| < draft-ietf-ippm-twamp-yang-10.txt | draft-ietf-ippm-twamp-yang-11.txt > | |||
|---|---|---|---|---|
| IPPM WG R. Civil | IPPM WG R. Civil | |||
| Internet-Draft Ciena Corporation | Internet-Draft Ciena Corporation | |||
| Intended status: Standards Track A. Morton | Intended status: Standards Track A. Morton | |||
| Expires: November 4, 2018 AT&T Labs | Expires: November 26, 2018 AT&T Labs | |||
| R. Rahman | R. Rahman | |||
| Cisco Systems | Cisco Systems | |||
| M. Jethanandani | M. Jethanandani | |||
| K. Pentikousis, Ed. | K. Pentikousis, Ed. | |||
| Travelping | Travelping | |||
| May 3, 2018 | May 25, 2018 | |||
| Two-Way Active Measurement Protocol (TWAMP) Data Model | Two-Way Active Measurement Protocol (TWAMP) Data Model | |||
| draft-ietf-ippm-twamp-yang-10 | draft-ietf-ippm-twamp-yang-11 | |||
| Abstract | Abstract | |||
| This document specifies a data model for client and server | This document specifies a data model for client and server | |||
| implementations of the Two-Way Active Measurement Protocol (TWAMP). | implementations of the Two-Way Active Measurement Protocol (TWAMP). | |||
| The document defines the TWAMP data model through Unified Modeling | The document defines the TWAMP data model through Unified Modeling | |||
| Language (UML) class diagrams and formally specifies it using YANG. | Language (UML) class diagrams and formally specifies it using YANG. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 40 ¶ | skipping to change at page 1, line 40 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on November 4, 2018. | This Internet-Draft will expire on November 26, 2018. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 42 ¶ | skipping to change at page 2, line 42 ¶ | |||
| 6.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 48 | 6.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 48 | |||
| 6.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 50 | 6.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 50 | |||
| 6.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 51 | 6.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 51 | |||
| 6.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 52 | 6.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 52 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 55 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 55 | |||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 56 | 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 56 | |||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 56 | 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 56 | |||
| 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 56 | 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 56 | |||
| 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 57 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 57 | |||
| 11.1. Normative References . . . . . . . . . . . . . . . . . . 57 | 11.1. Normative References . . . . . . . . . . . . . . . . . . 57 | |||
| 11.2. Informative References . . . . . . . . . . . . . . . . . 59 | 11.2. Informative References . . . . . . . . . . . . . . . . . 58 | |||
| Appendix A. Detailed Data Model Examples . . . . . . . . . . . . 60 | Appendix A. Detailed Data Model Examples . . . . . . . . . . . . 60 | |||
| A.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 60 | A.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 60 | |||
| A.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 62 | A.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 62 | |||
| A.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 64 | A.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 64 | |||
| A.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 64 | A.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 64 | |||
| Appendix B. TWAMP Operational Commands . . . . . . . . . . . . . 67 | Appendix B. TWAMP Operational Commands . . . . . . . . . . . . . 67 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 67 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 67 | |||
| 1. Introduction | 1. Introduction | |||
| skipping to change at page 3, line 45 ¶ | skipping to change at page 3, line 45 ¶ | |||
| defined and virtualized nature of network infrastructures, based on | defined and virtualized nature of network infrastructures, based on | |||
| dynamic service chains [NSC] and programmable control and management | dynamic service chains [NSC] and programmable control and management | |||
| planes Software-Defined Networking (SDN): Layers and Architecture | planes Software-Defined Networking (SDN): Layers and Architecture | |||
| Terminology [RFC7426] requires a well-defined data model for TWAMP | Terminology [RFC7426] requires a well-defined data model for TWAMP | |||
| implementations. This document defines such a TWAMP data model and | implementations. This document defines such a TWAMP data model and | |||
| specifies it formally using the YANG 1.1 [RFC7950] data modeling | specifies it formally using the YANG 1.1 [RFC7950] data modeling | |||
| language. | language. | |||
| Note to RFC Editor: | Note to RFC Editor: | |||
| Please replace the date 2018-05-03 in Section 5.2 of the draft with | Please replace the date 2018-05-25 in Section 5.2 of the draft with | |||
| the date of publication of this draft as a RFC. Also, replace | the date of publication of this draft as a RFC. Also, replace | |||
| reference to RFC XXXX, and draft-ietf-ippm-port-twamp-test with the | reference to RFC XXXX, and draft-ietf-ippm-port-twamp-test with the | |||
| RFC numbers assigned to the drafts. | RFC numbers assigned to the drafts. | |||
| 1.2. Terminology | 1.2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| skipping to change at page 10, line 26 ¶ | skipping to change at page 10, line 26 ¶ | |||
| in the Set-up Response message, indicating it will not continue with | in the Set-up Response message, indicating it will not continue with | |||
| the control connection. | the control connection. | |||
| In addition, the client container holds a list named key-chain which | In addition, the client container holds a list named key-chain which | |||
| relates KeyIDs with the respective secret keys. Both the Server and | relates KeyIDs with the respective secret keys. Both the Server and | |||
| the Control-Client use the same mappings from KeyIDs to shared | the Control-Client use the same mappings from KeyIDs to shared | |||
| secrets (key-id and secret-key in Figure 3, respectively). The | secrets (key-id and secret-key in Figure 3, respectively). The | |||
| Server, being prepared to conduct sessions with more than one | Server, being prepared to conduct sessions with more than one | |||
| Control-Client, uses KeyIDs to choose the appropriate secret-key; a | Control-Client, uses KeyIDs to choose the appropriate secret-key; a | |||
| Control-Client would typically have different secret keys for | Control-Client would typically have different secret keys for | |||
| different Servers. The secret-key is the shared secret, an octet | different Servers. The secret-key is the shared secret, a sequence | |||
| string of arbitrary length whose interpretation as a text string is | of octets of arbitrary length whose interpretation is unspecified. | |||
| unspecified. The key-id and secret-key encoding SHOULD follow | The key-id and secret-key encoding SHOULD follow Section 9.4 of YANG | |||
| Section 9.4 of YANG [RFC7950]. The derived key length (dkLen in PKCS | [RFC7950]. The derived key length (dkLen in PKCS #5: Password-Based | |||
| #5: Password-Based Cryptography Specification Version 2.1 [RFC8018]) | Cryptography Specification Version 2.1 [RFC8018]) MUST be 16 octets | |||
| MUST be 16 octets for the AES Session-key used for encryption and 32 | for the AES Session-key used for encryption and 32 octets for the | |||
| octets for the HMAC-SHA1 Session-key used for authentication; see | HMAC-SHA1 Session-key used for authentication; see also Section 6.10 | |||
| also Section 6.10 of OWAMP [RFC4656]. | of OWAMP [RFC4656]. | |||
| Each client container also holds a list of control connections, where | Each client container also holds a list of control connections, where | |||
| each item in the list describes a TWAMP control connection initiated | each item in the list describes a TWAMP control connection initiated | |||
| by this Control-Client. There SHALL be one ctrl-connection per | by this Control-Client. There SHALL be one ctrl-connection per | |||
| TWAMP-Control (TCP) connection that is to be initiated from this | TWAMP-Control (TCP) connection that is to be initiated from this | |||
| device. | device. | |||
| In turn, each ctrl-connection holds a list of test-session-request. | In turn, each ctrl-connection holds a list of test-session-request. | |||
| test-session-request holds information associated with the Control- | test-session-request holds information associated with the Control- | |||
| Client for this test session. This includes information associated | Client for this test session. This includes information associated | |||
| skipping to change at page 19, line 10 ¶ | skipping to change at page 19, line 10 ¶ | |||
| +--ro last-sent-seq? uint32 | +--ro last-sent-seq? uint32 | |||
| +--ro last-rcv-seq? uint32 | +--ro last-rcv-seq? uint32 | |||
| Figure 7: YANG Tree Diagram. | Figure 7: YANG Tree Diagram. | |||
| 5.2. YANG Module | 5.2. YANG Module | |||
| This section presents the YANG module for the TWAMP data model | This section presents the YANG module for the TWAMP data model | |||
| defined in this document. The module imports definitions from Common | defined in this document. The module imports definitions from Common | |||
| YANG Data Types [RFC6991], and references NTPv3 Specification | YANG Data Types [RFC6991], and references NTPv3 Specification | |||
| [RFC1305], Framework for IP Performance Metrics [RFC2330], Randomness | [RFC5905], Framework for IP Performance Metrics [RFC2330], Randomness | |||
| Requirements for Security [RFC4086], OWAMP [RFC4656], TWAMP | Requirements for Security [RFC4086], OWAMP [RFC4656], TWAMP | |||
| [RFC5357], More Features for TWAMP [RFC5618], Individual Session | [RFC5357], More Features for TWAMP [RFC5618], Individual Session | |||
| Control Feature [RFC5938], TWAMP Reflect Octets and Symmetrical Size | Control Feature [RFC5938], TWAMP Reflect Octets and Symmetrical Size | |||
| Features [RFC6038], Advances Stream and Sampling Framework [RFC7312], | Features [RFC6038], Advances Stream and Sampling Framework [RFC7312], | |||
| IKEv2-Derived Shared Secret Key for OWAMP and TWAMP [RFC7717], and | IKEv2-Derived Shared Secret Key for OWAMP and TWAMP [RFC7717], and | |||
| OWAMP and TWAMP Well-Known Port Assignments | OWAMP and TWAMP Well-Known Port Assignments | |||
| [I-D.ietf-ippm-port-twamp-test]. | [I-D.ietf-ippm-port-twamp-test]. | |||
| <CODE BEGINS> file "ietf-twamp@2018-05-03.yang" | <CODE BEGINS> file "ietf-twamp@2018-05-25.yang" | |||
| module ietf-twamp { | module ietf-twamp { | |||
| yang-version 1.1; | yang-version 1.1; | |||
| namespace urn:ietf:params:xml:ns:yang:ietf-twamp; | namespace urn:ietf:params:xml:ns:yang:ietf-twamp; | |||
| prefix ietf-twamp; | prefix ietf-twamp; | |||
| import ietf-inet-types { | import ietf-inet-types { | |||
| prefix inet; | prefix inet; | |||
| reference | reference | |||
| "RFC 6991: Common YANG Types."; | "RFC 6991: Common YANG Types."; | |||
| skipping to change at page 20, line 26 ¶ | skipping to change at page 20, line 26 ¶ | |||
| Redistribution and use in source and binary forms, with or | Redistribution and use in source and binary forms, with or | |||
| without modification, is permitted pursuant to, and subject | without modification, is permitted pursuant to, and subject | |||
| to the license terms contained in, the Simplified BSD | to the license terms contained in, the Simplified BSD | |||
| License set forth in Section 4.c of the IETF Trust's Legal | License set forth in Section 4.c of the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info). | (http://trustee.ietf.org/license-info). | |||
| This version of this YANG module is part of RFC XXXX; see | This version of this YANG module is part of RFC XXXX; see | |||
| the RFC itself for full legal notices."; | the RFC itself for full legal notices."; | |||
| revision 2018-05-03 { | revision 2018-05-25 { | |||
| description | description | |||
| "Initial Revision. | "Initial Revision. | |||
| Covers RFC 5357, RFC 5618, RFC 5938, RFC 6038, RFC 7717, and | Covers RFC 5357, RFC 5618, RFC 5938, RFC 6038, RFC 7717, and | |||
| draft-ietf-ippm-metric-registry"; | draft-ietf-ippm-metric-registry"; | |||
| reference | reference | |||
| "RFC XXXX: TWAMP YANG Data Model."; | "RFC XXXX: TWAMP YANG Data Model."; | |||
| } | } | |||
| skipping to change at page 57, line 19 ¶ | skipping to change at page 57, line 19 ¶ | |||
| [I-D.ietf-ippm-metric-registry] | [I-D.ietf-ippm-metric-registry] | |||
| Bagnulo, M., Claise, B., Eardley, P., Morton, A., and A. | Bagnulo, M., Claise, B., Eardley, P., Morton, A., and A. | |||
| Akhter, "Registry for Performance Metrics", draft-ietf- | Akhter, "Registry for Performance Metrics", draft-ietf- | |||
| ippm-metric-registry-14 (work in progress), March 2018. | ippm-metric-registry-14 (work in progress), March 2018. | |||
| [I-D.ietf-ippm-port-twamp-test] | [I-D.ietf-ippm-port-twamp-test] | |||
| Morton, A. and G. Mirsky, "OWAMP and TWAMP Well-Known Port | Morton, A. and G. Mirsky, "OWAMP and TWAMP Well-Known Port | |||
| Assignments", draft-ietf-ippm-port-twamp-test-01 (work in | Assignments", draft-ietf-ippm-port-twamp-test-01 (work in | |||
| progress), March 2018. | progress), March 2018. | |||
| [RFC1305] Mills, D., "Network Time Protocol (Version 3) | ||||
| Specification, Implementation and Analysis", RFC 1305, | ||||
| DOI 10.17487/RFC1305, March 1992, | ||||
| <https://www.rfc-editor.org/info/rfc1305>. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC2330] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis, | ||||
| "Framework for IP Performance Metrics", RFC 2330, | ||||
| DOI 10.17487/RFC2330, May 1998, | ||||
| <https://www.rfc-editor.org/info/rfc2330>. | ||||
| [RFC3432] Raisanen, V., Grotefeld, G., and A. Morton, "Network | [RFC3432] Raisanen, V., Grotefeld, G., and A. Morton, "Network | |||
| performance measurement with periodic streams", RFC 3432, | performance measurement with periodic streams", RFC 3432, | |||
| DOI 10.17487/RFC3432, November 2002, | DOI 10.17487/RFC3432, November 2002, | |||
| <https://www.rfc-editor.org/info/rfc3432>. | <https://www.rfc-editor.org/info/rfc3432>. | |||
| [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, | [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, | |||
| DOI 10.17487/RFC3688, January 2004, | DOI 10.17487/RFC3688, January 2004, | |||
| <https://www.rfc-editor.org/info/rfc3688>. | <https://www.rfc-editor.org/info/rfc3688>. | |||
| [RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | [RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | |||
| skipping to change at page 58, line 10 ¶ | skipping to change at page 57, line 48 ¶ | |||
| [RFC4656] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M. | [RFC4656] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M. | |||
| Zekauskas, "A One-way Active Measurement Protocol | Zekauskas, "A One-way Active Measurement Protocol | |||
| (OWAMP)", RFC 4656, DOI 10.17487/RFC4656, September 2006, | (OWAMP)", RFC 4656, DOI 10.17487/RFC4656, September 2006, | |||
| <https://www.rfc-editor.org/info/rfc4656>. | <https://www.rfc-editor.org/info/rfc4656>. | |||
| [RFC5357] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., and J. | [RFC5357] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., and J. | |||
| Babiarz, "A Two-Way Active Measurement Protocol (TWAMP)", | Babiarz, "A Two-Way Active Measurement Protocol (TWAMP)", | |||
| RFC 5357, DOI 10.17487/RFC5357, October 2008, | RFC 5357, DOI 10.17487/RFC5357, October 2008, | |||
| <https://www.rfc-editor.org/info/rfc5357>. | <https://www.rfc-editor.org/info/rfc5357>. | |||
| [RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch, | ||||
| "Network Time Protocol Version 4: Protocol and Algorithms | ||||
| Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, | ||||
| <https://www.rfc-editor.org/info/rfc5905>. | ||||
| [RFC6020] Bjorklund, M., Ed., "YANG - A Data Modeling Language for | [RFC6020] Bjorklund, M., Ed., "YANG - A Data Modeling Language for | |||
| the Network Configuration Protocol (NETCONF)", RFC 6020, | the Network Configuration Protocol (NETCONF)", RFC 6020, | |||
| DOI 10.17487/RFC6020, October 2010, | DOI 10.17487/RFC6020, October 2010, | |||
| <https://www.rfc-editor.org/info/rfc6020>. | <https://www.rfc-editor.org/info/rfc6020>. | |||
| [RFC6038] Morton, A. and L. Ciavattone, "Two-Way Active Measurement | [RFC6038] Morton, A. and L. Ciavattone, "Two-Way Active Measurement | |||
| Protocol (TWAMP) Reflect Octets and Symmetrical Size | Protocol (TWAMP) Reflect Octets and Symmetrical Size | |||
| Features", RFC 6038, DOI 10.17487/RFC6038, October 2010, | Features", RFC 6038, DOI 10.17487/RFC6038, October 2010, | |||
| <https://www.rfc-editor.org/info/rfc6038>. | <https://www.rfc-editor.org/info/rfc6038>. | |||
| [RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types", | [RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types", | |||
| RFC 6991, DOI 10.17487/RFC6991, July 2013, | RFC 6991, DOI 10.17487/RFC6991, July 2013, | |||
| <https://www.rfc-editor.org/info/rfc6991>. | <https://www.rfc-editor.org/info/rfc6991>. | |||
| [RFC7312] Fabini, J. and A. Morton, "Advanced Stream and Sampling | ||||
| Framework for IP Performance Metrics (IPPM)", RFC 7312, | ||||
| DOI 10.17487/RFC7312, August 2014, | ||||
| <https://www.rfc-editor.org/info/rfc7312>. | ||||
| [RFC7717] Pentikousis, K., Ed., Zhang, E., and Y. Cui, | [RFC7717] Pentikousis, K., Ed., Zhang, E., and Y. Cui, | |||
| "IKEv2-Derived Shared Secret Key for the One-Way Active | "IKEv2-Derived Shared Secret Key for the One-Way Active | |||
| Measurement Protocol (OWAMP) and Two-Way Active | Measurement Protocol (OWAMP) and Two-Way Active | |||
| Measurement Protocol (TWAMP)", RFC 7717, | Measurement Protocol (TWAMP)", RFC 7717, | |||
| DOI 10.17487/RFC7717, December 2015, | DOI 10.17487/RFC7717, December 2015, | |||
| <https://www.rfc-editor.org/info/rfc7717>. | <https://www.rfc-editor.org/info/rfc7717>. | |||
| [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | |||
| RFC 7950, DOI 10.17487/RFC7950, August 2016, | RFC 7950, DOI 10.17487/RFC7950, August 2016, | |||
| <https://www.rfc-editor.org/info/rfc7950>. | <https://www.rfc-editor.org/info/rfc7950>. | |||
| [RFC8018] Moriarty, K., Ed., Kaliski, B., and A. Rusch, "PKCS #5: | ||||
| Password-Based Cryptography Specification Version 2.1", | ||||
| RFC 8018, DOI 10.17487/RFC8018, January 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8018>. | ||||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 11.2. Informative References | 11.2. Informative References | |||
| [I-D.unify-nfvrg-challenges] | [I-D.unify-nfvrg-challenges] | |||
| Szabo, R., Csaszar, A., Pentikousis, K., Kind, M., Daino, | Szabo, R., Csaszar, A., Pentikousis, K., Kind, M., Daino, | |||
| D., Qiang, Z., and H. Woesner, "Unifying Carrier and Cloud | D., Qiang, Z., and H. Woesner, "Unifying Carrier and Cloud | |||
| Networks: Problem Statement and Challenges", draft-unify- | Networks: Problem Statement and Challenges", draft-unify- | |||
| skipping to change at page 59, line 23 ¶ | skipping to change at page 59, line 5 ¶ | |||
| [I-D.unify-nfvrg-devops] | [I-D.unify-nfvrg-devops] | |||
| Meirosu, C., Manzalini, A., Steinert, R., Marchetto, G., | Meirosu, C., Manzalini, A., Steinert, R., Marchetto, G., | |||
| Pentikousis, K., Wright, S., Lynch, P., and W. John, | Pentikousis, K., Wright, S., Lynch, P., and W. John, | |||
| "DevOps for Software-Defined Telecom Infrastructures", | "DevOps for Software-Defined Telecom Infrastructures", | |||
| draft-unify-nfvrg-devops-06 (work in progress), July 2016. | draft-unify-nfvrg-devops-06 (work in progress), July 2016. | |||
| [NSC] John, W., Pentikousis, K., et al., "Research directions in | [NSC] John, W., Pentikousis, K., et al., "Research directions in | |||
| network service chaining", Proc. SDN for Future Networks | network service chaining", Proc. SDN for Future Networks | |||
| and Services (SDN4FNS), Trento, Italy IEEE, November 2013. | and Services (SDN4FNS), Trento, Italy IEEE, November 2013. | |||
| [RFC2330] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis, | ||||
| "Framework for IP Performance Metrics", RFC 2330, | ||||
| DOI 10.17487/RFC2330, May 1998, | ||||
| <https://www.rfc-editor.org/info/rfc2330>. | ||||
| [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security | [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security | |||
| (TLS) Protocol Version 1.2", RFC 5246, | (TLS) Protocol Version 1.2", RFC 5246, | |||
| DOI 10.17487/RFC5246, August 2008, | DOI 10.17487/RFC5246, August 2008, | |||
| <https://www.rfc-editor.org/info/rfc5246>. | <https://www.rfc-editor.org/info/rfc5246>. | |||
| [RFC5618] Morton, A. and K. Hedayat, "Mixed Security Mode for the | [RFC5618] Morton, A. and K. Hedayat, "Mixed Security Mode for the | |||
| Two-Way Active Measurement Protocol (TWAMP)", RFC 5618, | Two-Way Active Measurement Protocol (TWAMP)", RFC 5618, | |||
| DOI 10.17487/RFC5618, August 2009, | DOI 10.17487/RFC5618, August 2009, | |||
| <https://www.rfc-editor.org/info/rfc5618>. | <https://www.rfc-editor.org/info/rfc5618>. | |||
| skipping to change at page 59, line 47 ¶ | skipping to change at page 59, line 34 ¶ | |||
| [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | |||
| and A. Bierman, Ed., "Network Configuration Protocol | and A. Bierman, Ed., "Network Configuration Protocol | |||
| (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | |||
| <https://www.rfc-editor.org/info/rfc6241>. | <https://www.rfc-editor.org/info/rfc6241>. | |||
| [RFC6242] Wasserman, M., "Using the NETCONF Protocol over Secure | [RFC6242] Wasserman, M., "Using the NETCONF Protocol over Secure | |||
| Shell (SSH)", RFC 6242, DOI 10.17487/RFC6242, June 2011, | Shell (SSH)", RFC 6242, DOI 10.17487/RFC6242, June 2011, | |||
| <https://www.rfc-editor.org/info/rfc6242>. | <https://www.rfc-editor.org/info/rfc6242>. | |||
| [RFC7312] Fabini, J. and A. Morton, "Advanced Stream and Sampling | ||||
| Framework for IP Performance Metrics (IPPM)", RFC 7312, | ||||
| DOI 10.17487/RFC7312, August 2014, | ||||
| <https://www.rfc-editor.org/info/rfc7312>. | ||||
| [RFC7426] Haleplidis, E., Ed., Pentikousis, K., Ed., Denazis, S., | [RFC7426] Haleplidis, E., Ed., Pentikousis, K., Ed., Denazis, S., | |||
| Hadi Salim, J., Meyer, D., and O. Koufopavlou, "Software- | Hadi Salim, J., Meyer, D., and O. Koufopavlou, "Software- | |||
| Defined Networking (SDN): Layers and Architecture | Defined Networking (SDN): Layers and Architecture | |||
| Terminology", RFC 7426, DOI 10.17487/RFC7426, January | Terminology", RFC 7426, DOI 10.17487/RFC7426, January | |||
| 2015, <https://www.rfc-editor.org/info/rfc7426>. | 2015, <https://www.rfc-editor.org/info/rfc7426>. | |||
| [RFC8018] Moriarty, K., Ed., Kaliski, B., and A. Rusch, "PKCS #5: | ||||
| Password-Based Cryptography Specification Version 2.1", | ||||
| RFC 8018, DOI 10.17487/RFC8018, January 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8018>. | ||||
| [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | |||
| Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | |||
| <https://www.rfc-editor.org/info/rfc8040>. | <https://www.rfc-editor.org/info/rfc8040>. | |||
| [RFC8340] Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", | [RFC8340] Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", | |||
| BCP 215, RFC 8340, DOI 10.17487/RFC8340, March 2018, | BCP 215, RFC 8340, DOI 10.17487/RFC8340, March 2018, | |||
| <https://www.rfc-editor.org/info/rfc8340>. | <https://www.rfc-editor.org/info/rfc8340>. | |||
| [RFC8341] Bierman, A. and M. Bjorklund, "Network Configuration | [RFC8341] Bierman, A. and M. Bjorklund, "Network Configuration | |||
| Access Control Model", STD 91, RFC 8341, | Access Control Model", STD 91, RFC 8341, | |||
| End of changes. 18 change blocks. | ||||
| 37 lines changed or deleted | 37 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||