<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-network-inventory-topology-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Inventory Topology Mapping">A YANG Network Data Model for Inventory Topology Mapping</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-06"/>
    <author fullname="Bo Wu" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="28"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG</workgroup>
    <keyword>Automation</keyword>
    <keyword>Network Digital Map</keyword>
    <keyword>Network Inventory</keyword>
    <keyword>Network Operation</keyword>
    <keyword>Network Topology</keyword>
    <abstract>
      <?line 54?>

<t>This document defines a YANG data model to
   map the network inventory data with the topology data
   to form a base underlay network. The data model facilitates the
   correlation between the layer (e.g.,  Layer 2 or Layer 3) topology information
   and the inventory data of the underlay network for better service
   provisioning, network maintenance operations, and other assessment scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Inventory YANG Working Group mailing list (inventory-yang@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-ivy-wg/network-inventory-topology"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-ivy-network-inventory-yang"/> defines the base network inventory
  model to aggregate the inventory data of Network Elements (NEs). This data includes identification of these NEs and their hardware,
  firmware, and software components.  Examples
   of inventory hardware components could be rack, shelf, slot, board,
   or physical port.  Examples of inventory software components could
   be platform Operating System (OS), software-modules, bios, or boot-loader <xref target="I-D.ietf-ivy-network-inventory-software"/>.</t>
      <t>In order to ease navigation from (or to) inventory and network topologies,
this document extends the network topology data model <xref target="RFC8345"/> for network
inventory mapping: "ietf-network-inventory-topology" (<xref target="sec-module"/>).  This data model provides a mechanism for the correlation with existing
network and topology data models, such as "A YANG Network Data Model for Service Attachment Points (SAPs)" <xref target="RFC9408"/>, "A YANG Data Model for Layer 2 Network Topologies" <xref target="RFC8944"/>, and "A YANG Data Model for Layer 3 Topologies" <xref target="RFC8346"/>.</t>
      <t>Similar to the base inventory data model  <xref target="I-D.ietf-ivy-network-inventory-yang"/>, the network inventory topology
does not make any assumption about involved NEs and their roles in topologies. As such, the mapping
model can be applied independent of the network type (optical local loops, access network, core network, etc.) and application.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
          </li>
        </ul>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>AAAA --&gt; the assigned RFC number for <xref target="I-D.ietf-ivy-network-inventory-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The meanings of the symbols in the YANG tree diagrams are defined in <xref target="RFC8340"/>.</t>
      <t>This document uses terms defined in <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
    </section>
    <section anchor="sample">
      <name>Sample Use Cases of the Data Model</name>
      <section anchor="determine-available-resources-of-service-attachment-points-saps">
        <name>Determine Available Resources of Service Attachment Points (SAPs)</name>
        <t>The inventory topology data model can be used as a basis for correlating
   underlay information, such as physical port components.  <xref target="nwi-topology-usage"/> exemplifies this usage.</t>
        <t>During service provisioning, to check available physical port
   resources, the SAPs information can be
   associated with the underlay inventory information and interface
   information associated with the inventory topology, e.g.,
   "parent-termination-point" of SAP Model can be associated with the
   "port-component-ref" of the inventory topology data model,
   which can be used to check the availability and capacity of physical
   ports.</t>
        <figure anchor="nwi-topology-usage">
          <name>An Example Usage of Network Inventory Topology</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="432" viewBox="0 0 432 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,288 L 32,320" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,64" fill="none" stroke="black"/>
                <path d="M 136,112 L 136,160" fill="none" stroke="black"/>
                <path d="M 136,208 L 136,256" fill="none" stroke="black"/>
                <path d="M 192,160 L 192,208" fill="none" stroke="black"/>
                <path d="M 208,64 L 208,112" fill="none" stroke="black"/>
                <path d="M 208,256 L 208,288" fill="none" stroke="black"/>
                <path d="M 224,160 L 224,208" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,64" fill="none" stroke="black"/>
                <path d="M 280,112 L 280,160" fill="none" stroke="black"/>
                <path d="M 280,208 L 280,256" fill="none" stroke="black"/>
                <path d="M 384,288 L 384,320" fill="none" stroke="black"/>
                <path d="M 136,32 L 280,32" fill="none" stroke="black"/>
                <path d="M 136,64 L 280,64" fill="none" stroke="black"/>
                <path d="M 136,112 L 280,112" fill="none" stroke="black"/>
                <path d="M 136,160 L 280,160" fill="none" stroke="black"/>
                <path d="M 136,208 L 280,208" fill="none" stroke="black"/>
                <path d="M 136,256 L 280,256" fill="none" stroke="black"/>
                <path d="M 32,288 L 384,288" fill="none" stroke="black"/>
                <path d="M 32,320 L 384,320" fill="none" stroke="black"/>
                <g class="text">
                  <text x="212" y="52">Customer</text>
                  <text x="36" y="84">Customer</text>
                  <text x="104" y="84">Service</text>
                  <text x="164" y="84">Models</text>
                  <text x="52" y="100">(e.g.,</text>
                  <text x="104" y="100">L3SM,</text>
                  <text x="152" y="100">L2SM)</text>
                  <text x="200" y="132">Service</text>
                  <text x="208" y="148">Orchestration</text>
                  <text x="56" y="196">SAP</text>
                  <text x="104" y="196">Network</text>
                  <text x="160" y="196">Model</text>
                  <text x="272" y="196">Inventory</text>
                  <text x="348" y="196">Topology</text>
                  <text x="408" y="196">Model</text>
                  <text x="208" y="228">Network</text>
                  <text x="204" y="244">Controller</text>
                  <text x="208" y="308">Network</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                        +-----------------+
                        |     Customer    |
                        +--------+--------+
        Customer Service Models  |
           (e.g., L3SM, L2SM)    |
                        +--------+--------+
                        |    Service      |
                        |  Orchestration  |
                        +------+---+------+
                               |   |
             SAP Network Model |   | Inventory Topology Model
                        +------+---+------+
                        |     Network     |
                        |   Controller    |
                        +--------+--------+
                                 |
           +---------------------+---------------------+
           |                  Network                  |
           +-------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="what-if-scenarios">
        <name>"What-if" Scenarios</name>
        <t><xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> defines Network Digital Twin (NDT)
   as a virtual representation of the physical network.  Such
    representation is meant to be used to analyze,
   diagnose, emulate, and then manage the physical network based on
   data, models, and interfaces.</t>
        <t><xref target="I-D.ietf-nmop-simap-concept"/> defines Service and Infrastructure Maps (SIMAP)
 as an abstraction model that provides a unified view of both service and
 infrastructure information, enabling correlation between service requirements
 and underlying resource capabilities.</t>
        <t>Both architectures require accurate mapping between logical network topology
 and physical inventory as a foundational data layer. This model provides
 the essential physical resource information to such systems, enabling
 them to perform accurate "what-if" analysis (e.g., impact prediction
 of hardware EOL, path re-optimization under resource constraints, service
 availability assessment).</t>
      </section>
    </section>
    <section anchor="module-tree-structure">
      <name>Module Tree Structure</name>
      <t>An overview of the structure of the "ietf-network-inventory-topology" module is shown in <xref target="tree"/>.</t>
      <figure anchor="tree">
        <name>The Structure of the Network Inventory Mapping Data Model</name>
        <artwork type="ascii-art" align="center"><![CDATA[
module: ietf-network-inventory-topology
  augment /nw:networks/nw:network/nw:node:
    +--rw inventory-mapping-attributes
       +--rw ne-ref?   nwi:ne-ref
  augment /nw:networks/nw:network/nt:link:
    +--rw inventory-mapping-attributes
       +--rw link-type?   string
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw inventory-mapping-attributes
       +--rw ne-ref?          nwi:ne-ref
       +--rw port-ref?        leafref
       +--ro port-breakout!
          +--ro breakout-channel* [channel-id]
             +--ro channel-id    uint16

]]></artwork>
      </figure>
      <t>The module defines two features "inventory-to-topology-navigate" and "topology-to-inventory-navigate"
to control the navigation direction (from topology to inventory and vice versa).</t>
      <t>The module augments the "ietf-network-topology" module as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Inventory mapping attributes for nodes, links, and termination
      points: The corresponding containers augments the topology module
      with the references to the base network inventory  </t>
          <t>
The inventory topology
 model associates inventory data with overlay topologies.  It can be
 used as the "supporting-networks" of SAP, Layer 2, or Layer 3
 topologies.</t>
        </li>
      </ul>
      <section anchor="link-extensions">
        <name>Link Extensions</name>
        <t>This document adds a lightweight "link-type" leaf to the topology link mapping to enable basic physical media classification.</t>
        <ul spacing="normal">
          <li>
            <t>"link-type" – A string indicating the link media type, such as
 "copper", "fiber", or "coax". For wireless media, values such as "microwave", or "wifi" may be used</t>
          </li>
        </ul>
        <t>The "link-type" serves as a lightweight discriminator that guides to the
 appropriate specialized inventory model for detailed resource information.
 For example, wired media (fiber, copper) typically reference a passive
 network inventory model, such as the one defined in <xref target="I-D.ygb-ivy-passive-network-inventory"/>.</t>
      </section>
      <section anchor="port-breakout-capability">
        <name>Port-Breakout Capability</name>
        <t>High-density Ethernet ports (e.g., 400 Gb/s DR4) can be split into
multiple independent lower-speed channels. The breakout channels
represent the intrinsic capability of the port to be partitioned,
regardless of whether the port is currently configured as a trunk or as
a breakout port.</t>
        <t>A trunk port is associated with exactly one physical interface.
A breakout port is a port that is decomposed into two or more physical
interfaces; those interfaces may run at the same or different speeds
and may consume the same or a different number of breakout channels.</t>
        <t>The container "port-breakout" is added under the termination-point
augmentation.  It lists the logical channels into which the single
physical port can be divided.  Only termination-points whose parent
port is breakout-capable need to instantiate the container; otherwise
the container is omitted, keeping the topology model minimal for the
common non-breakout case.</t>
        <t>Breakout channel is an atomic resource element obtained by partitioning a breakout port.
One physical interface may be associated with one or more breakout
channels, but one breakout channel MUST NOT be associated with more
than one physical interface. Appendix B provides example configurations.</t>
        <t>It is assumed that a port which supports breakout can be configured
either as a trunk port or as a breakout port. Interface channelisation (e.g., VLAN sub-interfaces) is outside the scope of this document and is addressed by the Layer 2 network topology model <xref target="RFC8944"/>.</t>
      </section>
    </section>
    <section anchor="sec-module">
      <name>Network Inventory Topology YANG Module</name>
      <t>This module augments the Network Topology <xref target="RFC8345"/>.</t>
      <t>This module imports the base network inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <sourcecode type="yang" markers="true" name="ietf-network-inventory-topology@2026-02-28.yang"><![CDATA[
module ietf-network-inventory-topology {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology";
  prefix nwit;

  import ietf-network {
    prefix nw;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies,
                 Section 4.1";
  }
  import ietf-network-topology {
    prefix nt;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies,
                 Section 4.2";
  }
  import ietf-network-inventory {
    prefix nwi;
    reference
      "RFC AAAA: A YANG Data Model for Network Inventory";
  }

  organization
    "IETF Network Inventory YANG (ivy) Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/ivy>
     WG List:  IVY <mailto:inventory-yang@ietf.org>

     Editor: Bo Wu
             <lana.wubo@huawei.com>
     Editor: Mohamed Boucadair
             <mohamed.boucadair@orange.com>
     Author: Cheng Zhou
             <zhouchengyjy@chinamobile.com>
     Author: Qin Wu
             <bill.wu@huawei.com>";
  description
    "This YANG module defines a YANG module for network
     topology and inventory mapping.

     Copyright (c) 2026 IETF Trust and the persons identified
     as authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.";

  revision 2026-02-28 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A Network Data Model for Inventory Topology
                 Mapping";
  }

  // Groupings
  // Node Grouping with 1:1 mapping to NE

  grouping node-inventory-mapping-attributes {
    description
      "Attributes for mapping a topology node to a Network Element
       (NE) in the physical inventory.";
    container inventory-mapping-attributes {
      description
        "Container for inventory mapping attributes of a node.";
      leaf ne-ref {
        type nwi:ne-ref;
        description
          "Reference to the NE in the inventory that corresponds to
           this topology node.

           This reference establishes a 1:1 mapping between the
           logical node and its physical NE.";
      }
    }
  }

  // TP Grouping with 1:1 mapping to physical port

  grouping tp-inventory-mapping-attributes {
    description
      "Attributes for mapping a topology termination point (TP)
       to a physical port in the network inventory.";
    container inventory-mapping-attributes {
      description
        "Container for inventory mapping attributes of a TP.";
      uses nwi:port-ref {
        refine "port-ref" {
          description
            "Reference to the physical port component in the
             network inventory. This reference establishes a 1:1
             mapping between the logical TP and its physical port
             component.";
        }
      }
      // breakout channels (lightweight, per physical port)
      container port-breakout {
        presence "Indicates the port supports channel breakout.";
        config false;
        description
          "Breakout capability of the physical port represented by
           this TP. One TP maps to one physical port; channels are
           listed here. This container is present only when the
           underlying hardware supports partitioning the port into
           multiple independent channels (e.g., 400G to 4x100G).";
        list breakout-channel {
          key "channel-id";
          description
            "List of breakout channels available on this port.
             Each entry represents an independent lane or sub-port
             that can be used for channelized interfaces.";
          leaf channel-id {
            type uint16;
            description
              "Unique identifier for the breakout channel within the
               scope of the parent port.";
          }
        } // breakout-channel
      } // port-breakout
    }
  }

  // Link Grouping  with placeholder for future augumentation

  grouping link-inventory-mapping-attributes {
    description
      "Attributes for classifying link media type.
       Detailed inventory reference is intentionally omitted from
       this model; implementations should use the appropriate
       specialized inventory modules based on the indicated
       link-type.";
    container inventory-mapping-attributes {
      description
        "Container for inventory-related attributes of a link.

         This container provides lightweight media classification.
         The link-type indicates which specialized inventory model
         contains detailed resource information:

         - Wired media (fiber, copper): passive network inventory
         - Wireless media (microwave, Wi-Fi): wireless-specific
           inventory

           Detailed inventory references may be added in future
           modules.";
      leaf link-type {
        type string;
        description
          "Classification of the link media type at the topology
           layer. Example values include 'copper', 'fiber',
           'microwave', or 'wifi'.";
      }
    }
  }

  // Main blocks

  augment "/nw:networks/nw:network/nw:node" {
    description
      "Augments the network topology node with inventory mapping
       attributes. This enables correlation between the logical node
       and its physical network element.";
    uses node-inventory-mapping-attributes;
  }

  augment "/nw:networks/nw:network/nt:link" {
    description
      "Augments the network topology link with inventory-related
       attributes.";
    uses link-inventory-mapping-attributes;
  }

  augment "/nw:networks/nw:network/nw:node/nt:termination-point" {
    description
      "Augments the TP with inventory mapping attributes for
       physical port correlation and breakout capability reporting.";
    uses tp-inventory-mapping-attributes;
  }
}
]]></sourcecode>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This model enables a network controller to report discovered network topology and inventory information. Automatic discovery serves as the primary mechanism, with selective configuration capabilities provided for scenarios where discovery is not feasible.</t>
      <t>For typical operations such as service provisioning and network planning, the model offers read-only query access to authoritative mappings between logical topology and physical inventory.
The inventory-mapping-attributes containers are defined as read-write (config true) to accommodate cases where automatic discovery is not possible, including:</t>
      <ul spacing="normal">
        <li>
          <t>Customer-premises equipment (CPE) outside the operator's management domain</t>
        </li>
        <li>
          <t>Leased lines and third-party transport resources</t>
        </li>
        <li>
          <t>Planned or hypothetical resources for future deployment</t>
        </li>
      </ul>
      <t>In these cases, the operator manually configures the mapping to maintain accurate topology-to-inventory correlation.</t>
      <t>The following nodes are read-only (config false) as they represent hardware-determined state:</t>
      <t>port-breakout: Hardware capability determined by physical port characteristics</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section is modeled after the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The "ietf-network-inventory-topology" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management (1) have to
use a secure transport layer (e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and
QUIC {{?RFC9000]) and (2) have to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., "config true", which is the
   default).  All writable data nodes are likely to be sensitive or
   vulnerable in some network environments.  Write
   operations (e.g., edit-config) and delete operations to these data
   nodes without proper protection or authentication can have a negative
   effect on network operations.  The following subtrees and data nodes
   have particular sensitivities/vulnerabilities:</t>
      <t>'ne-ref', 'port-ref', 'link-type':
  These nodes are sensitive as they establish the mapping
  between logical topology and physical inventory. Unauthorized
  modification could lead to incorrect resource allocation or
  service disruption.</t>
      <t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
      <t>'ne-ref':
   The references may be used to track the set of network elements. While
   read-only, they may reveal network infrastructure details.</t>
      <t>'port-breakout':
   This node exposes hardware capabilities.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
   the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
   Name:  ietf-network-inventory-topology
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology
   Prefix:  nwit
   Maintained by IANA?  N
   Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-14"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-software">
          <front>
            <title>A YANG Network Data Model of Network Inventory Software Extensions</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document extends the base Network Inventory YANG model to
   support non-physical network elements (NEs), such as controllers,
   virtual routers, and virtual firewalls, as well as software
   components like platform operating systems and software modules.  In
   addition to the software revisions and patches already defined in the
   base model, this extension introduces software status and time stamp
   information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-software-02"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   Digital Twin technology has seen rapid adoption in Industry 4.0.  The
   application of Digital Twin technology in the networking field is
   meant to develop various rich network applications, realize efficient
   and cost-effective data-driven network management, and accelerate
   network innovation.

   This document presents an overview of the concepts of Network Digital
   Twin, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-12"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-simap-concept">
          <front>
            <title>SIMAP: Concept, Requirements, and Use Cases</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Everything OPS</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   This document defines the concept of Service &amp; Infrastructure Maps
   (SIMAP) and identifies a set of SIMAP requirements and use cases.
   The SIMAP was previously known as Digital Map.

   The document intends to be used as a reference for the assessment of
   the various topology modules to meet SIMAP requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-08"/>
        </reference>
        <reference anchor="I-D.ygb-ivy-passive-network-inventory">
          <front>
            <title>A YANG Data Model for Passive Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohammad Boroon" initials="M." surname="Boroon">
              <organization>Highstreet</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="tom van caenegem" initials="T." surname="van caenegem">
              <organization>Nokia</organization>
            </author>
            <author fullname="Swaminathan 1. S." initials="S. 1." surname="S.">
              <organization>Nokia</organization>
            </author>
            <author fullname="Swaminathan B." initials="S." surname="B.">
              <organization>Nokia</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Mauro Tilocca" initials="M." surname="Tilocca">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Brad Peters" initials="B." surname="Peters">
              <organization>NBN</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <author fullname="LIUYUCONG" initials="" surname="LIUYUCONG">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Avinash Sakalabhaktula" initials="A." surname="Sakalabhaktula">
              <organization>Radisys</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   This document presents a YANG data model for tracking and managing
   passive network inventory.  The model enhances the base model
   outlined in [I-D.draft-ietf-ivy-network-inventory-yang] and is
   intended for use in the northbound interface of a domain controller
   as defined in [RFC8453].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ygb-ivy-passive-network-inventory-03"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
      </references>
    </references>
    <?line 522?>

<section anchor="link-type-usage-examples">
      <name>"link-type" Usage Examples</name>
      <t>This appendix provides examples illustrating the usage of the
 link-type data node.</t>
      <t>Scenario: Device SW-1 and device SW-2 are directly connected by a fiber.</t>
      <t>Physical topology:</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="456" viewBox="0 0 456 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
            <path d="M 80,32 L 80,96" fill="none" stroke="black"/>
            <path d="M 376,32 L 376,96" fill="none" stroke="black"/>
            <path d="M 448,32 L 448,96" fill="none" stroke="black"/>
            <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
            <path d="M 376,32 L 448,32" fill="none" stroke="black"/>
            <path d="M 80,62 L 152,62" fill="none" stroke="black"/>
            <path d="M 80,66 L 152,66" fill="none" stroke="black"/>
            <path d="M 256,62 L 376,62" fill="none" stroke="black"/>
            <path d="M 256,66 L 376,66" fill="none" stroke="black"/>
            <path d="M 8,96 L 80,96" fill="none" stroke="black"/>
            <path d="M 376,96 L 448,96" fill="none" stroke="black"/>
            <g class="text">
              <text x="44" y="68">[SW-1]</text>
              <text x="184" y="68">fiber</text>
              <text x="228" y="68">link</text>
              <text x="412" y="68">[SW-2]</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
+--------+                                    +--------+
|        |                                    |        |
| [SW-1] +========= fiber link ===============+ [SW-2] |
|        |                                    |        |
+--------+                                    +--------+
]]></artwork>
      </artset>
      <t>Key parts of the JSON example is as follows:</t>
      <artwork type="ascii-art"><![CDATA[
{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "campus-topology",
        "node": [
          {
            "node-id": "SW-1",
            "ietf-network-inventory-topology:inventory-mapping-attributes": {
              "ne-ref": "NE-SW1"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "TP-SW1-P1",
                "ietf-network-inventory-topology:inventory-mapping-attributes": {
                  "ne-ref": "NE-SW1",
                  "port-ref": "/nwi:network-inventory/nwi:network-elements/nwi:network-element[ne-id='NE-SW1']/nwi:components/nwi:component[component-id='eth-port-1']"
                }
              }
            ]
          },
          {
            "node-id": "SW-2",
            "ietf-network-inventory-topology:inventory-mapping-attributes": {
              "ne-ref": "NE-SW2"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "TP-SW2-P1",
                "ietf-network-inventory-topology:inventory-mapping-attributes": {
                  "ne-ref": "NE-SW2",
                  "port-ref": "/nwi:network-inventory/nwi:network-elements/nwi:network-element[ne-id='NE-SW2']/nwi:components/nwi:component[component-id='eth-port-1']"
                }
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "Link-SW1-SW2",
            "source": {
              "source-node": "SW-1",
              "source-tp": "TP-SW1-P1"
            },
            "destination": {
              "dest-node": "SW-2",
              "dest-tp": "TP-SW2-P1"
            },
            "ietf-network-inventory-topology:inventory-mapping-attributes": {
              "link-type": "fiber"
            }
          }
        ]
      }
    ]
  }
}
]]></artwork>
    </section>
    <section anchor="json-example-of-an-mpo-breakout-channel-port">
      <name>JSON Example of an MPO Breakout-Channel Port</name>
      <t>This appendix provides an example of a 400 Gb/s DR4 port that is physically implemented as four independent 100 Gb/s lanes (an MPO breakout). The lanes are exposed as breakout-channel entries so that the port can later be configured as either a single 400G trunk or four 100G breakout interfaces. The instance data below shows the minimal JSON encoding <xref target="RFC7951"/> of the "port-breakout" container for this port.</t>
      <artwork type="ascii-art"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network-topology:networks": {
    "network": [
      {
        "network-id": "example:underlay-topology-400g",
        "node": [
          {
            "node-id": "example:n1",
            "termination-point": [
              {
                "tp-id": "example:400g-1/0/1",
                "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
                  "ne-ref": "example:NE-1",
                  "port-ref": "example:port-1",
                  "port-breakout": {
                    "breakout-channel": [
                      { "channel-id": 1 },
                      { "channel-id": 2 },
                      { "channel-id": 3 },
                      { "channel-id": 4 }
                    ]
                  }
                }
              }
            ]
          }
        ]
      }
    ]
  }
}
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank Italo Busi, Olga Havel, Aihua Guo, Oscar
   Gonzalez de Dios, and many others for their helpful comments and
   suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Chaode Yu">
        <organization>Huawei</organization>
        <address>
          <email>yuchaode@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
