<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nmop-simap-concept-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="SIMAP Concept &amp; Needs">SIMAP: Concept, Requirements, and Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-05"/>
    <author fullname="Olga Havel">
      <organization>Huawei</organization>
      <address>
        <email>olga.havel@huawei.com</email>
      </address>
    </author>
    <author fullname="Benoit Claise">
      <organization>Huawei</organization>
      <address>
        <email>benoit.claise@huawei.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>Service &amp; Infrastructure Maps</keyword>
    <keyword>Service emulation</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>Service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>Service flexibility</keyword>
    <keyword>Service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>Digital Map</keyword>
    <keyword>Emulation</keyword>
    <keyword>Simulation</keyword>
    <keyword>Topology</keyword>
    <keyword>Multi-layer</keyword>
    <abstract>
      <?line 64?>

<t>This document defines the concept of Service &amp; Infrastructure Maps (SIMAP) and identifies a set of SIMAP
requirements and use cases. The SIMAP was previously known as Digital Map.</t>
      <t>The document intends to be used as a reference for the assessment of the various topology modules to meet
SIMAP requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Management Operations Working Group mailing list (nmop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-wg-nmop/draft-ietf-nmop-digital-map-concept"/>.</t>
    </note>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Service &amp; Infrastructure Maps (SIMAP) is a data model that provides a view of the operator's networks and services,
including how it is connected to other models/data (e.g., inventory, observability sources, and
operational knowledge). It specifically provides an approach to model multi-layered topology
and an appropriate mechanism to navigate amongst layers and correlate between them.
This includes layers from physical topology to service topology.
This model is applicable to multiple domains (access, core, data center, etc.) and
technologies (Optical, IP, etc.).</t>
      <t>The SIMAP modelling defines the core topological entities (network, node, link, and termination point) at each layer,
their role in the network topology, core topological properties, and topological relationships
both inside each layer and between the layers. It also defines how to access other external models
from a topology. SIMAP is a topological model that is linked to other functional
models and connects them all: configuration, maintenance, assurance (KPIs, status, health, and symptoms),
Traffic-Engineering (TE), different behaviors and actions, simulation, emulation, mathematical abstractions,
AI algorithms, etc. These other models exist outside of the SIMAP and are not defined during SIMAP modelling.</t>
      <t>The SIMAP data consists of virtual instances of network and service topologies at different layers.
The SIMAP provides access to this data via standard APIs for both read and write access, typically as a nortbound
interface from a controller, with query capabilities and links to other YANG modules (e.g., Service Assurance for
Intent-based Networking (SAIN) <xref target="RFC9417"/>, Service Attachment Points (SAPs) <xref target="RFC9408"/>,
Inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>, and potentially linking to non-YANG models).
The SIMAP also provides write operations with the same set of APIs, not to change a topology layer
on the fly as a northbound interface from the controller, but for offline simulations, before applying
the changes to the network via the normal controller operations.</t>
      <t>Both read and write APIs are similar, stemming from the same YANG model, to facilitate the comparison
of the offline simulated SIMAP with the network one.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Topology:</dt>
        <dd>
          <t>Topology refers to the network and service topology.
A network topology defines how physical or logical nodes, links and
termination points are related and arranged. A Service topology defines how
service components (e.g., VPN instances, customer interfaces, and
customer links) between customer sites are interrelated and
arranged.</t>
        </dd>
        <dt/>
        <dd>
          <t>There are several types of topologies: point-to-point,
bus, ring, star, tree, mesh, hybrid, and daisy chain.</t>
        </dd>
        <dt/>
        <dd>
          <t>Topologies may be unidirectional or bidirectional (bus, some
rings).</t>
        </dd>
        <dt>Multi-layered topology:</dt>
        <dd>
          <t>A multi-layered topology models relationships between different topology layers,
where each layer represents a connectivity aspect of the network
and services that needs to be configured, controlled and monitored.
Each topology layer has a separate lifecycle.</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="RFC8345"/> also refers to this multi-layered topology as topology hierarchy (Stack). It
also uses layers when describing supporting relations (represent layered network topologies),
underlay/overlay, network nodes and layering information. <xref target="RFC8345"/> states that the model can be
used for representation of layered network topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="RFC8345"/> is flexible and can support both the same network topology instance with multiple layers (e.g., Layer 2 and Layer 3)
or separate network topology instances with supporting relations between them (e.g., separate Layer 2 and Layer 3).
Therefore, multiple topology layers can be grouped into the same network topology instance, if solution requires.</t>
        </dd>
        <dt>Topology layer:</dt>
        <dd>
          <t>A topology layer represents Topology at a single layer in the multi-layered topology.</t>
        </dd>
        <dt/>
        <dd>
          <t>The topology layer can also represent what needs to be managed by a
specific user or application, for example the IGP layer can be of interest to the operator
troubleshooting or optimizing the routing, while the optical layer may be
of interest to the user managing the optical network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers may relate closely to OSI layers, like Layer 1 topology
for physical topology, Layer 2 for link topology and Layer 3 for IPv4 and
IPv6 topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers represent the control aspects of Layer 3, like OSPF, IS-IS, or BGP.</t>
        </dd>
        <dt/>
        <dd>
          <t>The service layer represents the Service view of the connectivity, that can differ for
different types of Services and for different providers/solutions.</t>
        </dd>
        <dt/>
        <dd>
          <t>The top layer represents the application/flow view of Service connectivity.</t>
        </dd>
        <dt>Service:</dt>
        <dd>
          <t>A service represents network connectivity service provided over a network that enables devices, systems, or networks to
communicate and exchange data with each other. It provides the underlying infrastructure and mechanisms
necessary for establishing, maintaining, and managing connections between different endpoints.
The example services are: L2VPN, L3VPN, EVPN, VPLS, VPWS,</t>
        </dd>
        <dt>Resource:</dt>
        <dd>
          <t>Defined in <xref target="I-D.ietf-nmop-terminology"/></t>
        </dd>
        <dt>Termination Point:</dt>
        <dd>
          <t>Defined in <xref target="RFC8345"/>, as follows:</t>
        </dd>
        <dt/>
        <dd>
          <t>The network-topology module defines a topology graph and components from which it is
composed: nodes, edges, and termination points.  Nodes (from the "ietf-network" module) represent
graph vertices and links represent graph edges.  Nodes also contain termination points that anchor the
links.</t>
        </dd>
        <dt/>
        <dd>
          <t>A node has a list of termination points that are used to terminate links. An example of a termination point might
be a physical or logical port or, more generally, an interface.
Like a node, a termination point can in turn be supported by an underlying termination point, contained in the
supporting node of the underlay network.</t>
        </dd>
      </dl>
      <t>The document defines the following terms:</t>
      <dl>
        <dt>Service &amp; Infrastructure Maps (SIMAP):</dt>
        <dd>
          <t>SIMAP is a data model that provides a view of the operator's networks and services, including how it is
connected to other models/data (e.g., inventory, observability sources, and operational knowledge).
It specifically provides an approach to model multi-layered topology and an appropriate mechanism to navigate
amongst layers and correlate between them. This includes layers from physical topology to service topology.
This model is applicable to multiple domains (access, core, data centers, etc.) and technologies (Optical, IP, etc.)</t>
        </dd>
        <dt/>
        <dd>
          <t>Therefore, SIMAP defines the core topological entities, their role in the network, core topological
properties, and relationships both inside each layer and between the layers.
It is a basic topological model with references/pointers to other models and connects them all:
configuration, maintenance, assurance (KPIs, status, health, symptoms, etc.), traffic engineering,
different behaviors, simulation, emulation, mathematical abstractions, AI algorithms, etc.</t>
        </dd>
        <dt>SIMAP modelling:</dt>
        <dd>
          <t>SIMAP modelling is the set of principles, guidelines, and conventions to model the SIMAP
using the IETF modelling approach <xref target="RFC8345"/>. They cover the
network types (layers and sublayers), entity types, entity roles
(network, node, termination point, or link), entity properties,
relationship types between entities and relationships to other entities.</t>
        </dd>
        <dt>SIMAP data:</dt>
        <dd>
          <t>SIMAP data consists of instances of network and Service topologies at
 different layers.  This includes instances of networks, nodes,
 links and termination points, topological relationships between
 nodes, links and termination points inside a network,
 relationships between instances belonging to different networks,
 links to functional data for the instances, including
 configuration, health, symptoms.</t>
        </dd>
        <dt/>
        <dd>
          <t>The SIMAP data can be historical, real-time, or future data for 'what-if' scenarios.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sample-simap-use-cases">
      <name>Sample SIMAP Use Cases</name>
      <t>The following subsections provide a non-exhaustive list of SIMAP use cases, with a focus on the related application requirements and its interactions with SIMAP, in order to extract the SIMAP-related requirements (Section 4.</t>
      <section anchor="common-enablers-for-simap">
        <name>Common Enablers for SIMAP</name>
        <t>This section identifies a set of enablers that are invoked when providing the various business-oriented SIMAP use cases.
These enablers are grouped here to avoid duplication.</t>
        <section anchor="service-resource">
          <name>Service -&gt; Resource</name>
          <t>The SIMAP APIs can be be invoked to retrieve all Services for selected network types.
An application that triggers such a request will be able to retrieve the topology for selected Services via
the SIMAP APIs and, from the response,
it will be able to navigate via the supporting relationship top-down to the lower layers. In doing so,
the application will be able to
determine what logical resources are used by a Service. The supporting relations to the lowest layer will help
the application to determine what physical resources are used by the Service.</t>
        </section>
        <section anchor="resource-service">
          <name>Resource -&gt; Service</name>
          <t>An application can navigate from the physical, Layer 2, or Layer 3 topology to the Services that rely upon specific
resources. For example, the application will be able to select the resources and by navigating the supporting
relationship bottom-up come to the Service and its nodes, termination points and links.</t>
          <t>This APIs can be invoked for Service impact analysis, for example.</t>
        </section>
        <section anchor="traffic-engineering-te">
          <name>Traffic Engineering (TE)</name>
          <t>Traffic Engineering (TE) <xref target="RFC9522"/> is a network optimization technique designed to enhance network performance
and resource utilization by intelligently controlling the flow of data, for example by enabling dynamic path
selection based on constraints such as bandwidth availability, latency, and link costs.</t>
          <t>Its primary goals are to prevent network congestion, balance traffic loads, and ensure efficient use of
bandwidth while meeting performance requirements.</t>
          <t>The TE use case is a combination of both the capacity planning and the simulation use case. Therefore, there
are no specific SIMAP requirements.</t>
        </section>
        <section anchor="closed-loop">
          <name>Closed Loop</name>
          <t>A network closed loop refers to an automated and intelligent system where network operations are continuously
monitored, analyzed, and optimized in real time through feedback mechanisms. This self-adjusting cycle ensures
that the network dynamically adapts to changes, resolves issues proactively, and maintains optimal performance
without manual intervention.</t>
          <t>Key Characteristics of a Network Closed Loop:</t>
          <ul spacing="normal">
            <li>
              <t>Real-Time Monitoring: Collects data from network devices, traffic flows, and applications to build
a comprehensive view of network health and performance.</t>
            </li>
            <li>
              <t>Automated Analysis: Ideally leverages AI and machine learning to identify anomalies, predict potential failures,
or detect security threats.</t>
            </li>
            <li>
              <t>Proactive Action: Automatically triggers corrective measures, such as reconfiguring devices, isolating
compromised endpoints, or rerouting traffic.</t>
            </li>
            <li>
              <t>Continuous Optimization: Uses feedback from previous cycles to refine network policies and improve future responses.</t>
            </li>
          </ul>
          <t>The application will be able to retrieve a topology layer and any network/node/termination point/link instances
from the controller via the SIMAP APIs and from the response it will be able to map the traffic analysis to
the entities (typically links and router) for automated analysis. The corrective measures would be applied,
either directly to the network by managing the SIMAP entities (network/node/termination point/link instances)
or by first validating the corrective measure in an offline simulation (see the simulation and
traffic engineering use cases).</t>
        </section>
      </section>
      <section anchor="inventory-queries">
        <name>Inventory Queries</name>
        <t>A network inventory refers to a comprehensive record or database that tracks and documents all the network
components and devices within an organization's IT infrastructure.</t>
        <t>Key elements typically found in a network inventory include:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Hardware Details:</dt>
              <dd>
                <t>Descriptions of physical devices such as routers (including their internal components such as cards, power supply
units, pluggables), switches, servers, network cables, including model numbers, serial numbers, and manufacturer
information. This information will facilitate locating additional details of the hardware in the manufacturer systems
and the correlation with the purchase catalog of the company.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Software and Firmware:</dt>
              <dd>
                <t>Versions of operating systems, network management tools, and firmware running on network devices.
Note that a network device can have components with their own software and firmware.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Licensing Information:</dt>
              <dd>
                <t>For any licensed software or devices, the network inventory will track license numbers, expiry dates, and compliance.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>A network inventory lifecycle refers to the stages a network device or component goes through from
its introduction to the network until its removal or replacement. It encompasses everything from acquisition and
deployment to maintenance, upgrade, and eventually decommissioning. Managing the network inventory lifecycle
efficiently is crucial for maintaining a secure, functional, and cost-effective network.</t>
        <t>A well-maintained network inventory helps organizations with network management, troubleshooting, asset tracking,
security, and ensuring compliance with regulations. It also helps in scaling the network, planning upgrades,
and responding to issues quickly.  In order to facilitate the planning and troubleshooting processes it is
necessary to be able to navigate from network inventory to network topology and Services.</t>
        <t>The application will be able to retrieve physical topology from the controller via the SIMAP APIs and from the
response it will be able to retrieve the physical inventory of individual devices and cables.</t>
        <t>The application may request either one or multiple topology layers via the SIMAP APIs and from the response
it will be able to retrieve both physical and logical inventory.</t>
        <t>For access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer Service, reduced Mean Time To Repair (MTTR), and
lower operational costs through truck roll reduction.
For example, operators may use custom-tags that are readily available for a customer-facing device, then query
the inventory based on that tag to correlate it with the inventory and then map it to the network/service topology.
The mapping and correlation can then be used for triggering appropriate Service checks.</t>
      </section>
      <section anchor="sec-feasibility">
        <name>Service Placement Feasibility Checks</name>
        <t>Service placement feasibility checks refer to the process of evaluating whether a specific Service can be deployed
and operated effectively in a given network. This includes accessing the various factors to ensure that the
service will function as intended (e.g., based on traffic performance requirements) without causing network disruptions
or inefficiencies and effecting other Services already provisioned on the network.</t>
        <t>Some of the factors that need assesing are network capabilities, status, limitations, resource usage and availability.
The Service could be simulated during the feasibility checks to identify if there are any potential issues.
The load testing could be done to evaluate performance under stress.</t>
        <t>The Service Feasibility Check application will be able to retrieve the topology at any layer from the controller
via the SIMAP APIs and from the response it will be able to navigate to any other YANG modules outside of the
core SIMAP topology to retrieve any other information needed, such as resource usage, availability, status, etc.</t>
      </section>
      <section anchor="intentservice-assurance">
        <name>Intent/Service Assurance</name>
        <t>Network intent and Service assurance work together to ensure that the network aligns with business goals and
that the Services provided meet the agreed-upon Service Level Agreements (SLAs).</t>
        <t>The Service Assurance for Intent-Based Networking Architecture (SAIN) <xref target="RFC9417"/> approach emphasizes
a comprehensive view of components involved in Service delivery, including network devices and functions,
to effectively monitor and maintain Service health.</t>
        <t>The key objectives of this architecture include:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Holistic Service Monitoring:</dt>
              <dd>
                <t>By considering all elements involved in Service delivery, the architecture enables a thorough assessment of
service health.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Correlation of Service Degradation:</dt>
              <dd>
                <t>It assists in linking Service performance issues to specific network components, facilitating precise
identification of faults.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Impact Assessment:</dt>
              <dd>
                <t>The architecture identifies which Services are affected by the failure or degradation of particular
network components, aiding in prioritizing remediation efforts.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>When a Service is degraded, the SAIN architecture will highlight where to look in the assurance Service graph,
as opposed to going hop by hop to troubleshoot the issue.
More precisely, the SAIN architecture will associate a list of symptoms originating
from specific SAIN subservices to each Service instance, corresponding to components of the network.
These components are good candidates for explaining the source of a Service degradation.</t>
        <t>The application will be able to retrieve a topology layer and any network/node/termination point/link instances
from the controller via the SIMAP APIs and from the response it will be able to determine the health of each instance
by navigating to the SAIN subservices and its symptoms.</t>
      </section>
      <section anchor="service-e2e-and-per-link-kpis">
        <name>Service E2E and Per-link KPIs</name>
        <t>The application will be able to retrieve a topology at any layer from a controller via the SIMAP APIs and from the
response it will be able to navigate to and retrieve any KPIs for selected topology entity.</t>
      </section>
      <section anchor="capacity-planning">
        <name>Capacity Planning</name>
        <t>Network Capacity Planning refers to the process of analyzing, predicting, and ensuring that the network has sufficient
capacity (e.g., <xref target="RFC5136"/>), resources, and infrastructure to meet current and future demands. It involves
evaluating the network's ability to handle increasing (including forecasted) amounts of data, traffic, and users'
activity, while maintaining acceptable levels of performance, reliability, and security.</t>
        <t>The capacity planning primary goal is to ensure that a network can support business operations, applications, and
services without interruptions, delays, or degradation in quality. This requires a thorough understanding of the
network's current state, as well as future requirements and growth projections.</t>
        <t>Key aspects of network capacity planning include:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic analysis: Monitoring and analyzing network traffic patterns to identify trends, peak usage periods, and areas
of congestion. For example, by generating a core traffic matrix with IPFIX flow record <xref target="RFC7011"/> or deducting
an approximate traffic matrix from the link utilization data.</t>
          </li>
          <li>
            <t>Resource utilization: Evaluating the link utilization throughout the network for the current demand to identify
bottlenecks and potential QoS peformance issues.</t>
          </li>
          <li>
            <t>Growth forecasting: Predicting future network growth based on business expansion, new applications, or changes in
users' behavior.</t>
          </li>
          <li>
            <t>What-if scenarios: Creating models to assess the network behavior under different scenarios, such as increased traffic,
failure conditions (link, router or Shared Risk Resource Group), and new application deployments (such as a new
Content Delivery Network source, a new peering point, a new data center...).</t>
          </li>
          <li>
            <t>Upgrade planning: Identifying areas where upgrades or additions are needed to ensure that the network can minimize the
 effect of node/link failures, mitigate QoS problems, or simply to support growing demands.</t>
          </li>
          <li>
            <t>Cost-benefit analysis: Evaluating the costs and benefits of upgrading or adding new resources to determine the most
cost-effective solutions.</t>
          </li>
        </ul>
        <t>By implementing a robust capacity planning process, organizations can:</t>
        <ul spacing="normal">
          <li>
            <t>Ensure better network reliability: Minimize downtime and ensure that the network is always available when needed.</t>
          </li>
          <li>
            <t>Improve performance: Optimize network resources to support business-critical applications and Services.</t>
          </li>
          <li>
            <t>Optimize costs: Avoid unnecessary over-provisioning by making informed decisions based on data-driven insights.</t>
          </li>
          <li>
            <t>Support business growth: Scale the network to meet increasing demands and support business expansion.</t>
          </li>
        </ul>
        <t>The application will be able to retrieve a topology layer and any network/node/termination point/link instances from
the controller via the SIMAP APIs and from the response it will be able to map the traffic analysis to the entities
(typically links and router), evaluate their current utilization, evaluate which elements
to add to the network based on the growth forecasting, and finally perform the 'what-if' failure analysis by
simulating the removal of link(s) and/or router(s) while evaluating the network performance.</t>
      </section>
      <section anchor="network-design">
        <name>Network Design</name>
        <t>Network design involves defining both the logical structure, such as access, aggregation, and core layers, and
the physical layout, including devices and links.</t>
        <t>It serves as a blueprint, detailing how these elements
interconnect to deliver the intended network behavior and functionality. The application will retrieve a
candidate network topology as the initial design, which can then undergo further analysis (e.g., perform traffic flow
simulations to identify bottlenecks and redundancy checks to ensure resilience) before being transformed into
actionable intent and, eventually, deployment actions.</t>
        <t>Throughout the network's lifecycle, the design rules
embedded within a topology can be continuously validated. For example, a link rule might specify that a connection
between core and aggregation layers must have its source(s) and destination(s) located within the same data center.
Another example is to declare that a specific link type should only exist between Core &lt;-&gt; Aggregation layer with
certain contraints on port optic speed, type (LR vs SR for instance), etc.</t>
        <t>The application can (via SIMAP API):</t>
        <ul spacing="normal">
          <li>
            <t>Write the proposed network interconnect (topology + rules), this is a new potential network interconnect.
One network (in case of small network) or interconnect of multiple networks (bigger networks).</t>
          </li>
          <li>
            <t>Write the intended network interconnect (topology + rules), this is the intent of the network topology that cannot
be retrieved from the real network (e.g. our L2 topology interconnect intent, or L3 topology interconnect intent).
One network (in case of small network) or interconnect of multiple networks (bigger networks).</t>
          </li>
          <li>
            <t>Retrieve the proposed network interconnect (topology + rules)  </t>
            <ul spacing="normal">
              <li>
                <t>Use case can be for purpose of traffic simulation, testing behavior under failures. Network simulation
use case is described in <xref target="sec-emule"/>.</t>
              </li>
              <li>
                <t>Use case can be for purpose of comparing different proposed network interconnects.</t>
              </li>
              <li>
                <t>Use case can be to build a simulated environment using this design. Network simulation
use case is described in <xref target="sec-emule"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Retrieve the intended network interconnect (topology + rules)</t>
          </li>
          <li>
            <t>At any point in time, compare the discovered topology with intended one  </t>
            <ul spacing="normal">
              <li>
                <t>Potentially validating discovered device configurations with intended ones assuming SIMAP has the
external reference to configuration from topology.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-emule">
        <name>Network Simulation and Network Emulation</name>
        <t>Network simulation is a process used to analyse the behaviour of networks via software. It allows network engineers
and researchers to assess how the network protocols work under different conditions, such as different topologies,
traffic loads, network failures, or the introduction of new devices. Network emulation, on the other hand,
replicates the behavior of a real-world network, allowing for more realistic analysis compared to network simulation.
While network simulation focuses on modeling and approximating network behavior, network emulation involves creating
a real-time, functional network environment whose protocols behave exactly like a real network. Ideally, network
emulation uses the same software images as the real network, but it could also be peformed (with less accuracy)
using generic software.</t>
        <section anchor="types-of-network-simulation">
          <name>Types of Network Simulation</name>
          <t>There are several types of network simulations, each designed to address specific needs and use cases. Below are
the main categories of network simulation:</t>
          <ol spacing="normal" type="1"><li>
              <dl>
                <dt>Discrete Event Simulation (DES):</dt>
                <dd>
                  <t>This is the most common type of network simulation. It models a series of events that occur at specific points
in time. Each event triggers a change in the state of a network component (e.g., a link is down, a card fails,
or a packet arrives).</t>
                </dd>
              </dl>
            </li>
            <li>
              <dl>
                <dt>Continuous Simulation:</dt>
                <dd>
                  <t>In contrast to discrete event simulation, continuous simulation models systems where variables change continuously
over time. Network parameters like bandwidth, congestion, and throughput can be treated as continuous functions.</t>
                </dd>
                <dt/>
                <dd>
                  <t>The main use case is to model certain aspects of network performance that evolve continuously, such as link speeds
or delay distributions in links that are impacted by environmental conditions (such as microwave or satellite links).</t>
                </dd>
              </dl>
            </li>
            <li>
              <dl>
                <dt>Monte Carlo Simulation:</dt>
                <dd>
                  <t>This type of simulation uses statistical methods to model and analyze networks under uncertain or variable conditions.
Monte Carlo simulations generate a large number of random samples to predict the performance of a network across
multiple scenarios. It is used for probabilistic analysis, risk assessment, and performance evaluation under
uncertain conditions.</t>
                </dd>
              </dl>
            </li>
          </ol>
        </section>
        <section anchor="goals-of-network-simulation">
          <name>Goals of Network Simulation</name>
          <t>The simulations can be also classified depending on the goal of the simulation.</t>
          <section anchor="network-protocol-analysis">
            <name>Network Protocol Analysis</name>
            <t>This type of simulation focuses on simulating specific networking protocols (IS-IS, OSPF, BGP, SR) to understand
how they perform under different conditions. It models the protocol operations and interactions among devices in
the network. For example, simulation can be used to assess the impact of changing a link metric. Moreover, specific
features of the networking protocol can be tested. For example, how fast-reroute performs in a given network topology.</t>
          </section>
          <section anchor="traffic-simulation">
            <name>Traffic Simulation</name>
            <t>This simulation focuses on modelling traffic flow across the network, including packet generation, flow control,
routing, and congestion. It aims to evaluate traffic's impact on network performance.</t>
            <t>The main use is to model the impact of different types of traffic (e.g., voice, video, mobile data, web browsing) and
understand how they affect the network's bandwidth and congestion levels. It can be used to identify bottlenecks and
assist the capacity planning process.</t>
          </section>
          <section anchor="simulation-of-different-topologies-under-normal-and-failure-scenarios">
            <name>Simulation of Different Topologies Under Normal and Failure Scenarios</name>
            <t>This type of simulation focuses on the structure and layout of the network itself. It simulates different network
topologies, such as mesh, horse-shoe, bus, star, or tree topologies, and their impact on the network's performance.
It can be used, together with the traffic simulation, to evaluate the most efficient topology for a network under
normal conditions and considering factors like fault tolerance.</t>
          </section>
        </section>
      </section>
      <section anchor="postmortem-replay">
        <name>Postmortem Replay</name>
        <t>For the postmortem replay use case, the application will use the SIMAP APIs for the purpose of analysis of network Service property
evolution based on recorded changes. A collection of relevant timestamped network events, such as routing updates,
configuration changes, link status modifications, traffic metrics evolution, and Service characteristics, is being
made accessible from and/or within a SIMAP to support investigation and automated processing.
Using a structured format, the stored data can be replayed in sequence, allowing network operators to examine
historical network behavior, diagnose issues, and assess the impact of such events on Service assurance.</t>
        <t>The mechanism supports correlation with external data sources to facilitate comprehensive post-mortem analysis.
Beyond centralizing and correlating such various sources of information, the SIMAP can provide simulation of
the network behaviour to assist investigations.</t>
        <t>In essence, this use case builds upon a collection of other SIMAP use cases, such as inventory queries,
intent/service assurance, Service KPIs, capacity planning, and simulation, to provide a thorough understanding of
a network event impacting Service assurance.</t>
        <t>Note that this use case may serve as a component of Service Disruption Detection fine tuning as described in
<xref target="I-D.ietf-nmop-network-anomaly-architecture"/>.</t>
      </section>
      <section anchor="network-digital-twin-ndt">
        <name>Network Digital Twin (NDT)</name>
        <t>Per <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>, Network Digital Twin (NDT) is a digital representation that is
used in the context of Networking and whose physical counterpart is a data network (e.g., provider network or
enterprise network). Also, as discussed in <xref section="9.2" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/>, network element
models and topology models help generate a virtual twin of the network according to the network element configuration,
operation data, network topology relationship, link state and other network information. The operation status can be
monitored and displayed and the network configuration change and optimization strategy can be pre-verified.</t>
        <t><xref section="9.4" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/> further elaborates on the requirements on various
interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>Network-facing interfaces are twin interfaces between the real network and its twin entity.
They are responsible for the information exchange between a real network and NDT. SIMAP APIs can be invoked within
such interfaces.</t>
          </li>
          <li>
            <t>Application-facing interfaces are between the NDT and applications. They are responsible for the information
exchange between Network Digital Twin and network applications. SIMAP APIs can be used for feasibility checks
(<xref target="sec-feasibility"/>) or emulation (<xref target="sec-emule"/>)).</t>
          </li>
        </ul>
        <t><xref section="9.4" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/> recommends that these interfaces are open
and standardized so as to avoid either hardware or software vendor lock and achieve interoperability.</t>
      </section>
    </section>
    <section anchor="simap-requirements">
      <name>SIMAP Requirements</name>
      <t>The SIMAP requirements are split into three groups for different target audiences:</t>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>Operator requirements:</dt>
            <dd>
              <t>These requirements are collected from the operators. They are functional requirements derived from the operators'
use cases. Some of the more specific semantic requirements were identified as <xref target="RFC8345"/> gaps during the Hackathons
with operators and added as specific semantic requirements to the operator use cases.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Design requirements:</dt>
            <dd>
              <t>These requirements are derived from the operators' requirements. Although there is some duplication,
these are focused on summarizing the operators' requirements for the design of the data model and API.
These are functional requirements translated into low-level requirements for the model designers.
The rationale for adopting this approach is to ensure that the data model is designed according to the operators'
requirements and that they could be used for both design and review of the candidate YANG module(s).</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Architecture requirements:</dt>
            <dd>
              <t>Architectural (non-functional) requirements are captured as well, as operators identified performance needs,
large scale support,  and network discovery. These are not data model requirements, but are requirements
either to drive the APIs design itself (e.g., to better optimize performance) or for the network controllers and
orchestrators that expose a SIMAP API. Although, they may be common sense requirements
not specific to SIMAP API,  they are listed here for completeness.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <section anchor="operator-requirements">
        <name>Operator Requirements</name>
        <t>The following are the operators' requirements for the SIMAP. Note that some of these requirements are supported by
default by <xref target="RFC8345"/>.</t>
        <dl>
          <dt>REQ-BASIC-MODEL-SUPPORT:</dt>
          <dd>
            <t>Basic model with network, node, link, and termination point entity types.</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that users of SIMAP
must be able to understand a topology model at any layer via these core concepts only,
without having to go to the details of the specific augmentations to understand the topology.</t>
          </dd>
          <dt>REQ-LAYERED-MODEL:</dt>
          <dd>
            <t>Topology layers from physical layer up to Service layer.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide views for all layers of network topology, from physical network
(ideally optical), Layer 2, Layer 3 up to  Service and intent views. It must provide flexibility
to support both the same network topology instance with multiple layers (e.g., Layer 2 and Layer 3)
or separate network topology instances with supporting relations between them (e.g., separate Layer 2 and Layer 3).
Multiple topology layers can be grouped into the same network topology instance, if solution requires.</t>
          </dd>
          <dt>REQ-VIEWPOINTS:</dt>
          <dd>
            <t>SIMAP should provide different views to different applications. For example, one application
may need to see Layer 2 and Layer 3 layers in a single network topology instance, while another application may need to see
them as separate network topology instances.</t>
          </dd>
          <dt>REQ-PASSIVE-TOPO:</dt>
          <dd>
            <t>SIMAP must support capability to model topology of the complete network, including active and passive parts.</t>
          </dd>
          <dt/>
          <dd>
            <t>For access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer Service, reduced MTTR, and lower operational costs
through truck roll reduction.</t>
          </dd>
          <dt/>
          <dd>
            <t>The passive topology must be either implemented in the SIMAP (what cannot be discovered can be added using the write API)
or accessible from the SIMAP. Whether the passive topology is included as part of the SIMAP or
accessible from the SIMAP is left to the solutions.</t>
          </dd>
          <dt>REQ-PROG-OPEN-MODEL:</dt>
          <dd>
            <t>Open and programmable SIMAP.</t>
          </dd>
          <dt/>
          <dd>
            <t>This includes "read" operations to retrieve the view of the network, typically as application-facing interface of
Software Defined Networking (SDN) controllers or orchestrators.</t>
          </dd>
          <dt/>
          <dd>
            <t>It also includes "write" operations, not for the ability to directly change the SIMAP data
(e.g., changing the network or Service parameters), but for offline simulations, also known as what-if scenarios.</t>
          </dd>
          <dt/>
          <dd>
            <t>Running a "what-if" analysis requires the ability to take
snapshots and to switch easily between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>Note that there is a need to distinguish between a change on the SIMAP
for future simulation and a change that reflects the current reality of the network.</t>
          </dd>
          <dt>REQ-STD-API-BASED:</dt>
          <dd>
            <t>Standard-based SIMAP and APIs, for multi-vendor support.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide the standard YANG APIs that provide for read/write and queries.
These APIs must also provide the capability to retrieve the links to external data/models.</t>
          </dd>
          <dt>REQ-COMMON-API:</dt>
          <dd>
            <t>SIMAP and common APIs, for multi domain.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP and its APIs must be common over different network domains (campus, core, data center, etc.).</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that clients of the SIMAP APIs must be able to understand the topology model of layers of any
domain without having to understand the details of any technologies and domains.</t>
          </dd>
          <dt>REQ-GRAPH-TRAVERSAL:</dt>
          <dd>
            <t>Topology graph traversal.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must be optimized for graph traversal for paths. This means that only providing link nodes and
source and sink relationships to termination-points may not be sufficient, we may need to have the direct
relationship between the termination points or nodes.</t>
          </dd>
          <dt>REQ-TOPOLOGY-ABSTRACTION:</dt>
          <dd>
            <t>Navigation across the abstraction levels.</t>
          </dd>
          <dt/>
          <dd>
            <t>A network (even a single layer network) can be represented
in multiple ways providing different abstraction views of the same network. In such a case, it would be beneficial
being able to navigate amongst the different levels of abstractions (e.g. to understand which set of nodes in the native
topology are actually represented as a single node in an abstract topology being built on top of the native topology).
This navigation is different and orthogonal to the multi-layer navigation where we need to report which Layer 2 path is
supporting a given Layer 3 node or link. Nevertheless, it would not be the best practice to expose it via different
topology APIs and model. Please refer to the <xref target="sec-topology-abstraction"/> for some background on the
topology abstraction.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide a mechanism to navigate across the abstraction levels.</t>
          </dd>
          <dt>REQ-LIVE:</dt>
          <dd>
            <t>Live network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable retrieval of multi-layered topology of a live network.</t>
          </dd>
          <dt/>
          <dd>
            <t>Live network is the latest known view of the network</t>
          </dd>
          <dt>REQ-SNAPSHOT:</dt>
          <dd>
            <t>Network snapshot topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable retrieval of multi-layered topology of different snapshots</t>
          </dd>
          <dt/>
          <dd>
            <t>Snapshot is the view of the network at any given point in time</t>
          </dd>
          <dt>REQ-POTENTIAL:</dt>
          <dd>
            <t>Potential new network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable both retrieval and write access to the potential new network.</t>
          </dd>
          <dt/>
          <dd>
            <t>A potential new network is the view at a given point with modifications from the snapshot.</t>
          </dd>
          <dt/>
          <dd>
            <t>This view may contain either the full topology or just differences from the snapshot.</t>
          </dd>
          <dt>REQ-INTENDED:</dt>
          <dd>
            <t>Intended network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable both retrieval and write access to the intended network topology that cannot be
discovered from the real network (e.g., intended Layer 2 Topology, intended Layer 3 Topology, and passive topology that
cannot be discovered).</t>
          </dd>
          <dt>REQ-SEMANTIC:</dt>
          <dd>
            <t>Network topology semantics.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide semantics for layered network topologies and for linking external models/data.</t>
          </dd>
        </dl>
        <t>The following requirements are more specific requirements for semantics:</t>
        <dl>
          <dt>REQ-LAYER-NAVIGATE:</dt>
          <dd>
            <t>SIMAP must provide capability to navigate inside the topology layer and between the topology layers.</t>
          </dd>
          <dt>REQ-EXTENSIBLE:</dt>
          <dd>
            <t>SIMAP must be extensible with metadata.</t>
          </dd>
          <dt>REQ-PLUGG:</dt>
          <dd>
            <t>SIMAP must be pluggable. That is,
</t>
            <ul spacing="normal">
              <li>
                <t>Must connect to other YANG modules for device configuration, inventory, configuration, assurance, etc.
The SIMAP does not contain the detailed device configuration, so a mechanism is needed to be able to link it from SIMAP.
SIMAP should also be linked to a 'logical configuration inventory'. Several examples of the type of logical information
to be linked from SIMAP: inventory of logical interfaces, inventory of ACLs, or inventory of routing policies.</t>
              </li>
              <li>
                <t>Given that no all involved components can be available using YANG, there is a need to connect
SIMAP YANG model with other modelling mechanisms.</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-BIDIR:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model bidirectional links.
While data flows are unidirectional, the
bidirectional links are also common in networking.  Examples are
Ethernet cables, bidirectional SONET rings, socket connection to the
server, etc.  There is also the requirement for simplified Service
layer topology, where a link is modeled as bidirectional in order to be
supported by unidirectional links at the lower layer.</t>
          </dd>
          <dt>REQ-MULTI-POINT:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model multipoint links.
A topology model should be able to model any
topology type in a simple and explicit way, including point to
multipoint, bus, ring, star, tree, mesh, hybrid and daisy chain. A
topology model should also be able to model any link cardinality in a
simple and explicit way, including point-to-point, point-to-multipoint,
multipoint-to-multipoint or hybrid.</t>
          </dd>
          <dt>REQ-MULTI-DOMAIN:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model links between networks.
This requirement is about covering connectivity between different networks, sub-networks, or domains.</t>
          </dd>
          <dt>REQ-SUBNETWORK:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model network decomposition into sub-networks.
The requirement is about modelling hierarchical networks , Autonomous Systems (ASes) with multiple areas, or a network
with multiple domains (e.g., access, core, data center).</t>
          </dd>
          <dt/>
          <dd>
            <t>The network can be partitioned by providing capability to have multiple child network instances as part of a
single parent network, with a relation between the parent network and child networks.</t>
          </dd>
          <dt>REQ-SHARED:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to share nodes, links, and termination points between different networks.</t>
          </dd>
          <dt>REQ-SUPPORTING:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model supporting relationships between different types of topological entities
(e.g., a termination point is supported by the node). This may be required, e.g., if a termination point is not
supported by the underlying a termination point, but by the node (e.g., a loopback does not have physical
representation, so it is supported by physical device).</t>
          </dd>
          <dt>REQ-STATUS:</dt>
          <dd>
            <t>Links and nodes that are down must appear in the topology. The status of the nodes and links must be either
implemented in the SIMAP or accessible from the SIMAP. Whether the status is included as part of the SIMAP or
accessible from the SIMAP is left to the solutions.</t>
          </dd>
          <dt>REQ-DATA-PLANE-FLOW:</dt>
          <dd>
            <t>Provider data plane (Flow) needs to be correlatable to underlay and customer data plane to overlay topology</t>
          </dd>
          <dt/>
          <dd>
            <t>An SRv6 example:</t>
          </dd>
          <dt/>
          <dd>
            <t>In a SRv6 enabled network, sourceIPv6Address appears in a IPFIX data-template/data-record
for a captured flow on a SRv6 enabled provider interface twice. Once in relation to provider data plane in the
underlay, and once as relation to the customer data plane in the overlay.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide the semantic capability that each sourceIPv6Address can be mapped to the overlay and
underlay network topology. Both topologies might not be uniquely addressed, the VPN context
(in SRv6 these are the SID's, <xref section="3" sectionFormat="of" target="RFC8986"/>) needs to be considered therefore as well.</t>
          </dd>
          <dt/>
          <dd>
            <t>IPFIX protocol, defined in <xref target="RFC7011"/>, is the protocol for the exchange of flow information from
an Exporting Process to a Collecting Process. <xref section="8" sectionFormat="of" target="RFC7011"/> describes the management of
Templates and Option templates at the Exporting and Collecting Processes, and states the following:</t>
          </dd>
        </dl>
        <blockquote>
          <t>If an Information Element is required more than once in a Template,
the different occurrences of this Information Element SHOULD follow
the logical order of their treatments by the Metering Process. For
example, if a selected packet goes through two hash functions, and if
the two hash values are sent within a single Template, the first
occurrence of the hash value should belong to the first hash function
in the Metering Process. For example, when exporting the two source
IP addresses of an IPv4-in-IPv4 packet, the first sourceIPv4Address
Information Element occurrence should be the IPv4 address of the
outer header, while the second occurrence should be the address of
the inner header. Collecting Processes MUST properly handle
Templates with multiple identical Information Elements.</t>
        </blockquote>
        <dl>
          <dt>REQ-CONTROL-PLANE:</dt>
          <dd>
            <t>Underlay control plane routing state needs to be correlatable to underlay L3 topology. Overlay control-plane
routing state needs to be correlate-able to overlay L3 network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>A BMP/BGP example:</t>
          </dd>
          <dt/>
          <dd>
            <t>The BMP peer distinguisher (<xref section="4.2" sectionFormat="of" target="RFC7854"/>) needs to be correlateable to the VRF
of a node and the next-hop attribute of the NLRI in the BMP route-monitoring (<xref section="4.6" sectionFormat="of" target="RFC7854"/>) encapsulated
message to the underlay network topology while the path attribute of the NLRI in the BMP route-monitoring
encapsulated message to the overlay topology.</t>
          </dd>
        </dl>
      </section>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The following are the design requirements for the SIMAP data model:</t>
        <dl>
          <dt>REQ-TOPO-ONLY:</dt>
          <dd>
            <t>SIMAP should contain only topological information.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP is not required to contain all models and data required for
all the management and use cases. However, it should be designed to support adequate pointers to other functional
data and models to ease navigating in the overall system. For example:
</t>
            <ul spacing="normal">
              <li>
                <t>ACLs and Route Policies are not required to be supported in the SIMAP, they would be linked to the SIMAP.</t>
              </li>
              <li>
                <t>Dynamic paths may, depending on the solution, be either inside or outside of the SIMAP. If outside of SIMAP,
dynamic paths could be linked to the SIMAP.</t>
              </li>
            </ul>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP should ensure that it is possible to represent the paths/routes and leave the choice of what level of dynamics
to represent to the specific solution/application. The model needs to be rich enough to represent any level of dynamics.
BUT from experience, we suspect it can be the same model for all level of dynamics.</t>
          </dd>
          <dt>REQ-PROPERTIES:</dt>
          <dd>
            <t>SIMAP entities should mainly contain properties used to identify topological entities at different layers,
identify their roles, and topological relationships between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP entities should also provide information required to define semantics for layered network topologies, such as:</t>
          </dd>
        </dl>
        <ul spacing="normal">
          <li>
            <t>link directionality,</t>
          </li>
          <li>
            <t>whether the links are multipoint or not and, if so, are whether these links are point-to-multipoint or multipoint-to-multipoint,</t>
          </li>
          <li>
            <t>role of the termination points in the link (source, destination, hub, spoke), and</t>
          </li>
          <li>
            <t>some generic mechanism to add metadata.</t>
          </li>
        </ul>
        <dl>
          <dt>REQ-RELATIONSHIPS:</dt>
          <dd>
            <t>SIMAP should contain all topological relationships inside each layer or between the layers (underlay/overlay)</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP should contain links to other models/data to enable generic navigation to other YANG models in
generic way.</t>
          </dd>
          <dt/>
          <dd>
            <t>The SIMAP relationships should also provide information required to define semantics for layered network topologies,
such as providing:</t>
          </dd>
        </dl>
        <ul spacing="normal">
          <li>
            <t>underlay and overlay relations between different types of topological entities,</t>
          </li>
          <li>
            <t>additional information that helps with navigation inside a layer and between the layers, for example, easy
identification of resources at the physical layer in primary versus backup paths, if the underlay
resources are used for load balancing or for backup,</t>
          </li>
          <li>
            <t>capability to model nodes, termination points, and links contained in a network, but also nodes and links shared between networks, and</t>
          </li>
          <li>
            <t>relationships between networks, either for modelling of underlay and overlay or modelling network that contains
multiple networks.</t>
          </li>
        </ul>
        <dl>
          <dt>REQ-CONDITIONAL:</dt>
          <dd>
            <t>Provide capability for conditional retrieval of parts of SIMAP.</t>
          </dd>
          <dt>REQ-TEMPO-HISTO:</dt>
          <dd>
            <t>Must support geo-spatial, temporal, and historical data.  The temporal and historical can also be supported
external to the SIMAP.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-arch">
        <name>Architectural Requirements</name>
        <t>The following are the architectural requirements for the controller that provides SIMAP API, they are the
non-functional requirements for the SIMAP APIs or controllers:</t>
        <dl>
          <dt>REQ-SCALES:</dt>
          <dd>
            <t>The SIMAP APIs must be scalable, it must support any provider network, independent of its size.</t>
          </dd>
          <dt>REQ-PERFORMANCE:</dt>
          <dd>
            <t>The SIMAP APIs must be  performant, and have acceptable response-time. Although we are not to define the response time here.</t>
          </dd>
          <dt>REQ-USABILITY:</dt>
          <dd>
            <t>The SIMAP APIs must be simple and easy to integrate with the client applications, whose developers
may not be networking experts.</t>
          </dd>
          <dt>REQ-DISCOVERY:</dt>
          <dd>
            <t>A network controller must perform the initial and on-demand discovery of a network in order to provide the layered
topology via the SIMAP APIs to a client/application.</t>
          </dd>
          <dt>REQ-SYNCH:</dt>
          <dd>
            <t>The controller must perform the sync with the network in order to provide up to date layered topology
via SIMAP APIs to the client/application</t>
          </dd>
          <dt>REQ-SECURITY:</dt>
          <dd>
            <t>The conventional NACM control access rules <xref target="RFC8341"/> should apply. This includes module control access rules,
protocol operation control access rules, data node control access rules, and notification control access rules.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="positioning-simap">
      <name>Positioning SIMAP</name>
      <t><xref target="RFC8199"/> advocates for a consistent classification of YANG modules and introduces two abstraction layers for
YANG modules:</t>
      <ul spacing="normal">
        <li>
          <t>network element YANG modules</t>
        </li>
        <li>
          <t>network service YANG modules</t>
        </li>
      </ul>
      <t>The IRTF <xref target="RFC7426"/> defines the SDN layers and architecture and proposes the following interfaces:</t>
      <ul spacing="normal">
        <li>
          <t>southbound interfaces between the network devices and controllers/managers</t>
        </li>
        <li>
          <t>service interface between controllers/managers and applications</t>
        </li>
      </ul>
      <t><xref target="RFC8309"/> defines where service model might fit into the SDN Architecture, although the service model
does not require or preclude the use of SDN. It shows the following models at different layers of abstraction:</t>
      <ul spacing="normal">
        <li>
          <t>device model, between network elements and controllers</t>
        </li>
        <li>
          <t>network model, between controllers and network orchestrators</t>
        </li>
        <li>
          <t>service model, between network orchestrators and service orchestrators</t>
        </li>
        <li>
          <t>customer service model, between service orchestrators and customer</t>
        </li>
      </ul>
      <t><xref target="RFC8453"/> describes the ACTN architecture in the context of the YANG service models. It shows how ACTN interfaces
relate to device model, network model and customer service model.</t>
      <t><xref target="RFC8969"/> describes a framework for Service and network management automation that takes advantage of YANG
modelling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a
data model. <xref target="RFC8969"/> introduces "network service models" and describes the layering and representation of models
within a network operator as follows:</t>
      <ul spacing="normal">
        <li>
          <t>device model, between device and controller</t>
        </li>
        <li>
          <t>network model (operator oriented), between controller (that includes network orchestration function) and
service orchestrator</t>
        </li>
        <li>
          <t>service model (customer oriented), between service orchestrator and customer, this is network service model</t>
        </li>
      </ul>
      <t>The SIMAP YANG module can be used at different layers of abstraction and SIMAP can provide topology at
different interfaces. Although the SIMAP module and APIs is primarily positioned as northbound multi-layered topology
model from (SDN) Controllers, it can also be positioned as follows:</t>
      <ul spacing="normal">
        <li>
          <t>In the context of <xref target="RFC8199"/>, SIMAP can provide multi-layered topology YANG module as part of both network element
and network service YANG modules</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC7426"/>, SIMAP can provide multi-layered topology interface as part of both Southbound and
Service Interfaces</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC8309"/>, SIMAP can provide multi-layered topology model as part of device model, network model,
service model and customer service model</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC8453"/>, SIMAP can provide multi-layered topology model as part of SBI (southbound interface to
network), MPI (interface between multi-domain service coordinator and network controller) and CMI (interface between
customer network controller and multi-domain service controller)</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC8969"/>, SIMAP can provide multi-layered topology model as part of device model, network model
and network service model</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the SIMAP concepts, requirements, and use cases, there is no specific security considerations other
that those discussed in <xref target="sec-arch"/>.</t>
      <t><xref section="8" sectionFormat="of" target="RFC8345"/> discusses security aspects that will be useful when designing the SIMAP solution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-07"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-terminology">
          <front>
            <title>Some Key Terms for Network Fault and Problem Management</title>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="June" year="2025"/>
            <abstract>
              <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG models and management protocols that report, make
   visible, or manage network faults and problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-19"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC5136">
          <front>
            <title>Defining Network Capacity</title>
            <author fullname="P. Chimento" initials="P." surname="Chimento"/>
            <author fullname="J. Ishac" initials="J." surname="Ishac"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>Measuring capacity is a task that sounds simple, but in reality can be quite complex. In addition, the lack of a unified nomenclature on this subject makes it increasingly difficult to properly build, test, and use techniques and tools built around these constructs. This document provides definitions for the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling between a source and destination in an IP network. By doing so, we hope to provide a common framework for the discussion and analysis of a diverse set of current and future estimation techniques. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5136"/>
          <seriesInfo name="DOI" value="10.17487/RFC5136"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-anomaly-architecture">
          <front>
            <title>A Framework for a Network Anomaly Detection Architecture</title>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Wanting Du" initials="W." surname="Du">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   This document describes the motivation and architecture of a Network
   Anomaly Detection Framework and the relationship to other documents
   describing network Symptom semantics and network incident lifecycle.

   The described architecture for detecting IP network service
   interruption is designed to be generic applicable and extensible.
   Different applications are described and examples are referenced with
   open-source running code.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-anomaly-architecture-04"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="6" month="July" year="2025"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications, realize efficient and cost-effective data-driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Network Digital
   Twin, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-11"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
            <author fullname="S. Denazis" initials="S." surname="Denazis"/>
            <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="RFC7926">
          <front>
            <title>Problem Statement and Architecture for Information Exchange between Interconnected Traffic-Engineered Networks</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="X. Zhang" initials="X." surname="Zhang"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>In Traffic-Engineered (TE) systems, it is sometimes desirable to establish an end-to-end TE path with a set of constraints (such as bandwidth) across one or more networks from a source to a destination. TE information is the data relating to nodes and TE links that is used in the process of selecting a TE path. TE information is usually only available within a network. We call such a zone of visibility of TE information a domain. An example of a domain may be an IGP area or an Autonomous System.</t>
              <t>In order to determine the potential to establish a TE path through a series of connected networks, it is necessary to have available a certain amount of TE information about each network. This need not be the full set of TE information available within each network but does need to express the potential of providing TE connectivity. This subset of TE information is called TE reachability information.</t>
              <t>This document sets out the problem statement for the exchange of TE information between interconnected TE networks in support of end-to-end TE path establishment and describes the best current practice architecture to meet this problem statement. For reasons that are explained in this document, this work is limited to simple TE constraints and information that determine TE reachability.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="206"/>
          <seriesInfo name="RFC" value="7926"/>
          <seriesInfo name="DOI" value="10.17487/RFC7926"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topo-and-tunnel-modeling">
          <front>
            <title>TE Topology and Tunnel Modeling for Transport Networks</title>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Volta Networks</organization>
            </author>
            <date day="12" month="July" year="2020"/>
            <abstract>
              <t>   This document describes how to model TE topologies and tunnels for
   transport networks, by using the TE topology YANG model [I-D.ietf-
   teas-yang-te-topo] and the TE tunnel YANG model [I-D.ietf-teas-yang-
   te].


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topo-and-tunnel-modeling-06"/>
        </reference>
        <reference anchor="RFC9179">
          <front>
            <title>A YANG Grouping for Geographic Locations</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a generic geographical location YANG grouping. The geographical location grouping is intended to be used in YANG data models for specifying a location on or in reference to Earth or any other astronomical object.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9179"/>
          <seriesInfo name="DOI" value="10.17487/RFC9179"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="I-D.ogondio-opsawg-ospf-topology">
          <front>
            <title>A YANG Data Model for Open Shortest Path First (OSPF) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Open Shortest
   Path First (OSPF) information.  This document augments the 'ietf-
   network' data model by adding OSPF concepts and explains how the data
   model can be used to represent the OSPF topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-opsawg-ospf-topology-01"/>
        </reference>
        <reference anchor="I-D.ogondio-nmop-isis-topology">
          <front>
            <title>A YANG Data Model for Intermediate System to intermediate System (IS-IS) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Intermediate
   System to Intermediate System (IS-IS).  This document augments the
   'ietf-network' data model by adding IS-IS concepts and explains how
   the data model can be used to represent the IS-IS topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-nmop-isis-topology-00"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-topology">
          <front>
            <title>A Network Data Model for Inventory Topology Mapping</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="9" month="April" year="2025"/>
            <abstract>
              <t>   This document defines a YANG model to map the network inventory data
   with the topology model to form a base underlay network.  The model
   facilitates the correlation between the layer (e.g., Layer 2 and
   Layer 3) topology information and the inventory data of the underlay
   network for better service provisioning, network maintenance
   operations, and other assessment scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-16"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   Delivery of network services assumes that appropriate setup is
   provisioned over the links that connect customer termination points
   and a provider network.  The required setup to allow successful data
   exchange over these links is referred to as an attachment circuit
   (AC), while the underlying link is referred to as "bearer".

   This document specifies a YANG service data model for ACs.  This
   model can be used for the provisioning of ACs before or during
   service provisioning (e.g., Network Slice Service).

   The document also specifies a YANG service model for managing bearers
   over which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-20"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="6" month="July" year="2025"/>
            <abstract>
              <t>   A network incident refers to an unexpected interruption of a network
   service, degradation of a network service quality, or sub-health of a
   network service.  Different data sources including alarms, metrics,
   and other anomaly information can be aggregated into a few of network
   incidents through data correlation analysis and the service impact
   analysis.

   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help resolve network incidents
   for the sake of network service health and probable cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-05"/>
        </reference>
      </references>
    </references>
    <?line 916?>

<section anchor="related-ietf-activities">
      <name>Related IETF Activities</name>
      <ul empty="true">
        <li>
          <t>Note: The models cited in this section are provided for illustration puroses. It is out of scope to recomend
which models will be used as base to build the SIMAP.</t>
        </li>
      </ul>
      <section anchor="sec-ntw-topo">
        <name>Network Topology</name>
        <t>Interestingly, we could not find any network topology definition in
   IETF RFCs (not even in <xref target="RFC8345"/>) or Internet-Drafts.  However, it is mentioned
   in multiple documents.  As an example, in Overview and Principles of
   Internet Traffic Engineering <xref target="RFC9522"/>, which
   mentions:</t>
        <blockquote>
          <t>To conduct performance studies and to support planning of existing
   and future networks, a routing analysis may be performed to determine
   the paths the routing protocols will choose for various traffic
   demands, and to ascertain the utilization of network resources as
   traffic is routed through the network.  Routing analysis captures the
   selection of paths through the network, the assignment of traffic
   across multiple feasible routes, and the multiplexing of IP traffic
   over traffic trunks (if such constructs exist) and over the
   underlying network infrastructure.  A model of network topology is
   necessary to perform routing analysis.  A network topology model may
   be extracted from:</t>
          <ul spacing="normal">
            <li>
              <t>Network architecture documents</t>
            </li>
            <li>
              <t>Network designs</t>
            </li>
            <li>
              <t>Information contained in router configuration files</t>
            </li>
            <li>
              <t>Routing databases such as the link state database of an interior gateway protocol (IGP)</t>
            </li>
            <li>
              <t>Routing tables</t>
            </li>
            <li>
              <t>Automated tools that discover and collate network topology information.</t>
            </li>
          </ul>
          <t>Topology information may also be derived from servers that monitor
   network state, and from servers that perform provisioning functions.</t>
        </blockquote>
        <t>Another example is <xref target="RFC8453"/> that defines native topology, abstract topology, black topology, and grey topology,
   but all in the context of actual topology and physical topology that are not specifically defined.</t>
      </section>
      <section anchor="sec-topology-abstraction">
        <name>Topology Abstraction</name>
        <t>Please refer to the following documents for some background on topology abstractions:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="RFC7926"/> defines topology abstraction.</t>
          </li>
          <li>
            <t><xref section="5" sectionFormat="of" target="RFC8453"/> describes the topology abstraction methods and discusses topology abstraction factors,
types, and their context in the ACTN architecture.</t>
          </li>
          <li>
            <t><xref section="3.13" sectionFormat="of" target="RFC8795"/> defines abstract TE topologies.</t>
          </li>
          <li>
            <t><xref section="4.1" sectionFormat="of" target="RFC8795"/> defines native TE topologies.</t>
          </li>
          <li>
            <t><xref section="4.4" sectionFormat="of" target="RFC8795"/> describes how to deal with multiple abstract TE topologies provided by the same provider.</t>
          </li>
          <li>
            <t><xref section="1.3" sectionFormat="of" target="I-D.ietf-teas-te-topo-and-tunnel-modeling"/> gives some background on topology abstraction.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-core">
        <name>Core SIMAP Components</name>
        <t>The following specifications are relevant to the core functions provided by the SIMAP:</t>
        <ul spacing="normal">
          <li>
            <t>IETF network model and network topology model <xref target="RFC8345"/></t>
          </li>
          <li>
            <t>A YANG grouping for geographic location <xref target="RFC9179"/></t>
          </li>
          <li>
            <t>IETF modules that augment <xref target="RFC8345"/> for different technologies:  </t>
            <ul spacing="normal">
              <li>
                <t>A YANG data model for Traffic Engineering (TE) Topologies <xref target="RFC8795"/></t>
              </li>
              <li>
                <t>A YANG data model for Layer 2 network topologies <xref target="RFC8944"/></t>
              </li>
              <li>
                <t>A YANG data model for OSFP topology  <xref target="I-D.ogondio-opsawg-ospf-topology"/></t>
              </li>
              <li>
                <t>A YANG data model for IS-IS topology <xref target="I-D.ogondio-nmop-isis-topology"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-add">
        <name>Additional SIMAP Components</name>
        <t>The SIMAP may need to link to the following models, some are already augmenting <xref target="RFC8345"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Service Attachment Point (SAP) <xref target="RFC9408"/>, augments 'ietf-network' data model <xref target="RFC8345"/> by adding the SAP.</t>
          </li>
          <li>
            <t>SAIN <xref target="RFC9417"/> <xref target="RFC9418"/></t>
          </li>
          <li>
            <t>Network Inventory Model <xref target="I-D.ietf-ivy-network-inventory-yang"/> focuses on physical and virtual inventory.
Logical inventory is currently outside of the scope. It does not augment <xref target="RFC8345"/>.</t>
          </li>
          <li>
            <t><xref target="I-D.ietf-ivy-network-inventory-topology"/> correlates the network inventory with the general topology via RFC8345 augmentations that reference inventory.</t>
          </li>
          <li>
            <t>KPIs: delay, jitter, loss</t>
          </li>
          <li>
            <t>Attachment Circuits (ACs) <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>Configuration: The L2SM <xref target="RFC8466"/>, L3SM <xref target="RFC8299"/>, L2NM <xref target="RFC9291"/>, and L3NM <xref target="RFC9182"/></t>
          </li>
          <li>
            <t>Incident Management for Network Services <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to Mohamed Boucadair for his valuable contributions, reviews, and comments.
Many thanks to Adrian Farrel for his SIMAP suggestion and helping to agree the terminology.
Many thanks to Dan Voyer, Brad Peters, Diego Lopez, Ignacio Dominguez Martinez-Casanueva, Italo Busi, Wu Bo,
Sherif Mostafa, Christopher Janz, Rob Evans, Danielle Ceccarelli, and many others for their contributions, suggestions
and comments.</t>
      <t>Many thanks to Nigel Davis <eref target="mailto:ndavis@ciena.com">ndavis@ciena.com</eref> for the valuable discussions and his confirmation of the
modelling requirements.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Ahmed Elhassany">
        <organization>Swisscom</organization>
        <address>
          <email>Ahmed.Elhassany@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
