A YANG Model for Network and VPN Service Performance Monitoring

The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.

Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Network Slicing

Network abstraction is a technique that can be applied to a network domain to obtain a view of potential connectivity across the network by utilizing a set of policies to select network resources. Network slicing is an approach to network operations that builds on   the concept of network abstraction to provide programmability, flexibility, and modularity.

Instantiation of IETF Network Slices in Service Providers Networks

Network Slicing (NS) is an integral part of Service Provider networks. The IETF has produced several YANG data models to support the Software-Defined Networking and network slice architecture and YANG- based service models for network slice (NS) instantiation. This document describes the relationship between IETF Network Slice   models for requesting the IETF Network Slices and (e.g., Layer-3 Service Model, Layer-2 Service Model) and Network Models (e.g., Layer-3 Network Model, Layer-2 Network Model) used during their realizations. In addition, this document describes the

Framework for IETF Network Slices

This document describes network slicing in the context of networks built from IETF technologies.  It defines the term "IETF Network Slice" and establishes the general principles of network slicing in the IETF context. The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and how abstract requests can be mapped to more specific technologies.

A YANG Data Model for Intermediate System to intermediate System (ISIS) Topology

NO LONGER ACTIVE DRAFT - This document defines a YANG data model for representing an abstract view of the provider network topology that contains Intermediate System to intermediate System (ISIS) information. This document augments the 'ietf-network' data model by adding ISIS concepts. The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).

Extensions to the Access Control Lists (ACLs) YANG Model

NO LONGER ACTIVE DRAFT - RFC 8519 defines a YANG data model for Access Control Lists (ACLs). This document discusses a set of extensions that fix many of the limitations of the ACL model as initially defined in RFC 8519. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the Network Modeling Working Group mailing list (netmod@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/netmod/.

Overview and Principles of Internet Traffic Engineering

This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking, and to provide   a common basis for the development of traffic engineering capabilities for the Internet.  The principles, architectures, and   methodologies for performance evaluation and performance optimization   of operational networks are also discussed. This work was first published as RFC 3272 in May 2002.

A YANG Network Data Model for Layer 2 VPNs

This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.

A Layer 3 VPN Network YANG Model

As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.