent Toutain" initials="L." surname="Toutain">
            <organization>Institut MINES TELECOM; IMT Atlantique</organization>
          </author>
          <date day="23" month="February" year="2023"/>
          <abstract>
            <t>   blabla

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-toutain-lpwan-sid-allocation-02"/>
      </reference>
      <reference anchor="NORDIC-COMMISSIONING" target="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/protocols/thread/overview/commissioning.html">
        <front>
          <title>OpenThread Commissioning</title>
          <author>
            <organization>Nordic Semiconductor</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="REST" target="http://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdf">
        <front>
          <title>Architectural Styles and the Design of Network-based Software Architectures</title>
          <author initials="R." surname="Fielding" fullname="Roy Fielding">
            <organization/>
          </author>
          <date year="2000"/>
        </front>
        <seriesInfo name="ISBN" value="0-599-87118-0"/>
        <refcontent>Ph.D. Dissertation, University of California, Irvine</refcontent>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
