| < draft-ietf-detnet-yang-13.txt | draft-ietf-detnet-yang-14.txt > | |||
|---|---|---|---|---|
| Network Working Group X. Geng | Network Working Group X. Geng | |||
| Internet-Draft Huawei Technologies | Internet-Draft Huawei Technologies | |||
| Intended status: Standards Track Y. Ryoo | Intended status: Standards Track Y. Ryoo | |||
| Expires: 7 April 2022 ETRI | Expires: 25 April 2022 ETRI | |||
| D. Fedyk | D. Fedyk | |||
| LabN Consulting, L.L.C. | LabN Consulting, L.L.C. | |||
| R. Rahman | R. Rahman | |||
| Individual | Individual | |||
| Z. Li | Z. Li | |||
| China Mobile | China Mobile | |||
| 4 October 2021 | 22 October 2021 | |||
| Deterministic Networking (DetNet) YANG Model | Deterministic Networking (DetNet) YANG Model | |||
| draft-ietf-detnet-yang-13 | draft-ietf-detnet-yang-14 | |||
| Abstract | Abstract | |||
| This document contains the specification for the Deterministic | This document contains the specification for the Deterministic | |||
| Networking YANG Model for configuration and operational data for | Networking YANG Model for configuration and operational data for | |||
| DetNet Flows. The model allows for provisioning of end-to-end DetNet | DetNet Flows. The model allows for provisioning of end-to-end DetNet | |||
| service on devices along the path without dependency on any signaling | service on devices along the path without dependency on any signaling | |||
| protocol. It also specifies operational status for flows. An | protocol. It also specifies operational status for flows. An | |||
| operator or network controller programs the configuration of the | operator or network controller programs the configuration of the | |||
| devices. | devices. | |||
| The YANG module defined in this document conforms to the Network | The YANG module defined in this document conforms to the Network | |||
| Management Datastore Architecture (NMDA). | Management Datastore Architecture (NMDA). | |||
| Requirements Language | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | ||||
| "OPTIONAL" in this document are to be interpreted as described in BCP | ||||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | ||||
| capitals, as shown here. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 7 April 2022. | This Internet-Draft will expire on 25 April 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
| extracted from this document must include Simplified BSD License text | extracted from this document must include Simplified BSD License text | |||
| as described in Section 4.e of the Trust Legal Provisions and are | as described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Simplified BSD License. | provided without warranty as described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 4. DetNet YANG Module . . . . . . . . . . . . . . . . . . . . . 4 | 4. DetNet YANG Module . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 4.1. DetNet Application Flow YANG Attributes . . . . . . . . . 5 | 4.1. DetNet Application Flow YANG Attributes . . . . . . . . . 5 | |||
| 4.2. DetNet Service Sub-layer YANG Attributes . . . . . . . . 5 | 4.2. DetNet Service Sub-layer YANG Attributes . . . . . . . . 5 | |||
| 4.3. DetNet Forwarding Sub-layer YANG Attributes . . . . . . . 5 | 4.3. DetNet Forwarding Sub-layer YANG Attributes . . . . . . . 5 | |||
| 5. DetNet Flow Aggregation . . . . . . . . . . . . . . . . . . . 6 | 5. DetNet Flow Aggregation . . . . . . . . . . . . . . . . . . . 6 | |||
| 6. DetNet YANG Structure Considerations . . . . . . . . . . . . 7 | 6. DetNet YANG Structure Considerations . . . . . . . . . . . . 7 | |||
| 7. DetNet Configuration YANG Structures . . . . . . . . . . . . 8 | 7. DetNet Configuration YANG Structures . . . . . . . . . . . . 8 | |||
| 8. DetNet Configuration YANG Model . . . . . . . . . . . . . . . 9 | 8. DetNet Configuration YANG Model . . . . . . . . . . . . . . . 9 | |||
| 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 39 | 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 38 | |||
| 10. Security Considerations . . . . . . . . . . . . . . . . . . . 40 | 10. Security Considerations . . . . . . . . . . . . . . . . . . . 39 | |||
| 11. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 40 | 11. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 39 | |||
| 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 41 | 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 40 | |||
| 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 41 | 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 40 | |||
| 13.1. Normative References . . . . . . . . . . . . . . . . . . 41 | 13.1. Normative References . . . . . . . . . . . . . . . . . . 40 | |||
| 13.2. Informative References . . . . . . . . . . . . . . . . . 42 | 13.2. Informative References . . . . . . . . . . . . . . . . . 41 | |||
| Appendix A. DetNet Configuration YANG Tree . . . . . . . . . . . 43 | Appendix A. DetNet Configuration YANG Tree . . . . . . . . . . . 42 | |||
| Appendix B. Examples . . . . . . . . . . . . . . . . . . . . . . 52 | Appendix B. Examples . . . . . . . . . . . . . . . . . . . . . . 51 | |||
| B.1. Example A-1 JSON Configuration/Operational . . . . . . . 52 | B.1. Example A-1 JSON Configuration/Operational . . . . . . . 51 | |||
| B.2. Example B-1 XML Config: Aggregation using a Forwarding | B.2. Example B-1 XML Config: Aggregation using a Forwarding | |||
| Sub-layer . . . . . . . . . . . . . . . . . . . . . . . . 57 | Sub-layer . . . . . . . . . . . . . . . . . . . . . . . . 56 | |||
| B.3. Example B-2 JSON Service Aggregation Configuration . . . 61 | B.3. Example B-2 JSON Service Aggregation Configuration . . . 60 | |||
| B.4. Example C-1 JSON Relay Aggregation/Disaggregation | B.4. Example C-1 JSON Relay Aggregation/Disaggregation | |||
| Configuration . . . . . . . . . . . . . . . . . . . . . . 67 | Configuration . . . . . . . . . . . . . . . . . . . . . . 66 | |||
| B.5. Example C-2 JSON Relay Aggregation Service Sub-Layer . . 83 | B.5. Example C-2 JSON Relay Aggregation Service Sub-Layer . . 83 | |||
| B.6. Example C-3 JSON Relay Service Sub-Layer Aggregation/ | B.6. Example C-3 JSON Relay Service Sub-Layer Aggregation/ | |||
| Disaggregation . . . . . . . . . . . . . . . . . . . . . 96 | Disaggregation . . . . . . . . . . . . . . . . . . . . . 95 | |||
| B.7. Example C-4 JSON Relay Service Sub-Layer Aggregation/ | B.7. Example C-4 JSON Relay Service Sub-Layer Aggregation/ | |||
| Disaggregation . . . . . . . . . . . . . . . . . . . . . 110 | Disaggregation . . . . . . . . . . . . . . . . . . . . . 109 | |||
| B.8. Example D-1 JSON Transit Forwarding Sub-Layer Aggregation/ | B.8. Example D-1 JSON Transit Forwarding Sub-Layer Aggregation/ | |||
| Disaggregation . . . . . . . . . . . . . . . . . . . . . 126 | Disaggregation . . . . . . . . . . . . . . . . . . . . . 126 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 133 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 133 | |||
| 1. Introduction | 1. Introduction | |||
| DetNet (Deterministic Networking) provides a capability to carry | DetNet (Deterministic Networking) provides a capability to carry | |||
| specified unicast or multicast data flows for real-time applications | specified unicast or multicast data flows for real-time applications | |||
| with extremely low packet loss rates and assured maximum end-to-end | with extremely low packet loss rates and assured maximum end-to-end | |||
| delivery latency. A description of the general background and | delivery latency. A description of the general background and | |||
| skipping to change at page 9, line 49 ¶ | skipping to change at page 9, line 7 ¶ | |||
| +--rw name string | +--rw name string | |||
| +--rw traffic-profile? traffic-profile-ref | +--rw traffic-profile? traffic-profile-ref | |||
| +--rw operation? forwarding-operations | +--rw operation? forwarding-operations | |||
| +--rw incoming | +--rw incoming | |||
| | ... | | ... | |||
| +--rw outgoing | +--rw outgoing | |||
| ... | ... | |||
| 8. DetNet Configuration YANG Model | 8. DetNet Configuration YANG Model | |||
| The following model has references to RFCs [RFC4303], [RFC8349], | This YANG model imports typedefs from [RFC6991], [RFC8519], | |||
| [RFC8960], [RFC8964], and [IEEE8021Q]. | [RFC8294], [RFC8343], and [IEEE8021Q]. This YANG model also has the | |||
| folowing references to RFCs that are not in the document text body | ||||
| [RFC0791], [RFC4303], [RFC8349], [RFC8960], [RFC8964], and [RFC8200]. | ||||
| <CODE BEGINS> | <CODE BEGINS> file "ietf-detnet@2021-10-20.yang" | |||
| module ietf-detnet { | module ietf-detnet { | |||
| yang-version 1.1; | yang-version 1.1; | |||
| namespace "urn:ietf:params:xml:ns:yang:ietf-detnet"; | namespace "urn:ietf:params:xml:ns:yang:ietf-detnet"; | |||
| prefix dnet; | prefix dnet; | |||
| import ietf-yang-types { | import ietf-yang-types { | |||
| prefix yang; | prefix yang; | |||
| reference | reference | |||
| "RFC 6991 - Common YANG Data Types."; | "RFC 6991 - Common YANG Data Types."; | |||
| } | } | |||
| skipping to change at page 11, line 29 ¶ | skipping to change at page 10, line 35 ¶ | |||
| <mailto:reshad@yahoo.com> | <mailto:reshad@yahoo.com> | |||
| Editor: Mach Chen | Editor: Mach Chen | |||
| <mailto:mach.chen@huawei.com> | <mailto:mach.chen@huawei.com> | |||
| Editor: Zhenqiang Li | Editor: Zhenqiang Li | |||
| <mailto:lizhenqiang@chinamobile.com>"; | <mailto:lizhenqiang@chinamobile.com>"; | |||
| description | description | |||
| "This YANG module describes the parameters needed | "This YANG module describes the parameters needed | |||
| for DetNet flow configuration and flow status | for DetNet flow configuration and flow status | |||
| reporting. | reporting. This YANG module conforms to the Network | |||
| Management Datastore Architecture (NMDA). | ||||
| Copyright (c) 2021 IETF Trust and the persons identified as | Copyright (c) 2021 IETF Trust and the persons identified as | |||
| authors of the code. All rights reserved. | authors of the code. All rights reserved. | |||
| Redistribution and use in source and binary forms, with or | Redistribution and use in source and binary forms, with or | |||
| without modification, is permitted pursuant to, and subject to | without modification, is permitted pursuant to, and subject to | |||
| the license terms contained in, the Simplified BSD License set | the license terms contained in, the Simplified BSD License set | |||
| forth in Section 4.c of the IETF Trust's Legal Provisions | forth in Section 4.c of the IETF Trust's Legal Provisions | |||
| Relating to IETF Documents | Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info). | (https://trustee.ietf.org/license-info). | |||
| This version of this YANG module is part of RFC XXXX | This version of this YANG module is part of RFC XXXX | |||
| (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself | (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself | |||
| for full legal notices. | for full legal notices."; | |||
| The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL | ||||
| NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED', | ||||
| 'MAY', and 'OPTIONAL' in this document are to be interpreted as | ||||
| described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, | ||||
| they appear in all capitals, as shown here. "; | ||||
| revision 2021-10-04 { | revision 2021-10-20 { | |||
| description | description | |||
| "initial revision"; | "initial revision"; | |||
| reference | reference | |||
| "RFC XXXX: Deterministic Networking (DetNet) YANG Model"; | "RFC XXXX: Deterministic Networking (DetNet) YANG Model"; | |||
| } | } | |||
| identity app-status { | identity app-status { | |||
| description | description | |||
| "Base identity from which all application-status | "Base identity from which all application-status | |||
| status types are derived."; | status types are derived."; | |||
| skipping to change at page 19, line 51 ¶ | skipping to change at page 19, line 4 ¶ | |||
| } | } | |||
| grouping source-ip-port-id { | grouping source-ip-port-id { | |||
| description | description | |||
| "The TCP/UDP port(source/destination) identification | "The TCP/UDP port(source/destination) identification | |||
| information."; | information."; | |||
| container source-port { | container source-port { | |||
| uses packet-fields:port-range-or-operator; | uses packet-fields:port-range-or-operator; | |||
| description | description | |||
| "This grouping captures the source port fields."; | "This grouping captures the source port fields."; | |||
| } | ||||
| } | ||||
| } | } | |||
| grouping ip-flow-id { | grouping ip-flow-id { | |||
| description | description | |||
| "The IPv4/IPv6 packet header identification information."; | "The IPv4/IPv6 packet header identification information."; | |||
| leaf src-ip-prefix { | leaf src-ip-prefix { | |||
| type inet:ip-prefix; | type inet:ip-prefix; | |||
| description | description | |||
| "The source IP prefix."; | "The source IP prefix."; | |||
| reference | reference | |||
| skipping to change at page 24, line 51 ¶ | skipping to change at page 24, line 4 ¶ | |||
| case ip { | case ip { | |||
| leaf next-hop-address { | leaf next-hop-address { | |||
| type inet:ip-address-no-zone; | type inet:ip-address-no-zone; | |||
| description | description | |||
| "This is the IP flow type next hop."; | "This is the IP flow type next hop."; | |||
| } | } | |||
| } | } | |||
| case mpls { | case mpls { | |||
| uses rt-types:mpls-label-stack; | uses rt-types:mpls-label-stack; | |||
| } | } | |||
| } | ||||
| } | ||||
| } | } | |||
| } | } | |||
| } | } | |||
| } | } | |||
| grouping detnet-forwarding-next-hop-content { | grouping detnet-forwarding-next-hop-content { | |||
| description | description | |||
| "Generic parameters of DetNet next hops. This follows the | "Generic parameters of DetNet next hops. This follows the | |||
| principles for next hops in RFC 8349"; | principles for next hops in RFC 8349"; | |||
| choice next-hop-options { | choice next-hop-options { | |||
| skipping to change at page 25, line 52 ¶ | skipping to change at page 25, line 4 ¶ | |||
| "This is an IP address as a next hop."; | "This is an IP address as a next hop."; | |||
| } | } | |||
| } | } | |||
| case mpls-over-ip-encapsulation { | case mpls-over-ip-encapsulation { | |||
| uses ip-header; | uses ip-header; | |||
| } | } | |||
| } | } | |||
| } | } | |||
| case mpls { | case mpls { | |||
| uses rt-types:mpls-label-stack; | uses rt-types:mpls-label-stack; | |||
| } | ||||
| } | ||||
| } | } | |||
| } | } | |||
| case next-hop-list { | case next-hop-list { | |||
| description | description | |||
| "Container for multiple next hops."; | "Container for multiple next hops."; | |||
| list next-hop { | list next-hop { | |||
| key "hop-index"; | key "hop-index"; | |||
| description | description | |||
| "An entry in a next-hop list."; | "An entry in a next-hop list."; | |||
| leaf hop-index { | leaf hop-index { | |||
| skipping to change at page 40, line 22 ¶ | skipping to change at page 39, line 22 ¶ | |||
| Name: ietf-detnet | Name: ietf-detnet | |||
| Maintained by IANA: N | Maintained by IANA: N | |||
| Namespace: urn:ietf:params:xml:ns:yang:ietf-detnet | Namespace: urn:ietf:params:xml:ns:yang:ietf-detnet | |||
| Prefix: dnet | Prefix: dnet | |||
| Reference: This RFC when published. | Reference: This RFC when published. | |||
| 10. Security Considerations | 10. Security Considerations | |||
| Security considerations for DetNet are covered in the DetNet | Security considerations for DetNet are covered in the DetNet | |||
| Archtiecture [RFC8655]. | Archtiecture [RFC8655] and DetNet Security Considerations [RFC9055] . | |||
| The YANG modules specified in this document define a schema for data | The YANG modules specified in this document define a schema for data | |||
| that is designed to be accessed via network management protocols, | that is designed to be accessed via network management protocols, | |||
| such as NETCONF [RFC6241] or RESTCONF [RFC8040]. The lowest NETCONF | such as NETCONF [RFC6241] or RESTCONF [RFC8040]. The lowest NETCONF | |||
| layer is the secure transport layer, and the mandatory-to-implement | layer is the secure transport layer, and the mandatory-to-implement | |||
| secure transport is Secure Shell (SSH) [RFC6242]. The lowest | secure transport is Secure Shell (SSH) [RFC6242]. The lowest | |||
| RESTCONF layer is HTTPS, and the mandatory-to-implement secure | RESTCONF layer is HTTPS, and the mandatory-to-implement secure | |||
| transport is TLS [RFC8446]. | transport is TLS [RFC8446]. | |||
| The Network Configuration Access Control Model (NACM) [RFC8341] | The Network Configuration Access Control Model (NACM) [RFC8341] | |||
| skipping to change at page 41, line 15 ¶ | skipping to change at page 40, line 15 ¶ | |||
| 12. Acknowledgments | 12. Acknowledgments | |||
| The editors of this document would like to thank Lou Berger, Tom | The editors of this document would like to thank Lou Berger, Tom | |||
| Petch and Xufeng Lui for their detailed comments. | Petch and Xufeng Lui for their detailed comments. | |||
| 13. References | 13. References | |||
| 13.1. Normative References | 13.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | |||
| Requirement Levels", BCP 14, RFC 2119, | DOI 10.17487/RFC0791, September 1981, | |||
| DOI 10.17487/RFC2119, March 1997, | <https://www.rfc-editor.org/info/rfc791>. | |||
| <https://www.rfc-editor.org/info/rfc2119>. | ||||
| [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, | ||||
| DOI 10.17487/RFC3688, January 2004, | ||||
| <https://www.rfc-editor.org/info/rfc3688>. | ||||
| [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | |||
| RFC 4303, DOI 10.17487/RFC4303, December 2005, | RFC 4303, DOI 10.17487/RFC4303, December 2005, | |||
| <https://www.rfc-editor.org/info/rfc4303>. | <https://www.rfc-editor.org/info/rfc4303>. | |||
| [RFC6020] Bjorklund, M., Ed., "YANG - A Data Modeling Language for | [RFC6020] Bjorklund, M., Ed., "YANG - A Data Modeling Language for | |||
| the Network Configuration Protocol (NETCONF)", RFC 6020, | the Network Configuration Protocol (NETCONF)", RFC 6020, | |||
| DOI 10.17487/RFC6020, October 2010, | DOI 10.17487/RFC6020, October 2010, | |||
| <https://www.rfc-editor.org/info/rfc6020>. | <https://www.rfc-editor.org/info/rfc6020>. | |||
| [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | ||||
| and A. Bierman, Ed., "Network Configuration Protocol | ||||
| (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6241>. | ||||
| [RFC6242] Wasserman, M., "Using the NETCONF Protocol over Secure | ||||
| Shell (SSH)", RFC 6242, DOI 10.17487/RFC6242, June 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6242>. | ||||
| [RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types", | [RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types", | |||
| RFC 6991, DOI 10.17487/RFC6991, July 2013, | RFC 6991, DOI 10.17487/RFC6991, July 2013, | |||
| <https://www.rfc-editor.org/info/rfc6991>. | <https://www.rfc-editor.org/info/rfc6991>. | |||
| [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | |||
| RFC 7950, DOI 10.17487/RFC7950, August 2016, | RFC 7950, DOI 10.17487/RFC7950, August 2016, | |||
| <https://www.rfc-editor.org/info/rfc7950>. | <https://www.rfc-editor.org/info/rfc7950>. | |||
| [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | (IPv6) Specification", STD 86, RFC 8200, | |||
| <https://www.rfc-editor.org/info/rfc8040>. | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | ||||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8294] Liu, X., Qu, Y., Lindem, A., Hopps, C., and L. Berger, | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | "Common YANG Data Types for the Routing Area", RFC 8294, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | DOI 10.17487/RFC8294, December 2017, | |||
| <https://www.rfc-editor.org/info/rfc8294>. | ||||
| [RFC8341] Bierman, A. and M. Bjorklund, "Network Configuration | [RFC8343] Bjorklund, M., "A YANG Data Model for Interface | |||
| Access Control Model", STD 91, RFC 8341, | Management", RFC 8343, DOI 10.17487/RFC8343, March 2018, | |||
| DOI 10.17487/RFC8341, March 2018, | <https://www.rfc-editor.org/info/rfc8343>. | |||
| <https://www.rfc-editor.org/info/rfc8341>. | ||||
| [RFC8349] Lhotka, L., Lindem, A., and Y. Qu, "A YANG Data Model for | [RFC8349] Lhotka, L., Lindem, A., and Y. Qu, "A YANG Data Model for | |||
| Routing Management (NMDA Version)", RFC 8349, | Routing Management (NMDA Version)", RFC 8349, | |||
| DOI 10.17487/RFC8349, March 2018, | DOI 10.17487/RFC8349, March 2018, | |||
| <https://www.rfc-editor.org/info/rfc8349>. | <https://www.rfc-editor.org/info/rfc8349>. | |||
| [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | |||
| Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | |||
| <https://www.rfc-editor.org/info/rfc8446>. | <https://www.rfc-editor.org/info/rfc8446>. | |||
| [RFC8519] Jethanandani, M., Agarwal, S., Huang, L., and D. Blair, | ||||
| "YANG Data Model for Network Access Control Lists (ACLs)", | ||||
| RFC 8519, DOI 10.17487/RFC8519, March 2019, | ||||
| <https://www.rfc-editor.org/info/rfc8519>. | ||||
| [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, | |||
| "Deterministic Networking Architecture", RFC 8655, | "Deterministic Networking Architecture", RFC 8655, | |||
| DOI 10.17487/RFC8655, October 2019, | DOI 10.17487/RFC8655, October 2019, | |||
| <https://www.rfc-editor.org/info/rfc8655>. | <https://www.rfc-editor.org/info/rfc8655>. | |||
| [RFC8960] Saad, T., Raza, K., Gandhi, R., Liu, X., and V. Beeram, "A | [RFC8960] Saad, T., Raza, K., Gandhi, R., Liu, X., and V. Beeram, "A | |||
| YANG Data Model for MPLS Base", RFC 8960, | YANG Data Model for MPLS Base", RFC 8960, | |||
| DOI 10.17487/RFC8960, December 2020, | DOI 10.17487/RFC8960, December 2020, | |||
| <https://www.rfc-editor.org/info/rfc8960>. | <https://www.rfc-editor.org/info/rfc8960>. | |||
| [RFC8964] Varga, B., Ed., Farkas, J., Berger, L., Malis, A., Bryant, | [RFC8964] Varga, B., Ed., Farkas, J., Berger, L., Malis, A., Bryant, | |||
| S., and J. Korhonen, "Deterministic Networking (DetNet) | S., and J. Korhonen, "Deterministic Networking (DetNet) | |||
| Data Plane: MPLS", RFC 8964, DOI 10.17487/RFC8964, January | Data Plane: MPLS", RFC 8964, DOI 10.17487/RFC8964, January | |||
| 2021, <https://www.rfc-editor.org/info/rfc8964>. | 2021, <https://www.rfc-editor.org/info/rfc8964>. | |||
| [RFC9016] Varga, B., Farkas, J., Cummings, R., Jiang, Y., and D. | ||||
| Fedyk, "Flow and Service Information Model for | ||||
| Deterministic Networking (DetNet)", RFC 9016, | ||||
| DOI 10.17487/RFC9016, March 2021, | ||||
| <https://www.rfc-editor.org/info/rfc9016>. | ||||
| [RFC9055] Grossman, E., Ed., Mizrahi, T., and A. Hacker, | ||||
| "Deterministic Networking (DetNet) Security | ||||
| Considerations", RFC 9055, DOI 10.17487/RFC9055, June | ||||
| 2021, <https://www.rfc-editor.org/info/rfc9055>. | ||||
| 13.2. Informative References | 13.2. Informative References | |||
| [IEEE8021Q] | [IEEE8021Q] | |||
| IEEE, "IEEE Standard for Local and Metropolitan Area | IEEE, "IEEE Standard for Local and Metropolitan Area | |||
| Networks--Bridges and Bridged Networks", | Networks--Bridges and Bridged Networks", | |||
| DOI 10.1109/IEEESTD.2018.8403927, IEEE 802.1Q-2018, July | DOI 10.1109/IEEESTD.2018.8403927, IEEE 802.1Q-2018, July | |||
| 2018, <https://ieeexplore.ieee.org/document/8403927>. | 2018, <https://ieeexplore.ieee.org/document/8403927>. | |||
| [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, | ||||
| DOI 10.17487/RFC3688, January 2004, | ||||
| <https://www.rfc-editor.org/info/rfc3688>. | ||||
| [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | ||||
| and A. Bierman, Ed., "Network Configuration Protocol | ||||
| (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6241>. | ||||
| [RFC6242] Wasserman, M., "Using the NETCONF Protocol over Secure | ||||
| Shell (SSH)", RFC 6242, DOI 10.17487/RFC6242, June 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6242>. | ||||
| [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | ||||
| Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8040>. | ||||
| [RFC8340] Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", | [RFC8340] Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", | |||
| BCP 215, RFC 8340, DOI 10.17487/RFC8340, March 2018, | BCP 215, RFC 8340, DOI 10.17487/RFC8340, March 2018, | |||
| <https://www.rfc-editor.org/info/rfc8340>. | <https://www.rfc-editor.org/info/rfc8340>. | |||
| [RFC9016] Varga, B., Farkas, J., Cummings, R., Jiang, Y., and D. | [RFC8341] Bierman, A. and M. Bjorklund, "Network Configuration | |||
| Fedyk, "Flow and Service Information Model for | Access Control Model", STD 91, RFC 8341, | |||
| Deterministic Networking (DetNet)", RFC 9016, | DOI 10.17487/RFC8341, March 2018, | |||
| DOI 10.17487/RFC9016, March 2021, | <https://www.rfc-editor.org/info/rfc8341>. | |||
| <https://www.rfc-editor.org/info/rfc9016>. | ||||
| Appendix A. DetNet Configuration YANG Tree | Appendix A. DetNet Configuration YANG Tree | |||
| This is the full YANG tree as described in [RFC8340]. | This is the full YANG tree as described in [RFC8340]. | |||
| module: ietf-detnet | module: ietf-detnet | |||
| +--rw detnet | +--rw detnet | |||
| +--rw traffic-profile* [name] | +--rw traffic-profile* [name] | |||
| | +--rw name string | | +--rw name string | |||
| | +--rw traffic-requirements | | +--rw traffic-requirements | |||
| End of changes. 32 change blocks. | ||||
| 76 lines changed or deleted | 85 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||