<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nmop-simap-concept-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="SIMAP Concept &amp; Needs">SIMAP: Concept, Requirements, and Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-01"/>
    <author fullname="Olga Havel">
      <organization>Huawei</organization>
      <address>
        <email>olga.havel@huawei.com</email>
      </address>
    </author>
    <author fullname="Benoit Claise">
      <organization>Huawei</organization>
      <address>
        <email>benoit.claise@huawei.com</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="13"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>Service &amp; Infrastructure Maps</keyword>
    <keyword>Service emulation</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>service flexibility</keyword>
    <keyword>service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>Digital Map</keyword>
    <keyword>Emulation</keyword>
    <keyword>Simulation</keyword>
    <keyword>Topology</keyword>
    <keyword>Multi-layer</keyword>
    <abstract>
      <?line 63?>

<t>This document defines the concept of Service &amp; Infrastructure Maps (SIMAP) and identifies a set of SIMAP
requirements and use cases. The SIMAP was previously known as Digital Map.</t>
      <t>The document intends to be used as a reference for the assessment effort of the various topology modules to meet
SIMAP requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Management Operations Working Group mailing list (nmop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-wg-nmop/draft-ietf-nmop-digital-map-concept"/>.</t>
    </note>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Service &amp; Infrastructure Maps (SIMAP) is a data model that provides a view of the operator's networks and services,
including how it is connected to other models/data (e.g., inventory, observability sources, and
operational knowledge). It specifically provides an approach to model multi-layered topology
and appropriate mechanism to navigate amongst layers and correlate between them.
This includes layers from physical topology to service topology.
This model is applicable to multiple domains (access, core, data center, etc.) and
technologies (Optical, IP, etc.).</t>
      <t>The SIMAP modelling defines the core topological entities (network, node, link, and termination point) at each layer,
their role in the network topology, core topological properties, and topological relationships
both inside each layer and between the layers. It also defines how to access other external models
from a topology. The SIMAP model is a topological model that is linked to the other functional
models and connects them all: configuration, maintenance, assurance (KPIs, status, health, and symptoms),
Traffic-Engineering (TE), different behaviors and actions, simulation, emulation, mathematical abstractions,
AI algorithms, etc. These other models exist outside of the SIMAP and are not defined during SIMAP modelling.</t>
      <t>The SIMAP data consists of virtual instances of network and service topologies at different layers.
The SIMAP provides access to this data via standard APIs for both read, typically as a nortbound interface from a controller, with query capabilities and links to other YANG modules (e.g., Service Assurance for Intent-based Networking (SAIN) <xref target="RFC9417"/>, Service Attachment Points (SAPs) <xref target="RFC9408"/>, Inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>, and potentially linking to non-YANG models).
The SIMAP also provides write operations with the same set of APIs, not to change a topology layer on the fly as a northbound interface from the controller, but for offline simulations, before applying the changes to the network via the normal controller operations.</t>
      <t>Both read and write APIs are similar, stemming from the same YANG model, to facilitate the comparison of the offline simulated SIMAP with the network one.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Topology:</dt>
        <dd>
          <t>Topology in this document refers to the network and service topology.
A network topology defines how physical or logical nodes, links and
termination points are related and arranged. A Service topology defines how
service components (e.g., VPN instances, customer interfaces, and
customer links) between customer sites are interrelated and
arranged.</t>
        </dd>
        <dt/>
        <dd>
          <t>There are several types of topologies: point-to-point,
bus, ring, star, tree, mesh, hybrid, and daisy chain.</t>
        </dd>
        <dt/>
        <dd>
          <t>Topologies may be unidirectional or bidirectional (bus, some
rings).</t>
        </dd>
        <dt>Multi-layered topology:</dt>
        <dd>
          <t>A multi-layered topology models relationships between different topology layers,
where each layer represents a connectivity aspect of the network
and services that needs to be configured, controlled and monitored.
Each topology layer has a separate lifecycle.</t>
        </dd>
        <dt>Topology layer:</dt>
        <dd>
          <t>Represents topology at a single layer in the multi-layered topology.</t>
        </dd>
        <dt/>
        <dd>
          <t>The topology layer can also represent what needs to be managed by a
specific user or application, for example IGP layer can be of interest to the operator
troubleshooting or optimizing the routing, while the optical layer may be
of interest to the user managing the optical network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers may relate closely to OSI layers, like L1 topology
for physical topology, Layer 2 for link topology and Layer 3 for IPv4 and
IPv6 topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers represent the control aspects of Layer 3, like OSPF, IS-IS, or BGP.</t>
        </dd>
        <dt/>
        <dd>
          <t>The service layer represents the service view of the connectivity, that can differ for
different types of services and for different providers/solutions.</t>
        </dd>
        <dt/>
        <dd>
          <t>The top layer represents the application/flow view of service connectivity.</t>
        </dd>
        <dt>Service:</dt>
        <dd>
          <t>Represents network connectivity service provided over a network that enables devices, systems, or networks to
communicate and exchange data with each other. It provides the underlying infrastructure and mechanisms
necessary for establishing, maintaining, and managing connections between different endpoints.
The example services are: L2VPN, L3VPN, EVPN, VPLS, VPWS,</t>
        </dd>
        <dt>Subservice:</dt>
        <dd>
          <t>Represents component of the service that can be independently managed but is not provided as a service.
The example subservices are: MPLS Tunnels, SRV6 Tunnels, VRFs, VPN Links, IGP Links.</t>
        </dd>
        <dt>Resource:</dt>
        <dd>
          <t>Defined in <xref target="I-D.ietf-nmop-terminology"/></t>
        </dd>
      </dl>
      <t>The document defines the following terms:</t>
      <dl>
        <dt>Service &amp; Infrastructure Maps (SIMAP):</dt>
        <dd>
          <t>SIMAP is a data model that provides a view of the operator's networks and services,
including how it is connected to other models/data (e.g., inventory, observability sources, and
operational knowledge). It specifically provides an approach to model multi-layered topology
and appropriate mechanism to navigate amongst layers and correlate between them.
This includes layers from physical topology to service topology.</t>
        </dd>
        <dt/>
        <dd>
          <t>This model is applicable to multiple domains (access, core, data centers, etc.) and
technologies (Optical, IP, etc.).</t>
        </dd>
        <dt>SIMAP modelling:</dt>
        <dd>
          <t>The set of principles, guidelines, and conventions to model the SIMAP
using the IETF modelling approach <xref target="RFC8345"/>. They cover the
network types (layers and sublayers), entity types, entity roles
(network, node, termination point, or link), entity properties,
relationship types between entities and relationships to other entities.</t>
        </dd>
        <dt>SIMAP model:</dt>
        <dd>
          <t>Defines the core topological entities, their role in the network,
core topological properties, and relationships both inside each layer and
between the layers.</t>
        </dd>
        <dt/>
        <dd>
          <t>It is the basic topological model with references/pointers to other models and connects them all:
configuration, maintenance, assurance (KPIs, status, health, symptoms, etc.), traffic engineering,
different behaviors, simulation, emulation, mathematical abstractions, AI algorithms, etc.</t>
        </dd>
        <dt>SIMAP data:</dt>
        <dd>
          <t>Consists of instances of network and service topologies at
 different layers.  This includes instances of networks, nodes,
 links and termination points, topological relationships between
 nodes, links and termination points inside a network,
 relationships between instances belonging to different networks,
 links to functional data for the instances, including
 configuration, health, symptoms.</t>
        </dd>
        <dt/>
        <dd>
          <t>The SIMAP data can be historical, real-time, or future data for 'what-if' scenarios.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sample-simap-use-cases">
      <name>Sample SIMAP Use Cases</name>
      <t>The following are sample use cases that require SIMAP:</t>
      <ul spacing="normal">
        <li>
          <t>Inventory queries</t>
        </li>
        <li>
          <t>Service placement feasibility checks</t>
        </li>
        <li>
          <t>Service-&gt; subservice -&gt; resource</t>
        </li>
        <li>
          <t>Resource -&gt; subservice -&gt; service</t>
        </li>
        <li>
          <t>Intent/service assurance</t>
        </li>
        <li>
          <t>Service E2E and per-link KPIs on SIMAP (connectivity status, high-availability, delay, jitter, and loss)</t>
        </li>
        <li>
          <t>Capacity planning</t>
        </li>
        <li>
          <t>Network design</t>
        </li>
        <li>
          <t>Network Simulation and Emulation</t>
        </li>
        <li>
          <t>Traffic Engineering</t>
        </li>
        <li>
          <t>Postmortem Replay</t>
        </li>
        <li>
          <t>Closed-loop</t>
        </li>
        <li>
          <t>Network Digital Twin (NDT)</t>
        </li>
      </ul>
      <t>Overall, the SIMAP is needed to provide the mechanism to connect data islands from the core multi-layered topology.
It is a solution feasible and useful in the short-term for the existing operations use cases, but it is also a
requirement for the SIMAP.</t>
      <ul empty="true">
        <li>
          <t>The following subsections include some initial use case descriptions to initiate the discussion about what type of info
is needed to describe the use cases in the context of SIMAP.
The next version of the draft will include more info on these use cases and more input from the operators,
from the perspective of what the value of the SIMAP for each use case is and how the SIMAP API can be used.
This will also clarify if only read and if/when write interface is needed per use case.</t>
        </li>
      </ul>
      <section anchor="inventory-queries">
        <name>Inventory Queries</name>
        <t>Network inventory refers to a comprehensive record or database that tracks and documents all the network components and devices within an organization's IT infrastructure.</t>
        <t>Key elements typically found in a network inventory include:
* Hardware Details: Descriptions of physical devices such as routers (including its internal components such as cards, power supply units, pluggables), switches, servers, network cables, including model numbers, serial numbers, and manufacturer information. These information will facilitate locating additional details of the hadware in the manufacturer systems and the correlation with the purchase catalog of the company.
* Software and Firmware: Versions of operating systems, network management tools, and firmware running on network devices. Note that a network device can have components with their own software and firmware.
* Licensing Information: For any licensed software or devices, the network inventory will track license numbers, expiry dates, and compliance.</t>
        <t>Network inventory lifecycle refers to the stages a network device or component goes through from its introduction to the network until its removal or replacement. It encompasses everything from acquisition and deployment to maintenance, upgrade, and eventually decommissioning. Managing the network inventory lifecycle efficiently is crucial for maintaining a secure, functional, and cost-effective network.</t>
        <t>A well-maintained network inventory helps organizations with network management, troubleshooting, asset tracking, security, and ensuring compliance with regulations. It also helps in scaling the network, planning upgrades, and responding to issues quickly.  In order to facilitate the planning and troubleshooting processes it is necessary to be able to navigate from network inventory to network topology and services.</t>
        <t>The application will be able to retrieve physical topology from the controller via the SIMAP API and from the
response it will be able to retrieve physical inventory of individual devices and cables.</t>
        <t>The application may request either one or multiple topology layers via the SIMAP API and from the response
it will be able to retrieve both physical and logical inventory.</t>
        <t>For Access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer service, reduced Mean Time To Repair (MTTR), and lower operational costs
through truck roll reduction. For example, operators may use custom-tags that are readily available for a customer-facing device and then query
the inventory based on that tag to correlate it with the inventory and then map it to the network/service topology. The mapping and correlation can be then used for triggering apprpriate service checks.</t>
      </section>
      <section anchor="service-placement-feasibility-checks">
        <name>Service Placement Feasibility Checks</name>
        <t>Service placement feasibility checks refers to the process of evaluating whether a specific service can be deployed
and operated effectively in a given network. This includes accessing the various factors to ensure that the
service will function as indended (based on the QoS requirements), without causing network disruptions or
innefficiencies and effecting other services already provisioned on the network.</t>
        <t>Some of the factors that need assesing are network capabilities, status, limitations, resource usage and availability.
The service could be simulated during the feasibility checks to identify if there are any potential issues.
The load testing could be done to evaluate performance under stress.</t>
        <t>The Service Feasibility Check application will be able to retrieve the topology at any layer from the controller
via the SIMAP API and from the response it will be able to navigate to any other YANG modules outside of the
core SIMAP topology to retrive any other information needed: resource usage, availability, status, etc.</t>
      </section>
      <section anchor="service-subservice-resource">
        <name>Service-&gt; Subservice -&gt; Resource</name>
        <t>The application will be able to retrieve all services from the SIMAP API for selected network types.
The application will be able to retrieve the topology for selected services via SIMAP API and from the response
it will be able to navigate via the supporting relationship top-down to the lower layers. That way, it will be able to
determine what logical resources are used by the service. The supporting relations to the lowest layer will help
application to determine what physical resources are used by the service.</t>
      </section>
      <section anchor="resource-subservice-service">
        <name>Resource -&gt; Subservice -&gt; Service</name>
        <t>The application will be able to navigate from the Physical, L2 or L3 topology to the services that use specific
resources. For example, the application will be able to select the resource and by navigating the supporting relationship
bottom-up come to the service and its nodes, tps and links.</t>
      </section>
      <section anchor="intentservice-assurance">
        <name>Intent/Service Assurance</name>
        <t>Network intent and service assurance work together to ensure that the network aligns with business goals and that the services provided meet the agreed-upon service level agreements (SLAs).</t>
        <t>The Service Assurance for Intent-Based Networking Architecture (SAIN) <xref target="RFC9417"/> approach emphasizes a comprehensive view of all components involved in service delivery, including network devices and functions, to effectively monitor and maintain service health.</t>
        <t>The key objectives of this architecture:
* Holistic Service Monitoring: By considering all elements involved in service delivery, the architecture enables a thorough assessment of service health.
* Correlation of Service Degradation: It assists in linking service performance issues to specific network components, facilitating precise identification of faults.
* Impact Assessment: The architecture identifies which services are affected by the failure or degradation of particular network components, aiding in prioritizing remediation efforts.</t>
        <t>When a service is degraded, the SAIN architecture will highlight where in the assurance service graph to look, as opposed to going hop by hop to troubleshoot the issue.
More precisely, the SAIN architecture will associate to each service instance a list of symptoms originating from specific subservices, corresponding to components of the network.
These components are good candidates for explaining the source of a service degradation.</t>
        <t>The application will be able to retrieve topology layer and any network/node/termination point/link instances from the controller via the SIMAP API and from the response it will be able to determine the health of each instance by navigating to the SAIN subservices and its symptoms.</t>
      </section>
      <section anchor="service-e2e-and-per-link-kpis">
        <name>Service E2E and Per-link KPIs</name>
        <t>The application will be able to retrieve the topology at any layer from the controller via the SIMAP API and from the
response it will be able to navigate any retrieve any KPIs for selected topology entity.</t>
      </section>
      <section anchor="capacity-planning">
        <name>Capacity Planning</name>
        <t>Network Capacity Planning refers to the process of analyzing, predicting, and ensuring that the network has sufficient
capacity (e.g., <xref target="RFC5136"/>), resources, and infrastructure to meet current and future demands. It involves evaluating the network's ability
to handle increasing (including forecast) amounts of data, traffic, and users activity, while maintaining acceptable levels of performance,
reliability, and security.</t>
        <t>The capacity planning primary goal is to ensure that a network can support business operations, applications, and
services without interruptions, delays, or degradation in quality. This requires a thorough understanding of the
network's current state, as well as future requirements and growth projections.</t>
        <t>Key aspects of network capacity planning include:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic analysis: Monitoring and analyzing network traffic patterns to identify trends, peak usage periods, and areas
of congestion. For example, by generating a core traffic matrix with IPFIX flow record <xref target="RFC7011"/> or deducting an approximate traffic matrix from the link utilization data.</t>
          </li>
          <li>
            <t>Resource utilization: Evaluating the link utilization throughout the network for the current demand identifying bottlenecks and potential QoS peformance issues.</t>
          </li>
          <li>
            <t>Growth forecasting: Predicting future network growth based on business expansion, new applications, or changes in users
behavior.</t>
          </li>
          <li>
            <t>What-if scenarios: Creating models to assess the network behavior under different scenarios, such as increased traffic,
failure conditions (link, router or Shared Risk Resource Group), and new application deployments (such as a new Content Delivery Network source, a new peering point, a new data center...).</t>
          </li>
          <li>
            <t>Upgrade planning: Identifying areas where upgrades or additions are needed to ensure that the network can minimize the
 effect of node/link failures, mitigate QoS problems, or simply to support growing demands.</t>
          </li>
          <li>
            <t>Cost-benefit analysis: Evaluating the costs and benefits of upgrading or adding new resources to determine the most
cost-effective solutions.</t>
          </li>
        </ul>
        <t>By implementing a robust capacity planning process, organizations can:</t>
        <ul spacing="normal">
          <li>
            <t>Ensure better network reliability: Minimize downtime and ensure that the network is always available when needed.</t>
          </li>
          <li>
            <t>Improve performance: Optimize network resources to support business-critical applications and services.</t>
          </li>
          <li>
            <t>Optimize costs: Avoid unnecessary over-provisioning by making informed decisions based on data-driven insights.</t>
          </li>
          <li>
            <t>Support business growth: Scale the network to meet increasing demands and support business expansion.</t>
          </li>
        </ul>
        <t>The application will be able to retrieve topology layer and any network/node/termination point/link instances from
the controller via the SIMAP API and from the response it will be able to map the traffic analysis to the entities
(typically links and router), evaluate their current utilization, based on the grow forecasting evaluate which elements
to add to the network, and finally perform the 'what-if' failure analysis by simulating the removal of link(s) and/or
router(s) while evaluating the network performance.</t>
      </section>
      <section anchor="network-design">
        <name>Network design</name>
        <t>Network design involves defining both the logical structure—such as access, aggregation, and core layers and
the physical layout, including devices and links.</t>
        <t>It serves as a blueprint, detailing how these elements
interconnect to deliver the intended network behavior and functionality. The application will retrieve the
proposed network topology as the initial design, which can then undergo critical analyses—such as traffic flow
simulations to identify bottlenecks and redundancy checks to ensure resilience—before being transformed into
actionable intent and, eventually, deployment configurations. Throughout the network's lifecycle, the design rules
embedded within the topology can be continuously validated. For example, a link rule might specify that a connection
etween core and aggregation layers must have its source and destination located within the same data center.
Another example to declare that specific link type should only exist between CORE&lt;&gt;Aggregation layer with
certain constrains on port optic speed, type (LR vs SR for instance) etc."</t>
      </section>
      <section anchor="network-simulation-and-network-emulation">
        <name>Network Simulation and Network Emulation</name>
        <t>Network simulation is a process used to analyse the behaviour of networks via software. It allows network engineers and researchers to study how the network protocols work under different conditions, such as diffenet topologies, traffic loads, network failures, or the introduction of new devices. Network emulation, on the other hand, replicates the behavior of a real-world network, allowing for more realistic analysis compared to network simulation. While network simulation focuses on modeling and approximating network behavior, network emulation involves creating a real-time, functional network environment whose protocol behaves exactly like a real network. Ideally, network emulation uses the same software images as in the real network, but it could also be peformed (with less accuracy) using generic software.</t>
        <section anchor="types-of-network-simulation">
          <name>Types of Network simulation</name>
          <t>There are several types of network simulations, each designed to address specific needs and use cases. Below are the main categories of network simulation:
1. Discrete Event Simulation (DES):
This is the most common type of network simulation. It models a series of events that occur at specific points in time. Each event triggers a change in the state of a network component (e.g. a link is down, a card fails, a packet arrives…).
 2. Continuous Simulation:
In contrast to discrete event simulation, continuous simulation models systems where variables change continuously over time. Network parameters like bandwidth, congestion, and throughput can be treated as continuous functions.
The main use case is to model certain aspects of network performance that evolve continuously, such as link speeds or delay distributions in links that are impacted by envirnnmental conditions (such as microwave or satellite links).
3. Monte Carlo Simulation:
This type of simulation uses statistical methods to model and analyze networks under uncertain or variable conditions. Monte Carlo simulations generate a large number of random samples to predict the performance of a network across multiple scenarios. It is used for probabilistic analysis, risk assessment, and performance evaluation under uncertain conditions.
### Goals of Network simulation
The simulations can be also classified depending on the goal of the simulation
####  Network Protocol Analysis
This type of simulation focuses on simulating specific networking protocols (IS-IS, OSPF, BGP, SR) to understand how they perform under different conditions. It models the protocol operations and interactions among devices in the network. For example, simulation can be used to asses the impact of changing a link metric. Morever, specific features of the networking protocol can be tested. For example, how fast-reroute performs in a given network topology.</t>
          <section anchor="traffic-simulation">
            <name>Traffic Simulation</name>
            <t>This simulation focuses on modelling traffic flow across the network, including packet generation, flow control, routing, and congestion. It aims to evaluate traffic's impact on network performance.</t>
            <t>The main use is to model the impact of different types of traffic (e.g., voice, video, mobile data, web browsing) and understand how they affect the network's bandwidth and congestion levels. It can be used to identify bottelnecks and assist the capacity planning process.</t>
          </section>
          <section anchor="simulation-of-different-topologies-under-normal-and-failure-scenarios">
            <name>Simulation of different topologies under normal and failure scenarios</name>
            <t>This type of simulation focuses on the structure and layout of the network itself. It simulates different network topologies, such as mesh, horse-shoe, bus, star, or tree topologies, and their impact on the network's performance.  It can be used, together with the traffic simualtion to evaluate the most efficient topology for a network, under normal conditions and considering factors like fault tolerance.</t>
          </section>
        </section>
      </section>
      <section anchor="traffic-engineering">
        <name>Traffic Engineering</name>
        <t>Traffic Engineering (TE) is a network optimization technique designed to enhance network performance and resource utilization by intelligently controlling the flow of data, for example by enabling dynamic path selection based on constraints such as bandwidth availability, latency, and link costs.</t>
        <t>Its primary goal is to prevent network congestion, balance traffic loads, and ensure efficient use of bandwidth while meeting QoS requirements.</t>
        <t>The TE use case is a combination of the both the capacity planning and the simulation use case. Therefore there are no SIMAP requirements.</t>
      </section>
      <section anchor="postmortem-replay">
        <name>Postmortem Replay</name>
        <t>The postmortem replay use case consists in using SIMAPs for the purpose of analysis of network service property evolution based on recorded changes. A collection of relevant timestamped network events, such as routing updates, configuration changes, link status modifications, traffic metrics evolution, and service characteristics, is being made accessible from and/or within a SIMAP to support investigation and automated processing.
Using a structured format, the stored data can be replayed in sequence, allowing network operators to examine historical network behavior, diagnose issues, and assess the impact of such events on service assurance.</t>
        <t>The mechanism supports correlation with external data sources to facilitate comprehensive post-mortem analysis.
Further than centralizing and correlating such various sources of information, the SIMAP can provide simulation of the network behaviour to assist investigations.</t>
        <t>In essence, this use case builds upon a collection of other SIMAP use cases, such as, inventory queries, intent/service assurance, Service KPIs, capacity planning, and simulation to provide a thorough understanding of a network event impacting service assurance.</t>
        <t>Note that this use case may serve as a component of Service Disruption Detection fine tuning as described in <xref target="I-D.draft-ietf-nmop-network-anomaly-architecture"/>.</t>
      </section>
      <section anchor="closed-loop">
        <name>Closed Loop</name>
        <t>A network closed loop refers to an automated and intelligent system where network operations are continuously monitored, analyzed, and optimized in real time through feedback mechanisms. This self-adjusting cycle ensures that the network dynamically adapts to changes, resolves issues proactively, and maintains optimal performance without manual intervention.</t>
        <t>Key Characteristics of a Network Closed Loop:
* Real-Time Monitoring: Collects data from network devices, traffic flows, and applications to build a comprehensive view of network health and performance.
* Automated Analysis: Ideally leverages AI and machine learning to identify anomalies, predict potential failures, or detect security threats.
* Proactive Action: Automatically triggers corrective measures, such as reconfiguring devices, isolating compromised endpoints, or rerouting traffic.
* Continuous Optimization: Uses feedback from previous cycles to refine network policies and improve future responses.</t>
        <t>The application will be able to retrieve topology layer and any network/node/termination point/link instances from the controller via the SIMAP API and from the response it will be able to map the traffic analysis to the entities (typically links and router), for automated analysis. The corrective measures would be applied, either directly to the network by managed the SIMAP entities (network/node/termination point/link instances) or by validating first the corrective measure in an offline simulation (see the simulation and traffic engineering use cases).</t>
      </section>
      <section anchor="network-digital-twin-ndt">
        <name>Network Digital Twin (NDT)</name>
      </section>
    </section>
    <section anchor="simap-requirements">
      <name>SIMAP Requirements</name>
      <section anchor="core-requirements">
        <name>Core Requirements</name>
        <t>The following are the core requirements for the SIMAP (note that some of them are supported by
default by <xref target="RFC8345"/>):</t>
        <dl>
          <dt>REQ-BASIC-MODEL-SUPPORT:</dt>
          <dd>
            <t>Basic model with network, node, link, and termination point entity types.</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that users of the SIMAP model
must be able to understand topology model at any layer via these core concepts only,
without having to go to the details of the specific augmentations to understand the topology.</t>
          </dd>
          <dt>REQ-LAYERED-MODEL:</dt>
          <dd>
            <t>Layered SIMAP, from physical network (ideally optical, layer 2, layer 3) up to  service and intent views.</t>
          </dd>
          <dt>REQ-PASSIVE-TOPO:</dt>
          <dd>
            <t>SIMAP must support topology of the complete network, including active and passive parts.</t>
          </dd>
          <dt/>
          <dd>
            <t>For Access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer service, reduced MTTR, and lower operational costs
through truck roll reduction.</t>
          </dd>
          <dt>REQ-PROG-OPEN-MODEL:</dt>
          <dd>
            <t>Open and programmable SIMAP.</t>
          </dd>
          <dt/>
          <dd>
            <t>This includes "read" operations to retrieve the view of the network, typically as application-facing interface of
Software Defined Networking (SDN) controllers or orchestrators.</t>
          </dd>
          <dt/>
          <dd>
            <t>It also includes "write" operations, not for the ability to directly change the SIMAP data
(e.g., changing the network or service parameters), but for offline simulations, also known as what-if scenarios.</t>
          </dd>
          <dt/>
          <dd>
            <t>Running a "what-if" analysis requires the ability to take
snapshots and to switch easily between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>Note that there is a need to distinguish between a change on the SIMAP
for future simulation and a change that reflects the current reality of the network.</t>
          </dd>
          <dt>REQ-STD-API-BASED:</dt>
          <dd>
            <t>Standard based SIMAP Models and APIs, for multi-vendor support.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide the standard YANG APIs
that provide for read/write and queries.  These APIs must also provide the capability to retrieve the
links to external data/models.</t>
          </dd>
          <dt>REQ-COMMON-APP:</dt>
          <dd>
            <t>SIMAP models and APIs must be common over different network domains (campus, core, data center, etc.).</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that clients of the SIMAP API must be able to understand the topology model of layers of any
domain without having to understand the details of any technologies and domains.</t>
          </dd>
          <dt>REQ-SEMANTIC:</dt>
          <dd>
            <t>SIMAP must provide semantics for layered network topologies and for linking external models/data.</t>
          </dd>
          <dt>REQ-LAYER-NAVIGATE:</dt>
          <dd>
            <t>SIMAP must provide intra-layer and inter-layer relationships.</t>
          </dd>
          <dt>REQ-EXTENSIBLE:</dt>
          <dd>
            <t>SIMAP must be extensible with metadata.</t>
          </dd>
          <dt>REQ-PLUGG:</dt>
          <dd>
            <t>SIMAP must be pluggable. That is,
</t>
            <ul spacing="normal">
              <li>
                <t>Must connect to other YANG modules for inventory, configuration, assurance, etc.</t>
              </li>
              <li>
                <t>Given that no all involved components can be available using YANG, there is a need to connect
SIMAP YANG model with other modelling mechanisms.</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-GRAPH-TRAVERSAL:</dt>
          <dd>
            <t>SIMAP must be optimized for graph traversal for paths. This means that only providing link nodes and
source and sink relationships to termination-points may not be sufficient, we may need to have the direct
relationship between the termination points or nodes.</t>
          </dd>
          <dt>REQ-BIDIR:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model bidirectional links
One of the core characteristics of any network topology is the link
directionality.  While data flows are unidirectional, the
bidirectional links are also common in networking.  Examples are
Ethernet cables, bidirectional SONET rings, socket connection to the
server, etc.  We also encounter requirements for simplified service
layer topology, where we want to model link as bidirectional to be
supported by unidirectional links at the lower layer.</t>
          </dd>
          <dt>REQ-MULTI-POINT:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model multipoint links
One of the core characteristics of any network topology is its type
and link cardinality.  Any topology model should be able to model any
topology type in a simple and explicit way, including point to
multipoint, bus, ring, star, tree, mesh, hybrid and daisy chain.  Any
topology model should also be able to model any link cardinality in a
simple and explicit way, including point to point, point to
multipoint, multipoint to multipoint or hybrid.</t>
          </dd>
          <dt>REQ-MULTI-DOMAIN:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model links between the network/domains
One of the core characteristics of any topology is connectivity between different network, subnetworks or domains.</t>
          </dd>
          <dt>REQ-SUBNETWORK:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model network decomposition into sub-networks.
This would allow modelling hierarchical network domains, Autonomous System with multiple Areas or e2e network
with multiple domains.</t>
          </dd>
          <dt>REQ-SHARED:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to share nodes, links and termination points between different networks.</t>
          </dd>
          <dt>REQ-SUPPORTING:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model supporting relationships between different types of topological entities
(e.g., tp is supported by the node). This may be required in the cases when tp is not supported by the underlying tp,
but by the node (e.g., loopback does not have physical representation, so it is supported by physical device).</t>
          </dd>
          <dt>REQ-STATUS:</dt>
          <dd>
            <t>Links and nodes that are down must appear in the topology. The status of the nodes and links must be either
implemented in the SIMAP model or accessible from the SIMAP model.</t>
          </dd>
        </dl>
      </section>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The following are design requirements for modelling the SIMAP. They are derived from the core requirements
collected from the operators and although there is some duplication, these are focused on summarizing the requirements
for the design of the model and API:</t>
        <dl>
          <dt>REQ-TOPO-ONLY:</dt>
          <dd>
            <t>SIMAP should contain only topological information.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP is not required to contain all models and data required for
all the management and use cases. However, it should be designed to support adequate pointers to other functional
data and models to ease navigating in the overall system. For example:
</t>
            <ul spacing="normal">
              <li>
                <t>ACLs and Route Policies are not required to be supported in the SIMAP, they would be linked to the SIMAP</t>
              </li>
              <li>
                <t>Dynamic paths may either be outside of the SIMAP or part of traffic engineering data/models</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-PROPERTIES:</dt>
          <dd>
            <t>SIMAP entities should mainly contain properties used to identify topological entities at different layers,
identify their roles, and topological relationships between them.</t>
          </dd>
          <dt>REQ-RELATIONSHIPS:</dt>
          <dd>
            <t>SIMAP should contain all topological relationships inside each layer or between the layers (underlay/overlay)</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP should contain links to other models/data to enable generic navigation to other YANG models in
generic way.</t>
          </dd>
          <dt>REQ-CONDITIONAL:</dt>
          <dd>
            <t>Provide capability for conditional retrieval of parts of SIMAP.</t>
          </dd>
          <dt>REQ-TEMPO-HISTO:</dt>
          <dd>
            <t>Must support geo-spatial, temporal, and historical data.  The temporal and historical can also be supported
external to the SIMAP.</t>
          </dd>
        </dl>
      </section>
      <section anchor="architectural-requirements">
        <name>Architectural Requirements</name>
        <t>The following are the architectural requirements for the controller that provides SIMAP API:</t>
        <dl>
          <dt>REQ-DM-SCALES:</dt>
          <dd>
            <t>Scale, performance, ease of integration.</t>
          </dd>
          <dt>REQ-DM-DISCOVERY:</dt>
          <dd>
            <t>Initial discovery and dynamic (change only) synch with the physical network.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the SIMAP concepts, requirements, and use cases, there is no specific security considerations.
However, the RFC 8345 Security Considerations aspects will be useful when designing the solution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  However, the data model is designed with
   appropriate provisions to ease future augmentations with application-
   specific and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-04"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-terminology">
          <front>
            <title>Some Key Terms for Network Fault and Problem Management</title>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="21" month="January" year="2025"/>
            <abstract>
              <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG models and management protocols that report, make
   visible, or manage network faults and problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-10"/>
        </reference>
        <reference anchor="RFC5136">
          <front>
            <title>Defining Network Capacity</title>
            <author fullname="P. Chimento" initials="P." surname="Chimento"/>
            <author fullname="J. Ishac" initials="J." surname="Ishac"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>Measuring capacity is a task that sounds simple, but in reality can be quite complex. In addition, the lack of a unified nomenclature on this subject makes it increasingly difficult to properly build, test, and use techniques and tools built around these constructs. This document provides definitions for the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling between a source and destination in an IP network. By doing so, we hope to provide a common framework for the discussion and analysis of a diverse set of current and future estimation techniques. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5136"/>
          <seriesInfo name="DOI" value="10.17487/RFC5136"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="I-D.draft-ietf-nmop-network-anomaly-architecture">
          <front>
            <title>An Architecture for a Network Anomaly Detection Framework</title>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Wanting Du" initials="W." surname="Du">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   This document describes the motivation and architecture of a Network
   Anomaly Detection Framework and the relationship to other documents
   describing network symptom semantics and network incident lifecycle.

   The described architecture for detecting IP network service
   interruption is generic applicable and extensible.  Different
   applications are being described and exampled with open-source
   running code.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-anomaly-architecture-01"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC9179">
          <front>
            <title>A YANG Grouping for Geographic Locations</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a generic geographical location YANG grouping. The geographical location grouping is intended to be used in YANG data models for specifying a location on or in reference to Earth or any other astronomical object.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9179"/>
          <seriesInfo name="DOI" value="10.17487/RFC9179"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="I-D.ogondio-opsawg-ospf-topology">
          <front>
            <title>A YANG Data Model for Open Shortest Path First (OSPF) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Open Shortest
   Path First (OSPF) information.  This document augments the 'ietf-
   network' data model by adding OSPF concepts and explains how the data
   model can be used to represent the OSPF topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-opsawg-ospf-topology-01"/>
        </reference>
        <reference anchor="I-D.ogondio-nmop-isis-topology">
          <front>
            <title>A YANG Data Model for Intermediate System to intermediate System (IS-IS) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Intermediate
   System to Intermediate System (IS-IS).  This document augments the
   'ietf-network' data model by adding IS-IS concepts and explains how
   the data model can be used to represent the IS-IS topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-nmop-isis-topology-00"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-network-inventory-yang">
          <front>
            <title>A YANG Data Model for Network Hardware Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="9" month="July" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for network hardware
   inventory data information.

   The YANG data model presented in this document is intended to be used
   as the basis toward a generic YANG data model for network hardware
   inventory data information which can be augmented, when required,
   with technology-specific (e.g., optical) inventory data, to be
   defined either in a future version of this document or in another
   document.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-network-inventory-yang-02"/>
        </reference>
        <reference anchor="I-D.wzwb-opsawg-network-inventory-management">
          <front>
            <title>A YANG Network Data Model of Network Inventory</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="19" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory
   that is application- and technology-agnostic.  This data model can be
   augmented with application-specific and technology-specific details
   in other, more specific network inventory data models.

   This document is meant to help IVY base Network Inventory model
   discussion and ease agreement on a base model that would be flexible
   enough to be augmented with components that are covered by the IVY
   Charter.

   The hardware components definition are adapted from draft-ietf-ccamp-
   network-inventory-yang-02.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wzwb-opsawg-network-inventory-management-04"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-topology">
          <front>
            <title>A Network Data Model for Inventory Topology Mapping</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a YANG model to map the network inventory data
   with the topology model to form a base underlay network.  The model
   facilitates the correlation between the layer (e.g., Layer 2 and
   Layer 3) topology information and the inventory data of the underlay
   network for better service provisioning, network maintenance
   operations, and other assessment scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-01"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-16"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   Delivery of network services assumes that appropriate setup is
   provisioned over the links that connect customer termination points
   and a provider network.  The required setup to allow successful data
   exchange over these links is referred to as an attachment circuit
   (AC), while the underlying link is referred to as "bearer".

   This document specifies a YANG service data model for ACs.  This
   model can be used for the provisioning of ACs before or during
   service provisioning (e.g., Network Slice Service).

   The document also specifies a YANG service model for managing bearers
   over which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-20"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="10" month="October" year="2024"/>
            <abstract>
              <t>   A network incident refers to an unexpected interruption of a network
   service, degradation of a network service quality, or sub-health of a
   network service.  Different data sources including alarms, metrics,
   and other anomaly information can be aggregated into a few amount of
   network incidents through data correlation analysis and the service
   impact analysis.

   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help resolve network incidents
   for the sake of network service health and root cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-02"/>
        </reference>
      </references>
    </references>
    <?line 556?>

<section anchor="related-ietf-activities">
      <name>Related IETF Activities</name>
      <section anchor="sec-ntw-topo">
        <name>Network Topology</name>
        <t>Interestingly, we could not find any network topology definition in
   IETF RFCs (not even in <xref target="RFC8345"/>) or Internet-Drafts.  However, it is mentioned
   in multiple documents.  As an example, in Overview and Principles of
   Internet Traffic Engineering <xref target="RFC9522"/>, which
   mentions:</t>
        <blockquote>
          <t>To conduct performance studies and to support planning of existing
   and future networks, a routing analysis may be performed to determine
   the paths the routing protocols will choose for various traffic
   demands, and to ascertain the utilization of network resources as
   traffic is routed through the network.  Routing analysis captures the
   selection of paths through the network, the assignment of traffic
   across multiple feasible routes, and the multiplexing of IP traffic
   over traffic trunks (if such constructs exist) and over the
   underlying network infrastructure.  A model of network topology is
   necessary to perform routing analysis.  A network topology model may
   be extracted from:</t>
          <ul spacing="normal">
            <li>
              <t>Network architecture documents</t>
            </li>
            <li>
              <t>Network designs</t>
            </li>
            <li>
              <t>Information contained in router configuration files</t>
            </li>
            <li>
              <t>Routing databases such as the link state database of an interior gateway protocol (IGP)</t>
            </li>
            <li>
              <t>Routing tables</t>
            </li>
            <li>
              <t>Automated tools that discover and collate network topology information.</t>
            </li>
          </ul>
          <t>Topology information may also be derived from servers that monitor
   network state, and from servers that perform provisioning functions.</t>
        </blockquote>
      </section>
      <section anchor="sec-core">
        <name>Core SIMAP Components</name>
        <t>The following specifications are core for the SIMAP:</t>
        <ul spacing="normal">
          <li>
            <t>IETF network model and network topology model <xref target="RFC8345"/></t>
          </li>
          <li>
            <t>A YANG grouping for geographic location <xref target="RFC9179"/></t>
          </li>
          <li>
            <t>IETF modules that augment <xref target="RFC8345"/> for different technologies:  </t>
            <ul spacing="normal">
              <li>
                <t>A YANG data model for Traffic Engineering (TE) Topologies <xref target="RFC8795"/></t>
              </li>
              <li>
                <t>A YANG data model for Layer 2 network topologies <xref target="RFC8944"/></t>
              </li>
              <li>
                <t>A YANG data model for OSFP topology  <xref target="I-D.ogondio-opsawg-ospf-topology"/></t>
              </li>
              <li>
                <t>A YANG data model for IS-IS topology <xref target="I-D.ogondio-nmop-isis-topology"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-add">
        <name>Additional SIMAP Components</name>
        <t>The SIMAP may need to link to the following models, some are already augmenting <xref target="RFC8345"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Service Attachment Point (SAP) <xref target="RFC9408"/>, augments 'ietf-network' data model <xref target="RFC8345"/> by adding the SAP.</t>
          </li>
          <li>
            <t>SAIN <xref target="RFC9417"/> <xref target="RFC9418"/></t>
          </li>
          <li>
            <t>Network Inventory Model <xref target="I-D.ietf-ivy-network-inventory-yang"/> focuses on physical and virtual inventory.
Logical inventory is currently outside of the scope.
It does not augment RFC8345 like the two Internet-Drafts that it evolved from <xref target="I-D.ietf-ccamp-network-inventory-yang"/>
and <xref target="I-D.wzwb-opsawg-network-inventory-management"/>. <xref target="I-D.ietf-ivy-network-inventory-topology"/>
correlates the network inventory with the general topology via RFC8345 augmentations that reference inventory.</t>
          </li>
          <li>
            <t>KPIs: delay, jitter, loss</t>
          </li>
          <li>
            <t>Attachment Circuits (ACs) <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>Configuration: L2SM <xref target="RFC8466"/>, L3SM <xref target="RFC8299"/>, L2NM <xref target="RFC9291"/>, and L3NM <xref target="RFC9182"/></t>
          </li>
          <li>
            <t>Incident Management for Network Services <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to Mohamed Boucadair for his valuable contributions, reviews, and comments.
Many thanks to Adrian Farrel for his SIMAP suggestion and helping to agree the terminology.
Many thanks to Dan Voyer, Brad Peters, Diego Lopez, Ignacio Dominguez Martinez-Casanueva, Italo Busi, Wu Bo,
Sherif Mostafa, Christopher Janz, Rob Evans, Danielle Ceccarelli, and many others for their contributions, suggestions
and comments.</t>
      <t>Many thanks to Nigel Davis <eref target="mailto:ndavis@ciena.com">ndavis@ciena.com</eref> for the valuable discussions and his confirmation of the
modelling requirements.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Ahmed Elhassany">
        <organization>Swisscom</organization>
        <address>
          <email>Ahmed.Elhassany@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
