Skip to main content

Usage of IM for network topology to support TE Topology YANG Module Development
draft-lam-teas-usage-info-model-net-topology-03

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Authors Hing-Kam Lam , Eve Varma , Paul Doolan , Nigel Davis , Bernd Zeuner , Malcolm Betts , Italo Busi , Scott Mansfield , Ricard Vilalta , Victor Lopez
Last updated 2016-05-12
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-lam-teas-usage-info-model-net-topology-03
TEAS Working Group                                               K. Lam
Internet Draft                                                 E. Varma
Intended status: Informational                                    Nokia
Intended status: Informational                                P. Doolan
Expires: November 2016                                          Coriant
                                                                N. Davis
                                                                   Ciena
                                                               B. Zeuner
                                                        Deutsche Telekom
                                                                M. Betts
                                                                     ZTE
                                                                 I. Busi
                                                                  Huawei
                                                            S. Mansfield
                                                                Ericsson
                                                              R. Vilalta
                                                                    CTTC
                                                                V. Lopez
                                                              Telefonica
                                                           May 12, 2016

    Usage of IM for network topology to support TE Topology YANG Module
                                Development
            draft-lam-teas-usage-info-model-net-topology-03.txt

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may

Lam                   Expires November 12, 2016                [Page 1]
Internet-Draft   Usage of an IM for network topology           May 2016

   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on November 12, 2016.

   Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Abstract

   The benefits of using a common Information Model (IM) as a foundation
   for deriving purpose and protocol specific interfaces, particularly

Lam                   Expires November 12, 2016                [Page 2]
Internet-Draft   Usage of an IM for network topology           May 2016

   for complex networking domains, has been described in draft-betts-
   netmod-framework-data-schema-uml.  This draft describes existing
   information model relevant to Network Topology and illustrates how it
   can be used to help ensure the consistency and completeness of the
   YANG data modeling for TE topologies solutions work in TEAS.

Table of Contents

   1. Introduction...................................................4
   2. Background and Motivation......................................4
   3. The Common Information Model...................................5
      3.1. Core Model Fragment.......................................7
         3.1.1. Core Network Module..................................7
         3.1.2. Core Foundation Module...............................9
      3.2. Other Fragments..........................................12
   4. High Level Description of the Topology Subset of the CNM......12
      4.1. Object Classes of the CNM Topology Subset................12
         4.1.1. LogicalTerminationPoint (LTP) and LayerProtocol (LP)13
         4.1.2. ForwardingDomain (FD)...............................13
         4.1.3. Link and Link Port..................................14
         4.1.4. Network Element (NE)................................14
      4.2. Relationships between Object Classes of the Topology Subset15
         4.2.1. ForwardingDomain Recursive Aggregation
         (HigherLevelFdEncompassesLowerLevelFds Aggregation)........15
         4.2.2. Network Elements encompassing ForwardingDomains
         (NeEncompassesFds Aggregation).............................16
         4.2.3. ForwardingDomain association with LTPs (FdAggregatesLtps
         Composition)...............................................18
         4.2.4. ForwardingDomain aggregating Links (FdEncompassesLinks)
         ...........................................................18
         4.2.5. ForwardingDomain aggregating NEs....................18
   5. Detailed Description of the Topology Subset...................18
      5.1. Topological Entity.......................................21
      5.2. Characteristics of Topological Entity....................22
         5.2.1. Risk (RiskParameter_Pac)............................23
         5.2.2. TransferCost_Pac....................................24
         5.2.3. TransferTiming_Pac..................................25
         5.2.4. TransferIntegrity_Pac...............................26
         5.2.5. TransferCapcity_Pac.................................26
         5.2.6. Validation_Pac......................................28

Lam                   Expires November 12, 2016                [Page 3]
Internet-Draft   Usage of an IM for network topology           May 2016

         5.2.7. LayerProtocolTransition_Pac.........................28
   6. Purpose Specific IM Example - Transport API Topology Service..29
      6.1. T-API IM Constructs......................................29
      6.2. T-API Topology Service IM................................31
   7. Usage of the IM Topology Subset regarding TE Topology DM......32
   8. Security Considerations.......................................32
   9. IANA Considerations...........................................33
   10. Conclusions..................................................33
   11. References...................................................33
      11.1. Normative References....................................33
      11.2. Informative References..................................33
   12. Contributors.................................................34
   13. Acknowledgments..............................................34

1. Introduction

   This draft describes existing information modeling (IM) relevant to
   Network Topology [ONF TR-512] [OSSDN SNOWMASS] and illustrates how it
   can be used to help ensure the consistency and completeness of the
   YANG data model (DM) for TE topologies solutions development work in
   TEAS.

2. Background and Motivation

   Information Models (IM) and Data Models (DM) are related but
   different.  An IM provides an abstract, conceptual view of the system
   being modeled in terms of its constituent parts (objects),
   independent of any specific implementations or protocols used to
   transport the data; it hides all protocol and implementation details
   (RFC 3444, TM Forum/NGCOR, ITU-T SG 15).  A DM is a concrete
   specification in a particular language of an interface to, in this
   case, a controlled/managed system.  The intention of the distinction
   between IMs and DMs has been to separate the modeling of problem
   space semantics from the modeling of the implementation of those
   semantics (though the dividing line has not always been clearly
   articulated).

   A DM may be derived from an IM though it is often created without
   (explicit or obviously implicit) reference to one.  When a DM is
   derived from an IM, the DM and the components of the system it
   provides control/management access to are traceable to the

Lam                   Expires November 12, 2016                [Page 4]
Internet-Draft   Usage of an IM for network topology           May 2016

   definitions provided in the IM.  There is no ambiguity between
   designer, developer, user or operator regarding the name, function,
   and information elements that are associated with a particular
   managed object.

   As described in [I-D.betts], when DMs are created "in isolation"
   solely for the purpose of encoding specific interfaces, they may do
   that job adequately for any particular interface but in complex
   domains may create opportunities for confusion, duplication of
   effort, lack of interoperability, and lack of extensibility. In the
   past, ad-hoc development of DMs has caused significant operational
   and implementation inefficiencies in our industry.

   Since March 2014, upon IESG recommendation that SNMP no longer be
   used for new work re configuration and that NETCONF/YANG be used
   instead, there has been an explosion of YANG DM development in IETF.
   It has consequently been recognized as essential to assure proper
   coordination of YANG DM development (including reaching out to
   different SDOs/consortia), as well as to assure that the YANG modules
   themselves provide a good representation of what is being modeled, to
   meet expectations of functionality, quality, and interoperability.
   In order to facilitate this objective, guidance from available
   pertinent IMs can be valuable.

   This draft first describes an existing information model relevant to
   Network Topology [ONF TR-512], which is part of the Common
   Information Model (ONF-CIM) of network resources (as described in [I-
   D.betts]), that can be leveraged to assess the consistency and
   completeness of related YANG modules under development.  It also
   describes an transport application-specific IM [OSSDN SNOWMASS],
   derived from CIM pruning and refactoring as explained in [I-D.betts],
   that is intended to enable further clarity in understanding the
   modeling.  Being part of a Common Information Model, it will not lead
   to development of incompatible/uncoordinated models that can be
   difficult to maintain as other purpose-specific interfaces are
   developed.

3. The Common Information Model

   This section provides a high level introduction to the ONF Common
   Information Model (ONF-CIM), and in particular its Core Model

Lam                   Expires November 12, 2016                [Page 5]
Internet-Draft   Usage of an IM for network topology           May 2016

   Fragment (see [ONF TR-512]), to provide an overall context for the
   topology relevant subset. The ONF-CIM has been developed through
   collaboration among several SDOs, including ITU-T, TM Forum, and ONF,
   and also published as ITU-T Recommendation G.7711 [G.7711].

   An information model describes the things in a domain in terms of
   objects, their properties (represented as attributes), and their
   relationships.

   The ONF-CIM is expressed in a formal language called UML (Unified
   Modeling Language). UML has a number of basic model elements, called
   UML artifacts. In order to assure a consistent and harmonized
   modeling approach, only a selected subset of these UML artifacts were
   used in the development of the ONF-CIM according to guidelines for
   creating an information model expressed in UML (see the UML
   Guidelines document in the ONF TR-512 [ONF TR-512]).

   The ONF-CIM has been developed using the Papyrus open source UML
   Tool, for which a detailed guidelines document is available (see the
   Papyrus Guidelines document in the ONF TR-512 [ONF TR-512]). This
   guidelines document also describes how the modelers constructing the
   ONF-CIM can cooperate in the GitHub environment to allow for separate
   and still coordinated development of the ONF-CIM fragments.

   The OMF-CIM includes all of the artifacts (objects, attributes,
   relationships, etc.) that are necessary to describe the domain for
   the applications being developed.

   It will be necessary to continually expand and refine the ONF-CIM
   over time as, for example to add, new applications, capabilities or
   forwarding technologies, or to refine the ONF-CIM as new insights are
   gained. To allow these extensions to be made in a seamless manner,
   the ONF-CIM is structured into a number of model fragments. This
   modeling process allows the fragments that contain these extensions
   to be developed, by the domain experts, with as much independence as
   possible.  This process is further articulated in [I-D.betts].

Lam                   Expires November 12, 2016                [Page 6]
Internet-Draft   Usage of an IM for network topology           May 2016

3.1. Core Model Fragment

   The Core Model Fragment of the ONF-CIM consists of model artifacts
   that are intended for use by multiple applications and/or forwarding
   technologies.

   For navigability, the Core Model Fragment is further sub-structured
   into modules. Currently, these consist of a Core Network Module and a
   Core Foundation Module.

3.1.1. Core Network Module

   The Core Network Module (CNM) consists of artifacts that model the
   essential network aspects that are neutral to the forwarding
   technology of the network. The CNM currently encompasses Topology,
   Termination, and Forwarding aspects (subsets of the CNM) as described
   below:

   -  Topology Subset of CNM

      The Topology subset of the CNM supports the modeling of network
      topology information, which can be used to build the topology
      database and depict the topology. Object classes representing
      topological entities include:

      o Forwarding Domain (FD): Offers the potential to enable
        forwarding of information.

      o Link (L): Models the adjacency between two or more FDs. A Link
        has LinkPorts.

      o Logical Termination Point (LTP): Models the ports of a link. It
        encapsulates the termination, adaptation, and OAM functions of
        one or more transport layers.

      o Network Element (NE): While not actually part of topology, a NE
        brings meaning to the FD and the LTP contexts (and hence the
        links). A NE represents physical equipment "bundling" to
        provide a view of management scope, management access, and
        session.

Lam                   Expires November 12, 2016                [Page 7]
Internet-Draft   Usage of an IM for network topology           May 2016

      The Topology subset of the CNM supports network topology
      abstraction and virtualization. FD abstraction is supported via
      recursive aggregation and virtualization via partitioning of
      resources according to the resource dedication criterion.

   -  Forwarding Subset of CNM

      The Forwarding subset of the CNM (not covered in detail in this
      draft) supports configuration of forwarding entities, including
      their setup, modification, and tear down. Artifacts representing
      the forwarding construct include:

      o ForwardingConstruct (FC): Also known as SNC. In conjunction
        with the FcPort, FC models the enabled forwarding between two
        FcPorts across a FD.

      o FcPort: Models the access to the FC, and associates the FC to
        the LTP. When the FC supports protection, the FcPort also
        indicates its role in the protection scheme, i.e., whether it
        is a working or protection FcPort.

      o FcRoute: Also known as SncRoute. It models the individual
        routes of an FC.

      o FcSwitch: Also known as SncSwitch. It models the switched
        forwarding of traffic (traffic flow) between EPs and is present
        where there is protection functionality in the FD.

   -  Termination Subset of CNM

      The Termination subset of the CNM (not covered in detail in this
      draft) supports modeling of the processing of transport
      characteristic information, such as termination, adaptation, OAM,
      etc. Artifacts representing the termination and adaptation and OAM
      construct include:

      o Logical Termination Point (LTP): See the LTP description in the
        Topology Subset

      o Layer Protocol (LP): This identifies the type of signal and is
        the anchor for transport layer protocol specific definitions,

Lam                   Expires November 12, 2016                [Page 8]
Internet-Draft   Usage of an IM for network topology           May 2016

        which are modeled as conditional packages, e.g., for OTN,
        ODUk_TTP_Pac, OCh_TTP_Pac, etc.

3.1.2. Core Foundation Module

   To communicate about an entity, it is important to have some way of
   referring to that entity, i.e., to have some way of referencing it.
   The Core Foundation module defines the artifacts for referencing
   entities; i.e.:

   -  Global Unique ID (GUID):

      An identifier that is globally unique where an identifier is a
      property of an entity/role with a value that is unique within an
      identifier space, where the identifier space is itself unique, and
      immutable. The identifier therefore represents the identity of the
      entity/role. An identifier carries no semantics with respect to
      the purpose of the entity.)

   -  Local ID:

      An identifier that is unique in the context of some scope that is
      less than the global scope (where an identifier is as defined in
      GUID above).

   -  Name:

      A property of an entity with a value that is unique in some
      namespace but may change during the life of the entity. A name
      carries no semantics with respect to the purpose of the entity.

   -  Label:

      A property of an entity with a value that is not expected to be
      unique and is allowed to change. A label carries no semantics with
      respect to the purpose of the entity and has no effect on the
      entity behavior or state.

   The Core Foundation module also provides the opportunity to extend
   any entity using the Extension structure.

Lam                   Expires November 12, 2016                [Page 9]
Internet-Draft   Usage of an IM for network topology           May 2016

   The module also defines two foundation object classes:

   -  GlobalClass:

      Super class of object classes for which their instances can exist
      on their own right, e.g. NE, LTP, FD, Link, and FC. Global classes
      shall have one and only one globally unique identifier (GUID) and
      may have zero or more local identifiers, zero or more names, zero
      or more labels, zero or more extensions.

   -  LocalClass:

      Super class of object classes for which the existence of their
      instances depends on instances of global classes; e.g., LP (of
      LTP), EP (of FC), and LE (of Link). Local classes shall have at
      least one local identifier, may have zero or more names, zero or
      more labels, zero or more extensions.

   --------------------------------------------------------------------
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I             Artifacts for Referencing of Entities                I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

             Figure 3-1 Artifacts for Referencing of Entities

Lam                   Expires November 12, 2016               [Page 10]
Internet-Draft   Usage of an IM for network topology           May 2016

   The Core Foundation module also defines a State_Pac artifact, which
   is a package of state attributes. The State_Pac is inherited by
   GlobalClass and LocalClass object classes. The State_Pac consists of
   the following state-related attributes:

   -  Operational State:

      Read-only with values: DISABLED, ENABLED

   -  Administrative State:

      Read-write with values: LOCKED, UNLOCKED

   -  Lifecycle State:

      Read-write with values: PLANNED, POTENTIAL, INSTALLED,
      PENDING_REMOVAL

   --------------------------------------------------------------------
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                       States of Objects                          I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

                       Figure 3-2 States of Objects

Lam                   Expires November 12, 2016               [Page 11]
Internet-Draft   Usage of an IM for network topology           May 2016

3.2. Other Fragments

   In addition to the Core Fragment, the ONF-CIM contains forwarding
   technology and application specific fragments. The Optical Transport
   Fragment of the ONF-CIM (see [ONF TR-512]) encompasses transport
   technology layers 0, 1, and 2.

4. High Level Description of the Topology Subset of the CNM

   This section provides a high-level overview of the Topology Subset of
   the CNM. Figure 4-1 below is a skeleton class diagram illustrating
   the key object classes. To avoid cluttering the figure, not all
   associations have been shown and all of the attributes were omitted.

   --------------------------------------------------------------------
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I               Overview of the CNM Topology Subset                I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

              Figure 4-1 Overview of the CNM Topology Subset

4.1. Object Classes of the CNM Topology Subset

   This section describes the object classes of the Topology Subset of
   the CNM. Relationships between these classes are described in section
   4.2 below

Lam                   Expires November 12, 2016               [Page 12]
Internet-Draft   Usage of an IM for network topology           May 2016

4.1.1. LogicalTerminationPoint (LTP) and LayerProtocol (LP)

   The LogicalTerminationPoint (LTP) object class encapsulates the
   termination, adaptation and OAM functions of one or more transport
   protocol layers. The structure of the LTP supports all transport
   protocols including circuit and packet forms. Each transport layer is
   represented by a LayerProtocol (LP) instance. The LayerProtocol
   instances of the LTP can be used for controlling the termination and
   OAM functionality of that layer. It can also be used for controlling
   the adaptation (i.e. encapsulation and/or multiplexing of client
   signal). Where the client/server relationship is fixed 1:1 and
   immutable, the different layers can be encapsulated in a single LTP
   instance. Where there is a n:1 relationship between client and
   server, the layers must be split over separate instances of LTP.

   The LP object class is defined with generic attributes
   "layerProtocolName" for indicating the supported transport layer
   protocol.

   Transport layer specific properties (such as layer-specific
   termination and adaptation properties) are modeled as attributes of
   conditional packages (called "_Pacs" in the UML notation of the
   ONF-CIM) associated with the LP object class.

4.1.2. ForwardingDomain (FD)

   The ForwardingDomain (FD) object class models the switching and
   routing capabilities (see "subnetwork" topological component in
   [G.852.2] and [TMF612]), which is used to effect forwarding of
   transport characteristic information and offers the potential to
   enable forwarding. It represents the resource that supports flows
   across the FD. The FD object can hold zero or more instances of
   ForwardingConstruct (FC) (representing constrained forwarding, not
   discussed further in this document, covering connections, VLANs etc)
   of one or more layer networks; e.g., OCh, ODU, ETH, and MPLS-TP. The
   FD object provides the context for operations that
   create/modify/delete FCs.

   The FD object class supports a recursive aggregation relationship
   such that the internal construction of an FD can be exposed as

Lam                   Expires November 12, 2016               [Page 13]
Internet-Draft   Usage of an IM for network topology           May 2016

   multiple lower level FDs and associated Links (partitioning) (see
   section 4.2.1.)

   At the lowest level of recursion, a FD (within a network element)
   could represent a switch matrix (i.e., a fabric).

   Note that an NE can encompass multiple switch matrices (FDs), as
   described in section 4.2.2. An instance of FD is associated with zero
   or more LTP objects, as described in section 4.2.3.

4.1.3. Link and Link Port

   The Link object class models the adjacency between two or more
   ForwardingDomains (FDs).

   In its basic form (i.e., point-to-point Link) it associates a set of
   LTP clients on one FD with an equivalent set of LTP clients on
   another FD. Like the FC, the Link has endpoints (LinkPort) which take
   roles in the context of the function of the Link. A point-to-point
   Link can be a TE Link and support parameters such as capacity, delay
   etc. These parameters depend on the type of technology that supports
   the link.

   A Link can be terminated on two or more FDs. This provides support
   for technologies such as PON and Layer 2 MAC in MAC configurations.

   The LinkPort further details the relationship between FD and Link for
   asymmetric cases.

   A FD may aggregate Links (see section 4.2.5).

   The Link can support multiple transport layers via the associated LTP
   object. An instance of Link can be formed with the necessary
   properties according to the degree of virtualization. For
   implementation optimization, multiple layer-specific links can be
   merged and represented as a single Link instance.

4.1.4. Network Element (NE)

   The NetworkElement (NE) object class represents a network element
   (traditional NE) in the data plane or a virtual network element
   visible in an interface where virtualization is used.

Lam                   Expires November 12, 2016               [Page 14]
Internet-Draft   Usage of an IM for network topology           May 2016

   In the direct interface from a SDN controller to a network element in
   the data plane, the NE object defines the scope of control for the
   resources within the network element, e.g., internal transfer of user
   information between the external terminations (ports), encapsulation,
   multiplexing/demultiplexing, and OAM functions, etc. The NE provides
   the scope of the naming space for identifying objects representing
   the resources within the network element.

   Where virtualization is employed, the NE object represents a virtual
   NE (VNE). The mapping of the VNE to the NEs is the internal matter of
   the SDN controller that offers the view of the VNE. Via the interface
   between hierarchical SDN controllers, NE instances can be created (or
   deleted) for providing (or removing) virtual views of the combination
   of slices of network elements in the data plane.

4.2. Relationships between Object Classes of the Topology Subset

4.2.1. ForwardingDomain Recursive Aggregation
   (HigherLevelFdEncompassesLowerLevelFds Aggregation)

   Figure 4-2 below provides a pictorial example of ForwardingDomain
   (FD) recursion with Links.

   --------------------------------------------------------------------
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I              ForwardingDomain recursion with Links               I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I

Lam                   Expires November 12, 2016               [Page 15]
Internet-Draft   Usage of an IM for network topology           May 2016

   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

             Figure 4-2 ForwardingDomain recursion with Links

   Figure 4-2 shows a UML fragment including the Link and
   ForwardingDomain (FD). For simplicity it is assumed here that the
   Links and FDs are for a single LayerProtocol (LP) although it can be
   seen from the detailed figure earlier in this section that both a FD
   and link can support a list of LPs.

   The pictorial form shows a number of instances of FD interconnected
   by Links and shows nesting of FDs. The recursive aggregation
   "HigherLevelFdEncompassesLowerLevelFds" relationship (represented by
   an open diamond) supports the FD nesting but it should be noted that
   this is intentionally showing no lifecycle dependency between the
   lower FDs and the higher ones that nest them (to do this composition,
   a black diamond would have been used instead of the open diamond).
   This is to allow for rearrangements of the FD hierarchy (e.g. when
   regions of a network are split or merged). This emphasizes that the
   nesting is an abstraction rather than decomposition. The underlying
   network still operates regardless of how it is perceived in terms of
   aggregating FDs. The model allows for only one hierarchy.

4.2.2. Network Elements encompassing ForwardingDomains (NeEncompassesFds
   Aggregation)

   Figure 4-3 below provides a pictorial example of ForwardingDomain
   (FD) recursion with Links and NEs.

   --------------------------------------------------------------------
   I                                                                  I

Lam                   Expires November 12, 2016               [Page 16]
Internet-Draft   Usage of an IM for network topology           May 2016

   I                                                                  I
   I                                                                  I
   I                                                                  I
   I          ForwardingDomain recursion with Links and NEs           I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

         Figure 4-3 ForwardingDomain recursion with Links and NEs

   Figure 4-3 above shows an overlay of NetworkElement (NE) on the
   ForwardingDomains and a corresponding fragment of UML showing only
   the ForwardingDomain and NetworkElement classes.

   The figure emphasizes that one level of abstraction of
   ForwardingDomain is bounded by an NE. This is represented in the UML
   fragment by the composition association (black diamond) that explains
   that there is a lifecycle dependency in that the ForwardingDomain at
   this level that cannot exist without the NE. The figure also shows
   that a ForwardingDomain need not be bounded by an NE (as explained in
   the UML fragment by the 0..1 composition) and that a ForwardingDomain
   may have smaller scope than the whole NE (even when considering only
   a single LayerProtocol as described below).

   In one of the cases depicted (e.g., the right hand side NE
   encompassing two FDs), the two ForwardingDomains in the NE are
   completely independent. In the other cases depicted (e.g., the left
   hand side NE encompassing three FDs) the subordinate
   ForwardingDomains are themselves joined by Links emphasizing that the
   NE does not necessarily represent the lowest level of relevant
   network decomposition.

Lam                   Expires November 12, 2016               [Page 17]
Internet-Draft   Usage of an IM for network topology           May 2016

   The figure also emphasizes that just because one ForwardingDomain at
   a particular level of decomposition of the network happens to be the
   one bounded by an NE does not mean that all ForwardingDomains at that
   level are also bounded by NEs.

4.2.3. ForwardingDomain association with LTPs (FdAggregatesLtps
   Composition)

   An instance of FD is associated with zero or more LTP objects via the
   "FdAggregatesLtps" composition.

4.2.4. ForwardingDomain aggregating Links (FdEncompassesLinks)

   A ForwardingDomain can aggregate links. An example of
   ForwardingDomain Recursive Aggregation with Links is shows in section
   4.2.1 above.

   However, the FdAggregatesLink association is not modeled because this
   association can be inferred from the
   higherLevelFdContainsLowerLevelFd association together with the
   linkHasAssociatedFds association.

4.2.5. ForwardingDomain aggregating NEs

   A ForwardingDomain can aggregate Network Elements. An example of
   ForwardingDomain Recursive Aggregation with Links and NEs is shown in
   section 4.2.2 above.

   However, the FdAggregatesNe association is not modeled because this
   association can be inferred from higherLevelFdContainsLowerLevelFd
   association and together with the NeEncompassesFd association.

5. Detailed Description of the Topology Subset

   The two key classes related to Topology are the ForwardingDomain (FD)
   and the Link. For simple cases the FD represents the switching
   capability in the network and the Link represents adjacency. These
   are depicted in the context of other model classes in Figure 5-1.

   --------------------------------------------------------------------

Lam                   Expires November 12, 2016               [Page 18]
Internet-Draft   Usage of an IM for network topology           May 2016

   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I     Object Classes and Relationships in the Topology Subset      I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

    Figure 5-1 Object Classes and Relationships in the Topology Subset

   Figure 5-1 shows a lightweight view of the model omitting the
   attributes (where appropriate these will be described later in this
   section).

   The FD and Link will be described in detail later in the document.
   Figure 5-1 focuses on interrelationships and these will be the focus
   of this section. The figure shows that:

     -  An FD may be a subordinate part of a NetworkElement (NE) or may
        be larger than, and independent of, any NE.

     -  An FD may encompass lower level FDs. This may be such that:

          o  A FD directly contained in an NE is divided into smaller
             parts

          o  A FD not encompassed by an NE is divided into smaller
             parts some of which may be encompassed by NEs

          o  The FD represents the whole network

Lam                   Expires November 12, 2016               [Page 19]
Internet-Draft   Usage of an IM for network topology           May 2016

     -  An FD encompasses Links that interconnect any FDs encompassed
        by the FD

     -  A Link may aggregate Links in several ways

          o  In parallel where several links are considered as one

          o  In series where Links chain to form a Link of a greater
             span

               . Note that this case requires further development in
                  the model

     -  A Link has associated FDs that it interconnects

          o  A Link may interconnect 2 or more FDs

               . Note that it is usual for a Link to interconnect 2 FDs
                  but there are cases where many FDs may be
                  interconnected by a Link

     -  A Link has LinkPorts that represent the ports of the Link
        itself

          o  LinkPorts are especially relevant for multi-ended
             asymmetric Link

     -  A LinkPort aggregates LogicalTerminationPoints (LTPs) that
        bound the Link. The LTP represent a stack LayerProtocol
        terminations where the details of each is held in the
        LayerProtocol (LP). The LTP may be:

          o  Part of an NE

          o  Conceptually independent from any NE

     -  A LinkPort references LTPs on which the Link associated to the
        LE terminates

   Both the Link and FD are TopologicalEntities (an abstract class, i.e.
   a class that will never instantiate) and hence they can acquire

Lam                   Expires November 12, 2016               [Page 20]
Internet-Draft   Usage of an IM for network topology           May 2016

   contents from the conditional packages (_Pacs). The conditional
   packages provide all key topology properties.

5.1. Topological Entity

   As noted in the previous section the two key topology classes are
   Forwarding Domain (FD) and Link (L).

   The FD topological component is used to show the potential to enable
   forwarding. At the lowest level of recursion, an FD (within a network
   element (NE)) represents a switch matrix (e.g., a fabric). Note that
   an NE can encompass multiple switch matrices (FDs).

   As noted earlier the Link models adjacency between two or more
   Forwarding Domains (FD).

   Both the link and the FD have the potential to handle more than one
   layerProtocol (both have a layerProtocolNameList attribute).

   As shown in Figure 5-1 an object class "TopologicalEntity" has been
   defined to collect topology-related properties (characteristics etc.)
   that are common for FD and Link.

   A TopologicalEntity is an abstract representation of the emergent
   effect of the combined functioning of an arrangement of components
   (running hardware, software running on hardware, etc). The effect can
   be considered as the realization of the potential for apparent
   communication adjacency for entities that are bound to the
   terminations at the boundary of the TopologicalEntity.

   The TopologicalEntity enables the creation of constrained forwarding
   to achieve the apparent adjacency. The apparent adjacency has
   intended performance degraded from perfect adjacency and a statement
   of that degradation is conveyed via the attributes of the packages
   associated with this class. In the model both ForwardingDomain and
   Link are TopologicalEntities.

   This abstract class is used as a modeling approach to apply packages
   of attributes to both Link and ForwardingDomain. Link and
   ForwardingDomain are the key TopologicalEntities.

Lam                   Expires November 12, 2016               [Page 21]
Internet-Draft   Usage of an IM for network topology           May 2016

5.2. Characteristics of Topological Entity

   As noted above the characteristic of a TopologicalEnity are covered
   by the conditional packages (_PACs).

   --------------------------------------------------------------------
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I           Conditional Packages of Topological Entity             I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

Lam                   Expires November 12, 2016               [Page 22]
Internet-Draft   Usage of an IM for network topology           May 2016

           Figure 5-2 Conditional Packages of Topological Entity

5.2.1. Risk (RiskParameter_Pac)

   The risk characteristics of a TopologicalEntity come directly from
   the underlying physical realization.

   The risk characteristics propagate from the physical realization to
   the client and from the server layer to the client layer, this
   propagation may be modified by protection.

   A TopologicalEntity may suffer degradation or failure as a result of
   a problem in a part of the underlying realization.

   The realization can be partitioned into segments which have some
   relevant common failure modes.

   There is a risk of failure/degradation of each segment of the
   underlying realization.

   Each segment is a part of a larger physical/geographical unit that
   behaves as one with respect to failure (i.e. a failure will have a
   high probability of impacting the whole unit (e.g. all fibers in the
   same cable).

   Disruptions to that larger physical/geographical unit will impact
   (cause failure/errors to) all TopologicalEntities that use any part
   of that larger physical/geographical entity.

   Any TopologicalEntity that uses any part of that larger
   physical/geographical unit will suffer impact and hence each
   TopologicalEntity shares risk.

   The identifier of each physical/geographical unit that is involved in
   the realization of each segment of a Topological entity can be listed
   in the RiskParameter_Pac of that TopologicalEntity.

   A segment has one or more risk characteristic.

   Shared risk between two TopologicalEntities compromises the integrity
   of any solution that use one of those TopologicalEntity as a backup
   for the other.

Lam                   Expires November 12, 2016               [Page 23]
Internet-Draft   Usage of an IM for network topology           May 2016

   Where two TopologicalEntities have a common risk characteristic they
   have an elevated probability of failing simultaneously compared to
   two TopologicalEntities that do not share risk characteristics.

     -  riskCharacteristicList: A list of risk characteristics
        (RiskCharacteristic) for consideration in an analysis of shared
        risk. Each element of the list represents a specific risk
        consideration.

     -  RiskCharacteristic: The information for a particular risk
        characteristic where there is a list of risk identifiers
        related to that characteristic. It includes:

          o  riskCharacteristicName: The name of the risk
             characteristic. The characteristic may be related to a
             specific degree of closeness. For example a particular
             characteristic may apply to failures that are localized
             (e.g. to one side of a road) where as another
             characteristic may relate to failures that have a broader
             impact (e.g. both sides of a road that crosses a bridge).
             Depending upon the importance of the traffic being routed
             different risk characteristics will be evaluated.

          o  riskIdentifierList: A list of the identifiers of each
             physical/geographic unit (with the specific risk
             characteristic) that is related to a segment of the
             TopologicalEntity.

5.2.2. TransferCost_Pac

   The cost characteristics of a TopologicalEntity not necessarily
   correlated to the cost of the underlying physical realization.

   They may be quite specific to the individual TopologicalEntity e.g.
   opportunity cost. Relates to layer capacity

   There may be many perspectives from which cost may be considered for
   a particular TopologicalEntity and hence many specifc costs and
   potentially cost algorithms.

   Using an entity will incur a cost.

Lam                   Expires November 12, 2016               [Page 24]
Internet-Draft   Usage of an IM for network topology           May 2016

     -  costCharcteristicList: The list of costs (CostCharacteristic)
        where each cost relates to some aspect of the Link

          o  CostCharcteristic: The information for a particular cost
             characteristic

               . costName: The cost characteristic will related to some
                  aspect of the TopologicalEntity (e.g. $ cost, routing
                  weight). This aspect will be conveyed by the costName

               . costValue: The specific cost.

               . costAlgorithm: The cost may vary based upon some
                  properties of the TopologicalEntity. The rules for the
                  variation are conveyed by the costAlgorithm.

5.2.3. TransferTiming_Pac

   A link will suffer effects from the underlying physical realization
   related to the timing of the information passed by the link.

     -  fixedLatencyCharacteristic: A TopologicalEntity suffers delay
        caused by the realization of the servers (e.g. distance
        related; FEC encoding etc.) along with some client specific
        processing. This is the total average latency effect of the
        TopologicalEntity

     -  jitterCharacteristic: High frequency deviation from true
        periodicity of a signal and therefore a small high rate of
        change of transfer latency. Applies to TDM systems (and not
        packet).

     -  wanderCharacteristics: Low frequency deviation from true
        periodicity of a signal and therefore a small low rate of
        change of transfer latency. Applies to TDM systems (and not
        packet).

     -  queuingLatencyList: The effect on the latency of a queuing
        process. This only has significant effect for packet based
        systems and has a complex characteristic (QueuingLatency).

Lam                   Expires November 12, 2016               [Page 25]
Internet-Draft   Usage of an IM for network topology           May 2016

          o  QueuingLatency: Provides information on latency
             characteristic for a particular stated trafficProperty.

5.2.4. TransferIntegrity_Pac

   Transfer integrity characteristic covers expected (specified) error,
   loss and duplicaion signal content as well as any damage of any form
   to total link and to the client signals.

     -  errorCharacteristic: describes the degree to which the signal
        propagated can be errored. Applies to TDM systems as the
        errored signal will be propagated and not packet as errored
        packets will be discarded.

     -  lossCharacteristic: Describes the acceptable characteristic of
        lost packets where loss may result from discard due to errors
        or overflow. Applies to packet systems and not TDM (as for TDM
        errored signals are propagated unless grossly errored and
        overflow/underflow turns into timing slips).

     -  repeatDeliveryCharacteristic: Primarily applies to packet
        systems where a packet may be delivered more than once (in
        fault recovery for example). It can also apply to TDM where
        several frames may be received twice due to switching in a
        system with a large differential propagation delay.

     -  deliveryOrderCharacteristic: Describes the degree to which
        packets will be delivered out of sequence. Does not apply to
        TDM as the TDM protocols maintain strict order.

     -  unavailableTimeCharacteristic: Describes the duration for which
        there may be no valid signal propagated.

     -  serverIntegrityProcessCharacteristic: Describes the effect of
        any server integrity enhancement process on the characteristics
        of the TopologicalEntity.

5.2.5. TransferCapcity_Pac

   The TopologicalEntity derives capacity from the underlying
   realization.

Lam                   Expires November 12, 2016               [Page 26]
Internet-Draft   Usage of an IM for network topology           May 2016

   A TopologicalEntity may be an abstraction and virtualization of a
   subset of the underlying capability offered in a view or may be
   directly reflecting the underlying realization.

   A TopologicalEntity may be directly used in the view or may be
   assigned to another view for use.

   The clients supported by a multi-layer TopologicalEntity may interact
   such that the resources used by one client may impact those available
   to another. This is derived from the LTP spec details.

   A TopologicalEntity represents the capacity available to user
   (client) along with client interaction and usage.

   A TopologicalEntity may reflect one or more client protocols and one
   or more members for each profile.

     -  totalPotentialCapacity: A "best case" view of the capacity of
        the TopologicalEntity assuming that any shared capacity is
        available to be taken.

   Note that this area is still under development to cover concepts such
   as:

     -  exclusiveCapacityList: The capacity allocated to this
        TopologicalEntity for its exclusive use

     -  sharedCapacityList: The capacity allocated to this
        TopologicalEntity that is not exclusively available as it is
        shared with others.

     -  assignedAsExclusiveCapacityList: The capacity assigned from
        this TopologicalEnity to another TopologicalEntity for its
        exclusive use

     -  assignedAsSharedCapacityList: The capacity assigned to one or
        more other TopologicalEntities for shared use where the
        interaction follows some stated algorithm.

     -  Capacity which includes:

Lam                   Expires November 12, 2016               [Page 27]
Internet-Draft   Usage of an IM for network topology           May 2016

          o  totalSize

          o  numberOfUsageInstances

          o  maximumUsageSize

          o  numberingRange

5.2.6. Validation_Pac

   Validation covers the various adjacenct discovery and reachability
   verification protocols. Also may cover Information source and degree
   of integrity.

     -  validationMechanismList: Provides details of the specific
        validation mechanism(s) used to confirm the presence of an
        intended topologicalEntity.

5.2.7. LayerProtocolTransition_Pac

   Relevant for a Link that is formed by abstracting one or more LTPs
   (in a stack) to focus on the flow and deemphasize the protocol
   transformation.

   This abstraction is relevant when considering multi-layer routing.

   The layer protocols of the LTP and the order of their application to
   the signal is still relevant and need to be accounted for. This is
   derived from the LTP spec details.

   This Pac provides the relevant abstractions of the LTPs and provides
   the necessary association to the LTPs involved.

   Links that included details in this Pac are often referred to as
   Transitional Links.

     -  transitionedLayerProtocolList: Provides the ordered structure
        of layer protocol transitions encapsulated in the
        TopologicalEntity. The ordering relates to the LinkEnd role.

Lam                   Expires November 12, 2016               [Page 28]
Internet-Draft   Usage of an IM for network topology           May 2016

6. Purpose Specific IM Example - Transport API Topology Service

   In order to provide some further clarity, this section provides a
   high level introduction to a Purpose Specific IM, the Transport API
   (T-API) Topology service, which has been derived from the ONF Common
   Information Model (ONF-CIM) according to the principles in [I-
   D.betts].

   The context of the T-API refers to the scope and control and naming
   that a particular SDN controller, manager or a client application has
   with respect to the information it operates on internally or
   exchanges over an interface.  The following sections further describe
   this purpose specific IM and relationship to the ONF-CIM.

6.1. T-API IM Constructs

   The T-API IM uses terminology that is considered to be more familiar
   to the transport network management community and maps to the
   constructs defined in the ONF-CIM CNM Topology model. The following
   table provides a high level summary of the mapping of the constructs
   relevant to the T-API Topology Service.

                   Mapping of CIM and T-API IM Constructs
              ONF-CIM CNM Terminology      T-API IM Terminology
           NetworkControlDomain         Context
                                      Topology                 ForwardingDomain (FD)        Node
                                      Link                 Link                       TransitionalLink
                                      NodeEdgePoint                 LogicalTerminationPoint (LTP) ServideEndPoint

   The following provides a brief description of these T-API IM
   constructs.

     o  Link: A Link is an abstract representation of the effective
        adjacency between two or more associated Nodes in a Topology.
        It is terminated by Node-Edge-Points of the associated Nodes.

     o  Node: A Node is an abstract representation of the forwarding-
        capabilities of a particular set of Network Resources. It is
        described in terms of an aggregation of set of ports (Node-

Lam                   Expires November 12, 2016               [Page 29]
Internet-Draft   Usage of an IM for network topology           May 2016

        Edge-Point) belonging to those Network Resources and the
        potential to enable forwarding of information between those
        edge ports.

     o  Node-Edge-Point: A Node-Edge-Point represents the inward
        network-facing aspects of the edge-port functions that access
        the forwarding capabilities provided by the Node. Hence it
        provides an encapsulation of addressing, mapping, termination,
        adaptation and OAM functions of one or more transport layers
        (including circuit and packet forms) performed at the entry and
        exit points of the Node.

     o  Topology: A Topology is an abstract representation of the
        topological-aspects of a particular set of Network Resources.
        It is described in terms of a network of set of Nodes and Links
        that enable the forwarding-capabilities of that particular set
        of Network Resources.

     o  Service-End-Point: A Service-End-Point represents the outward
        customer-facing aspects of the edge-port functions that access
        the forwarding capabilities provided by the Node. Hence it
        provides a limited, simplified view of interest to external
        clients (e.g. shared addressing, capacity, resource
        availability, etc) that enable the clients to request
        connectivity without the need to understand the provider
        network internals.

     o  Transitional Link: A topological component that consists of the
        link port at the edge of one node and a corresponding link port
        at the edge of another node that operates on different layers
        or whose layer is the same but with different Layer
        Information. A transitional link is supported/implemented by
        transport processing functions (e.g., adaptation/termination).
        A transitional link can be partitioned into parallel
        transitional links, or a concatenation of transitional links.
        It can also be partitioned into a concatenation of transitional
        links and zero or more links.

Lam                   Expires November 12, 2016               [Page 30]
Internet-Draft   Usage of an IM for network topology           May 2016

6.2. T-API Topology Service IM

   The resultant high-level description for the T-API Topology Service
   constructs, based upon the pruned and refactored ONF-CIM, and the
   related Topology Service APIs are provided in Figure 6-1 below.

   --------------------------------------------------------------------
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                    Topology Service Skeleton                       I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                     (only in PDF version)                        I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   I                                                                  I
   --------------------------------------------------------------------

                   Figure 6-1 Topology Service Skeleton

   The T-API Topology Service API enables the API client to, for
   example, retrieve Topology, Node, Link, and Edge-Point details.

Lam                   Expires November 12, 2016               [Page 31]
Internet-Draft   Usage of an IM for network topology           May 2016

     o  Topology details: returns attributes of the Topology identified
        by the provided input ID.  This includes references to lower-
        level Nodes and Links encompassed by that Topology. A NULL
        input value is expected to return the top-most Topology that
        corresponds to the scope of the entire Context including any
        Off-Network-Links.

     o  Node details: Returns attributes of the Node identified by the
        provided input ID.  Includes references to Node-Edge-Points
        aggregated by the Node, and attributes representing the
        identification, naming, states and forwarding capabilities of
        the Node.

     o  Link details: Returns attributes of the Link identified by the
        provided input ID.  Includes references to Node-Edge-Points
        terminating the Link, and references to the Nodes associated by
        the Link.

     o  Node-Edge-Point details: Returns attributes of the Node-Edge-
        Point identified by the provided input ID, including references
        to Service-End-Points mapped to this Node-Edge-Point.

   The API supports a retrieve-scope filter: LayerProtocol list. If
   set, the API call will return output that is relevant to the
   specified Layer only.

7. Usage of the IM Topology Subset regarding TE Topology DM

   As discussed earlier, a data model (DM) may be derived from an IM.
   Examples of YANG DMs derived according to automated translation tools
   based upon mapping guidelines are provided in [OSSDN SNOMASS] at
   https://github.com/OpenNetworkingFoundation/ONFOpenTransport/tree/dev
   elop/TransportAPI/YANG. It is possible to leverage the IM Topology
   Subset to assess the consistency and completeness of related YANG
   modules under development.

8. Security Considerations

   This informational document is intended only to provide a description
   of an interface-protocol-neutral information model, and the security
   concerns are therefore out of the scope of this document.

Lam                   Expires November 12, 2016               [Page 32]
Internet-Draft   Usage of an IM for network topology           May 2016

9. IANA Considerations

   This document includes no request to IANA.

10. Conclusions

   The information modeling described in this draft, which is relevant
   to Network Topology [ONF TR-512] [OSSDN SNOWMASS], can be leveraged
   in assessing the consistency and completeness of related YANG modules
   under development.

11. References

11.1. Normative References

    [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, March 1997.

11.2. Informative References

   [I-D.betts] Betts, M., Davis, N., Lam, K., Zeuner, B., Mansfield, S.
        and P. Doolan, "Framework for Deriving Interface Data Schema
        from UML Information Models", draft-betts-netmod-framework-
        data-schema-uml-03 (work in progress), March 2016

   [I-D.mansfield] Mansfield, S., Zeuner, B., Davis, N., Yun, X.,
        Tochio, Y., Lam, K. and E. Varma, "Guidelines for Translation
        of UML Information Model to YANG Data Model", draft-mansfield-
        netmod-uml-to-yang-02 (work in progress), March 2016

   [ONF TR-512] ONF TR-512 "ONF-CIM Core Model base document 1.1"
        (https://www.opennetworking.org/images/stories/downloads/sdn-
        resources/technical-reports/ONF-
        CIM_Core_Model_base_document_1.1.pdf) + Model 1.1
        (https://www.opennetworking.org/images/stories/downloads/sdn-
        resources/technical-reports/Model_1.1.zip), November 2015

   [OSSDN SNOWMASS] Open Source SDN SNOWMASS/Open Transport API
        Specifications
        (https://github.com/OpenNetworkingFoundation/ONFOpenTransport)

Lam                   Expires November 12, 2016               [Page 33]
Internet-Draft   Usage of an IM for network topology           May 2016

   [G.7711] Recommendation ITU-T G.7711/Y.17022 "Generic protocol-
           neutral information model for transport resources", August
           2015

   [G.852.2] Recommendation ITU-T G.852.2 "Enterprise viewpoint
           description of transport network resource model", March 1999

   [TMF612] TM Forum 612 "MTOSI Information Agreement", October 2014

12. Contributors

   Karthik Sethuraman
   NEC

   Email: karthik.sethuraman@necam.com

13. Acknowledgments

   This document was prepared using 2-Word-v2.0.template.dot.

Lam                   Expires November 12, 2016               [Page 34]
Internet-Draft   Usage of an IM for network topology           May 2016

Authors' Addresses

   Kam Lam
   Alcatel-Lucent, USA

   Phone: +1 732 331 3476
   Email: kam.lam@alcatel-lucent.com

   Eve Varma
   Alcatel-Lucent, USA

   Email: eve.varma@alcatel-lucent.com

   Paul Doolan
   Coriant, Germany

   Phone: +1 972 357 5822
   Email: paul.doolan@coriant.com

   Malcolm Betts
   ZTE, China

   Phone: +1 678 534 2542
   Email: malcolm.betts@zte.com.cn

   Nigel Davis
   Ciena, UK

   Email: ndavis@ciena.com

   Bernd Zeuner
   Deutsche Telekom,    Germany

   Phone: +49 6151 58 12086
   Email: b.zeuner@telekom.de

Lam                   Expires November 12, 2016               [Page 35]
Internet-Draft   Usage of an IM for network topology           May 2016

   Italo Busi
   Huawei, China

   Email: Italo.Busi@huawei.com

   Scott Mansfield
   Ericsson, Sweden

   Phone: 1 724 931 9316
   Email: scott.mansfield@ericsson.com

   Yuji Tochio
   Fujitsu, Japan

   Phone: 81 44 754 8829
   Email: tochio@jp.fujitsu.com

   Ricard Vilalta
   CTTC, Spain

   Phone:
   Email: ricard.vilalta@cttc.es

   Victor Lopez
   Telefonica, Spain

   Phone:
   Email: victor.lopezalvarez@telefonica.com

Lam                   Expires November 12, 2016               [Page 36]