| rfc9968.original | rfc9968.txt | |||
|---|---|---|---|---|
| Network Working Group W. Hardaker | Internet Architecture Board (IAB) W. Hardaker | |||
| Internet-Draft | Request for Comments: 9968 | |||
| Intended status: Informational D. Dhody | Category: Informational D. Dhody | |||
| Expires: 2 March 2026 29 August 2025 | ISSN: 2070-1721 April 2026 | |||
| Report from the IAB Workshop on the Next Era of Network Management | Report from the IAB Workshop on the Next Era of Network Management | |||
| Operations (NEMOPS) | Operations (NEMOPS) | |||
| draft-iab-nemops-workshop-report-04 | ||||
| Abstract | Abstract | |||
| The "Next Era of Network Management Operations (NEMOPS)" workshop was | The "Next Era of Network Management Operations (NEMOPS)" workshop was | |||
| convened by the Internet Architecture Board (IAB) from December 3-5, | convened by the Internet Architecture Board (IAB) from December 3-5, | |||
| 2024, as a three-day online meeting. It builds on a previous 2002 | 2024 as a three-day online meeting. It builds on a previous 2002 | |||
| workshop, the outcome of which was documented in RFC 3535, | workshop, the outcome of which was documented in RFC 3535, | |||
| identifying 14 operator requirements for consideration in future | identifying 14 operator requirements for consideration in future | |||
| network management protocol design and related data models, along | network management protocol design and related data models, along | |||
| with some recommendations for the IETF. Much has changed in the | with some recommendations for the IETF. Much has changed in the | |||
| Internet’s operation and technological foundations since then. The | Internet's operation and technological foundations since then. The | |||
| NEMOPS workshop reviewed the past outcomes and discussed any | NEMOPS workshop reviewed the past outcomes and discussed any | |||
| operational barriers that prevented these technologies from being | operational barriers that prevented these technologies from being | |||
| widely implemented. With the industry, network operators and | widely implemented. With the industry, network operators and | |||
| protocol engineers working in collaboration, the workshop developed a | protocol engineers working in collaboration, the workshop developed a | |||
| suggested plan of action and network management recommendations for | suggested plan of action and network management recommendations for | |||
| the IETF and IRTF. Building on RFC 3535, this document provides the | the IETF and IRTF. Building on RFC 3535, this document provides the | |||
| report of the follow-up IAB workshop on Network Management. | report of the follow-up IAB workshop on network management. | |||
| Note that this document is a report on the proceedings of the | Note that this document is a report on the proceedings of the | |||
| workshop. The views and positions documented in this report are | workshop. The views and positions documented in this report are | |||
| those of the workshop participants and do not necessarily reflect IAB | those of the workshop participants and do not necessarily reflect IAB | |||
| views and positions. | views and positions. | |||
| About This Document | ||||
| This note is to be removed before publishing as an RFC. | ||||
| The latest revision of this draft can be found at | ||||
| https://intarchboard.github.io/draft-iab-nemops-workshop-report/ | ||||
| draft-iab-nemops-workshop-report.html. Status information for this | ||||
| document may be found at https://datatracker.ietf.org/doc/draft-iab- | ||||
| nemops-workshop-report/. | ||||
| Source for this draft and an issue tracker can be found at | ||||
| https://github.com/intarchboard/draft-iab-nemops-workshop-report. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
| provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Architecture Board (IAB) | |||
| and may be updated, replaced, or obsoleted by other documents at any | and represents information that the IAB has deemed valuable to | |||
| time. It is inappropriate to use Internet-Drafts as reference | provide for permanent record. It represents the consensus of the | |||
| material or to cite them other than as "work in progress." | Internet Architecture Board (IAB). Documents approved for | |||
| publication by the IAB are not candidates for any level of Internet | ||||
| Standard; see Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 2 March 2026. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9968. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2025 IETF Trust and the persons identified as the | Copyright (c) 2026 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
| to this document. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
| 1.1. About this workshop report content . . . . . . . . . . . 4 | 1.1. About the Content of This Workshop Report | |||
| 2. Outreach and Survey . . . . . . . . . . . . . . . . . . . . . 4 | 2. Outreach and Survey | |||
| 3. Workshop Scope and Discussion . . . . . . . . . . . . . . . . 5 | 3. Workshop Scope and Discussion | |||
| 3.1. Session I: Past (lookback, analysis) . . . . . . . . . . 5 | 3.1. Session I: Past - Lookback and Analysis | |||
| 3.1.1. Reflections . . . . . . . . . . . . . . . . . . . . . 5 | 3.1.1. Reflections | |||
| 3.1.2. Lessons to be Learned . . . . . . . . . . . . . . . . 6 | 3.1.2. Lessons to be Learned | |||
| 3.1.3. Discussion . . . . . . . . . . . . . . . . . . . . . 7 | 3.1.3. Discussion | |||
| 3.2. Session II: Present (identified problems & | 3.2. Session II: Present - Identified Problems and Requirements | |||
| requirements) . . . . . . . . . . . . . . . . . . . . . . 7 | 3.2.1. Operator Feedback | |||
| 3.2.1. Operator Feedback . . . . . . . . . . . . . . . . . . 8 | 3.2.2. Survey | |||
| 3.2.2. Survey . . . . . . . . . . . . . . . . . . . . . . . 10 | 3.2.3. Discussion | |||
| 3.2.3. Discussion . . . . . . . . . . . . . . . . . . . . . 10 | 3.3. Session III: Future - Possible Solutions, Recommendations, | |||
| 3.3. Session III: Future (possible solutions, recommendations | and Next Steps | |||
| and next steps) . . . . . . . . . . . . . . . . . . . . . 11 | 3.3.1. Suggestions on Future Directions | |||
| 3.3.1. Suggestions on Future Directions . . . . . . . . . . 11 | 3.3.2. Discussion | |||
| 3.3.2. Discussion . . . . . . . . . . . . . . . . . . . . . 12 | 3.4. Key Takeaways | |||
| 3.4. Key Takeaways . . . . . . . . . . . . . . . . . . . . . . 12 | 3.4.1. Ecosystem Conclusions | |||
| 3.4.1. Ecosystem conclusions . . . . . . . . . . . . . . . . 13 | 3.4.2. Protocol Conclusions | |||
| 3.4.2. Protocol conclusions . . . . . . . . . . . . . . . . 13 | 3.4.3. Modeling Conclusions | |||
| 3.4.3. Modeling conclusions . . . . . . . . . . . . . . . . 14 | 3.4.4. Standardization Conclusions | |||
| 3.4.4. Standardization conclusions . . . . . . . . . . . . . 14 | 3.4.5. Conclusions That Did Not Reach Consensus During the | |||
| 3.4.5. Conclusions that did not reach consensus during the | Takeaways Discussion | |||
| takeaways discussion . . . . . . . . . . . . . . . . 15 | 4. Not Covered in the Workshop | |||
| 4. Not Covered in the Workshop . . . . . . . . . . . . . . . . . 15 | 5. Security Considerations | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 15 | 6. IANA Considerations | |||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 | 7. Informative References | |||
| 7. Informative References . . . . . . . . . . . . . . . . . . . 16 | Appendix A. Operator Feedback | |||
| Appendix A. Operator Feedback . . . . . . . . . . . . . . . . . 20 | A.1. General | |||
| A.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 20 | A.2. Data Models | |||
| A.2. Data Models . . . . . . . . . . . . . . . . . . . . . . . 21 | Appendix B. Key Recommendations from Operator Feedback | |||
| Appendix B. Key Recommendations from Operator Feedback . . . . . 21 | Appendix C. Position Papers | |||
| Appendix C. Position Papers . . . . . . . . . . . . . . . . . . 22 | Appendix D. Workshop Participants | |||
| Appendix D. Workshop Participants . . . . . . . . . . . . . . . 24 | Appendix E. Workshop Program Committee | |||
| Appendix E. Workshop Program Committee . . . . . . . . . . . . . 24 | IAB Members at the Time of Approval | |||
| IAB Members at the Time of Approval . . . . . . . . . . . . . . . 24 | Acknowledgments | |||
| Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 25 | Authors' Addresses | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 25 | ||||
| 1. Introduction | 1. Introduction | |||
| The Internet Architecture Board (IAB) holds occasional workshops | The Internet Architecture Board (IAB) holds occasional workshops | |||
| designed to consider long-term issues and strategies for the | designed to consider long-term issues and strategies for the | |||
| Internet, and to suggest future directions for the Internet | Internet, and to suggest future directions for the Internet | |||
| architecture. This long-term planning function of the IAB is | architecture. This long-term planning function of the IAB is | |||
| complementary to the ongoing engineering efforts performed by working | complementary to the ongoing engineering efforts performed by working | |||
| groups of the Internet Engineering Task Force (IETF). | groups of the Internet Engineering Task Force (IETF). | |||
| The IAB organized a workshop in 2002 to establish a dialog between | The IAB organized a workshop in 2002 to establish a dialog between | |||
| network operators and protocol developers, and to guide the IETF's | network operators and protocol developers and to guide the IETF's | |||
| work on network management protocols. The outcome of that workshop | work on network management protocols. The outcome of that workshop | |||
| was documented in the "Overview of the 2002 IAB Network Management | was documented in the "Overview of the 2002 IAB Network Management | |||
| Workshop" [RFC3535], which identified 14 operator requirements and 11 | Workshop" [RFC3535], which identified 14 operator requirements and 11 | |||
| recommendations for consideration in future network management | recommendations for consideration in future network management | |||
| protocol design and related data models within the IETF. | protocol design and related data models within the IETF. | |||
| Those requirements were instrumental in developing the NETCONF | Those requirements were instrumental in developing the Network | |||
| protocol (in the NETCONF Working Group) [RFC6241], the associated | Configuration Protocol (NETCONF) (in the NETCONF Working Group) | |||
| YANG data modeling language (in the NETMOD Working Group) [RFC7950], | [RFC6241], the associated YANG data modeling language (in the NETMOD | |||
| RESTCONF [RFC8040], and most recently CORECONF [I-D.ietf-core-comi]. | Working Group) [RFC7950], RESTCONF [RFC8040], and most recently the | |||
| CoAP Management Interface (CORECONF) [CORECONF]. | ||||
| The recent NEMOPS IAB workshop focused on the following key tasks: | The recent NEMOPS IAB workshop focused on the following key tasks: | |||
| * Review the outcomes and results of the 2002 workshop (current | * Review the outcomes and results of the 2002 workshop (current | |||
| deployments, state of the art) and identify any operational | deployments and state of the art) and identify any operational | |||
| barriers that prevent these technologies from being widely | barriers that prevent these technologies from being widely | |||
| implemented (limitations, hurdles). | implemented (limitations and hurdles). | |||
| * Sketch new requirements for future network management operations | * Sketch new requirements for future network management operations | |||
| in a collaborative manner with the industry, network operators, | in a collaborative manner with the industry, network operators, | |||
| and protocol engineers. | and protocol engineers. | |||
| * Develop a plan of action and recommendations for the IETF. | * Develop a plan of action and recommendations for the IETF. | |||
| This document builds on RFC 3535 with new information gathered from | This document builds on RFC 3535 with new information gathered from | |||
| the second IAB workshop on the future of Network Management. The | the second IAB workshop on the future of network management. The | |||
| goal of the second workshop was not to invalidate or replace the | goal of the second workshop was not to invalidate or replace the | |||
| first, but to extend the discussion with lessons learned since then. | first but to extend the discussion with lessons learned since then. | |||
| Together, both documents capture a snapshot of the evolving needs of | Together, both documents capture a snapshot of the evolving needs of | |||
| network management over time. | network management over time. | |||
| 1.1. About this workshop report content | 1.1. About the Content of This Workshop Report | |||
| This document is a report on the proceedings of the workshop. The | This document is a report on the proceedings of the workshop. The | |||
| views and positions documented in this report are expressed during | views and positions documented in this report are expressed during | |||
| the workshop by participants and do not necessarily reflect IAB's | the workshop by participants and do not necessarily reflect the IAB's | |||
| views and positions. | views and positions. | |||
| Furthermore, the content of the report comes from presentations given | Furthermore, the content of the report comes from presentations given | |||
| by workshop participants and notes taken during the discussions, | by workshop participants and notes taken during the discussions, | |||
| without interpretation or validation. Thus, the content of this | without interpretation or validation. Thus, the content of this | |||
| report follows the flow and dialogue of the workshop but does not | report follows the flow and dialogue of the workshop but does not | |||
| necessarily attempt to capture a consensus, unless stated otherwise. | necessarily attempt to capture a consensus, unless stated otherwise. | |||
| 2. Outreach and Survey | 2. Outreach and Survey | |||
| The IAB workshop's Program Committee (PC) planned outreach | The IAB workshop's Program Committee (PC) planned outreach | |||
| initiatives to foster discussions and gather interest by engaging | initiatives to foster discussions and gather interest by engaging | |||
| with operators at various operational venues (RIPE, NANOG, APRICOT, | with operators at various operational venues (Réseaux IP Européens | |||
| LACNIC, AutoConn, etc) and conducting information/requirement- | (RIPE), North American Network Operators Group (NANOG), Asia Pacific | |||
| gathering sessions. Participants were encouraged to submit "position | Regional Internet Conference on Operational Technologies (APRICOT), | |||
| papers" or "expressions of interest" to join the workshop. | Latin American and Caribbean Internet Addresses Registry (LACNIC), | |||
| Additionally, a [SURVEY] was conducted to collect valuable insights | AutoConn, etc.) and conducting information-/requirement-gathering | |||
| to inform the workshop. | sessions. Participants were encouraged to submit "position papers" | |||
| or "expressions of interest" to join the workshop. Additionally, a | ||||
| [SURVEY] was conducted to collect valuable insights to inform the | ||||
| workshop. | ||||
| Some PC members continued to engage with network operators at | After the workshop, some PC members continued to engage with network | |||
| operational venues after the workshop to facilitate information | operators at operational venues to facilitate information sharing and | |||
| sharing and gather their feedback on the workshop, thereby helping to | gather their feedback on the workshop, thereby helping to shape the | |||
| shape the next steps and outcomes. | next steps and outcomes. | |||
| 3. Workshop Scope and Discussion | 3. Workshop Scope and Discussion | |||
| The workshop was organized across three days, with all participants | The workshop was organized across three days, with all participants | |||
| contributing to one discussion per day. The workshop was organized | contributing to one discussion per day. The workshop was organized | |||
| around three topic areas: "Session I: the Past (lookback and | around three topic areas: "Session I: Past - Lookback and Analysis" | |||
| analysis)" (Section 3.1), "Session II: Present (identified problems | (Section 3.1), "Session II: Present - Identified Problems and | |||
| and requirements)" (Section 3.2), and "Session III: Future (possible | Requirements" (Section 3.2), and "Session III: Future - Possible | |||
| solutions, recommendations and next steps)" (Section 3.3). The | Solutions, Recommendations, and Next Steps" (Section 3.3). The | |||
| program committee organized the paper submissions to fit these three | program committee organized the paper submissions to fit these three | |||
| main themes in order to drive discussion during each of the slots. | main themes in order to drive discussion during each of the slots. | |||
| During each discussion, the papers were presented sequentially, and | During each discussion, the papers were presented sequentially, and | |||
| an open discussion was held afterwards. On the last day, an | an open discussion was held afterwards. On the last day, an | |||
| additional discussion on the key takeaways from the workshop and | additional discussion took place on the key takeaways from the | |||
| possible next steps took place (Section 3.4). | workshop and possible next steps (Section 3.4). | |||
| The workshop agenda for each day is at past | The workshop agenda for each day can be viewed at past | |||
| (https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws- | <https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws- | |||
| 01-sessa/), present (https://datatracker.ietf.org/doc/agenda-interim- | 01-sessa/>, present <https://datatracker.ietf.org/doc/agenda-interim- | |||
| 2024-nemopsws-02-sessa/), and future | 2024-nemopsws-02-sessa/>, and future | |||
| (https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws- | <https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws- | |||
| 03-sessa/). All workshop papers and slides are at materials | 03-sessa/>. All workshop papers and slides can be viewed at | |||
| (https://datatracker.ietf.org/group/nemopsws/materials/). | materials <https://datatracker.ietf.org/group/nemopsws/materials/>. | |||
| 3.1. Session I: Past (lookback, analysis) | 3.1. Session I: Past - Lookback and Analysis | |||
| The first day of the workshop focused on reflecting on the past by | The first day of the workshop focused on reflecting on the past by | |||
| reviewing the evolution of network management since the 2002 | reviewing the evolution of network management since the 2002 | |||
| workshop, analyzing both the successes and the challenges encountered | workshop, analyzing both the successes and the challenges encountered | |||
| along the way. The presentations covered a range of topics, | along the way. The presentations covered a range of topics, | |||
| including reflections on the history of network management, lessons | including reflections on the history of network management, lessons | |||
| learned from widely used tools, practices in constrained networks, | learned from widely used tools, practices in constrained networks, | |||
| and the need to reconsider how network management models and | and the need to reconsider how network management models and | |||
| protocols are standardized within the IETF. | protocols are standardized within the IETF. | |||
| 3.1.1. Reflections | 3.1.1. Reflections | |||
| The workshop began by reflecting on the IAB’s role in shaping the | The workshop began by reflecting on the IAB's role in shaping the | |||
| evolution of network management away from CLI/SNMP/MIB technologies, | evolution of network management away from Command-Line Interface | |||
| focusing on the context and key outcomes of the previous workshop, an | (CLI), SNMP, and MIB technologies, focusing on the context and key | |||
| assessment of the current state of network management as a whole, and | outcomes of the previous workshop, an assessment of the current state | |||
| an acknowledgement of some regrets in how network management | of network management as a whole, and an acknowledgement of some | |||
| technologies developed in the last two decades (such as XML as the | regrets in how network management technologies developed in the last | |||
| data representation format). [SCHONWALDER] emphasized the need to | two decades (such as XML as the data representation format). | |||
| shift the focus from device-level configuration to network and | [SCHONWALDER] emphasized the need to shift the focus from device- | |||
| service-level configuration. Key properties highlighted for | level configuration to network and service-level configuration. Key | |||
| effective network and service configurations included being | properties highlighted for effective network and service | |||
| Composable (assembled out of modular configurations), Declarative | configurations included being Composable (assembled out of modular | |||
| (define state while systems determine themselves how to implement | configurations), Declarative (define state while systems themselves | |||
| those goals), Reproducible (reliably and consistently recreated), and | determine how to implement those goals), Reproducible (reliably and | |||
| Verifiable (asserting that the correct changes have been applied). | consistently recreated), and Verifiable (asserting that the correct | |||
| changes have been applied). | ||||
| An operator’s perspective highlighted that the recommendations of | An operator's perspective highlighted that the recommendations of | |||
| [RFC3535] (which led to the development of YANG and NETCONF) have | [RFC3535] (which led to the development of YANG and NETCONF) have | |||
| been successful in addressing device configuration in many, but not | been successful in addressing device configuration in many, but not | |||
| all, environments. In certain areas, the advancements in semantics | all, environments. In certain areas, the advancements in semantics | |||
| and protocols for streaming telemetry have even surpassed the | and protocols for streaming telemetry have even surpassed the | |||
| original scope of [RFC3535]. [FARRER] cautioned against making | original scope of [RFC3535]. [FARRER] cautioned against making | |||
| changes that could disrupt the ecosystem. The presentation | changes that could disrupt the ecosystem. The presentation | |||
| emphasized the need to prioritize service modeling in the IETF and | emphasized the need to prioritize service modeling in the IETF and | |||
| addressed the challenges of mapping to the Business Support Systems | addressed the challenges of mapping to the Business Support Systems | |||
| (BSS) domain. It also stressed the importance of including the | (BSS) domain. It also stressed the importance of including the | |||
| operational state in service models to enable closed-loop automation | operational state in service models to enable closed-loop automation | |||
| for end-to-end (E2E) services. Revisiting [RFC8309], which asserts | for end-to-end (E2E) services. Revisiting [RFC8309], which asserts | |||
| that the operational state of a service is not part of a customer | that the operational state of a service is not part of a customer | |||
| service model but can be achieved through extensions, was suggested. | service model but can be achieved through extensions, was suggested. | |||
| Additionally, the lack of open-source NMS implementations, tools, and | Additionally, the lack of open-source Network Management System (NMS) | |||
| device model implementations was identified as a significant barrier | implementations, tools, and device model implementations was | |||
| to advancing standardization efforts. The IETF could play a key role | identified as a significant barrier to advancing standardization | |||
| in fostering and enabling collaborations to address these challenges. | efforts. The IETF could play a key role in fostering and enabling | |||
| While the IETF does not itself build tools, it was suggested that | collaborations to address these challenges. While the IETF does not | |||
| having a translation tool that runs outside the network device to map | itself build tools, it was suggested that having a translation tool | |||
| IETF device models to vendor-specific ones would be beneficial. | that runs outside the network device to map IETF device models to | |||
| vendor-specific ones would be beneficial. | ||||
| 3.1.2. Lessons to be Learned | 3.1.2. Lessons to be Learned | |||
| [HARDAKER] emphasized that the success of Net-SNMP [NET-SNMP] was | [HARDAKER] emphasized that the success of Net-SNMP [NET-SNMP] was | |||
| driven by empowering users through simplicity, stressing that the | driven by empowering users through simplicity, stressing that the | |||
| focus should remain on ensuring ease of use and adaptability of the | focus should remain on ensuring ease of use and adaptability of the | |||
| protocols. Emphasis was placed on the two distinct audiences for | protocols. Emphasis was placed on the two distinct audiences for | |||
| standardized network management protocols: toolkit vendors and system | standardized network management protocols: toolkit vendors and system | |||
| operators. Their requirements for protocol simplicity differ, and it | operators. Their requirements for protocol simplicity differ, and it | |||
| is essential to address the needs of both to ensure success. | is essential to address the needs of both to ensure success. | |||
| [BORMANN] presented an overview of the CORECONF architecture, | [BORMANN] presented an overview of the CORECONF architecture, | |||
| showcasing how model-driven network management techniques can be | showcasing how model-driven network management techniques can be | |||
| applied to manage IoT devices (which is different from other network | applied to manage Internet of Things (IoT) devices (which is | |||
| management scenarios), with a focus on the unique characteristics of | different from other network management scenarios), with a focus on | |||
| constrained nodes. Some participants noted that the binary encoding | the unique characteristics of constrained nodes. Some participants | |||
| of CBOR has applications that extend beyond the IoT networks. | noted that the binary encoding of Concise Binary Object | |||
| Representation (CBOR) has applications that extend beyond the IoT | ||||
| networks. | ||||
| Drawing from the experience of OpenConfig [OPENCONFIG], [SHAKIR] | Drawing from the experience of OpenConfig [OPENCONFIG], [SHAKIR] | |||
| emphasized that protocol definition and data models cannot be done in | emphasized that protocol definition and data models cannot be done in | |||
| isolation; instead, they must integrate lessons learned from | isolation; instead, they must integrate lessons learned from | |||
| implementation and large-scale deployment. Thus, highlighting the | implementation and large-scale deployment. Thus, highlighting the | |||
| importance of enabling quick iterations, shipping rapidly, embracing | importance of enabling quick iterations, shipping rapidly, embracing | |||
| open-source, readily available tools, adopting systems thinking | open source, readily available tools, adopting systems thinking | |||
| driven by business outcomes, and reusing existing technologies rather | driven by business outcomes, and reusing existing technologies rather | |||
| than developing solutions exclusively for operator network | than developing solutions exclusively for operator network | |||
| management. A call was made for the IETF to rethink the approach to | management. A call was made for the IETF to rethink the approach to | |||
| standardize data models and the associated network management | standardize data models and the associated network management | |||
| protocols under this guidance. | protocols under this guidance. | |||
| 3.1.3. Discussion | 3.1.3. Discussion | |||
| The Session I open discussion highlighted the divergence between | The Session I open discussion highlighted the divergence between | |||
| vendor implementations of YANG models and what is accessible via | vendor implementations of YANG models and what is accessible via the | |||
| them, particularly when compared to CLI. Questions were raised about | models, particularly when compared to CLI. Questions were raised | |||
| how to incorporate fast iteration and rapid changes within the | about how to incorporate fast iteration and rapid changes within the | |||
| established IETF process and culture, especially in contrast to the | established IETF process and culture, especially in contrast to the | |||
| approach used by OpenConfig. Common challenges identified included a | approach used by OpenConfig. Common challenges identified included a | |||
| lack of tooling, performance issues at scale, the steep learning | lack of tooling, performance issues at scale, the steep learning | |||
| curve for network management protocols/models/tools, initial | curve for network management protocols/models/tools, initial | |||
| difficulty in moving away from CLI, and the backward compatibility of | difficulty in moving away from CLI, and the backward compatibility of | |||
| models (versioning). Some participants suggested that the IETF | models (versioning). Some participants suggested that the IETF | |||
| should focus on system-level APIs that address specific problems. | should focus on system-level APIs that address specific problems. | |||
| Additionally, the lack of simple tools for smaller networks operating | Additionally, the lack of simple tools for smaller networks operating | |||
| under tight timelines and budgets was emphasized. A key question | under tight timelines and budgets was emphasized. A key question | |||
| raised was whether the proliferation of protocols and languages | raised was whether the proliferation of protocols and languages | |||
| complicates adoption, and if converging on a single approach would | complicates adoption and if converging on a single approach would | |||
| improve adoption. The existence of multiple schemas and protocols | improve adoption. The existence of multiple schemas and protocols | |||
| beyond NETCONF, such as BMP and IPFIX, to address network management | beyond NETCONF, such as the BGP Monitoring Protocol (BMP) and IP Flow | |||
| challenges beyond configuration is an established reality. One | Information Export (IPFIX), to address network management challenges | |||
| conclusion was that a mechanism was needed to interconnect and | beyond configuration is an established reality. One conclusion was | |||
| harmonize these schemas to provide a cohesive and comprehensive | that a mechanism was needed to interconnect and harmonize these | |||
| understanding of the data. | schemas to provide a cohesive and comprehensive understanding of the | |||
| data. | ||||
| 3.2. Session II: Present (identified problems & requirements) | 3.2. Session II: Present - Identified Problems and Requirements | |||
| The second day of the workshop concentrated on challenges and | The second day of the workshop concentrated on challenges and | |||
| emerging requirements for future network management operations. The | emerging requirements for future network management operations. The | |||
| presentation emphasized the importance of validation, observability, | presentation emphasized the importance of validation, observability, | |||
| automation, and the need for agile, incremental development of both | automation, and the need for agile, incremental development of both | |||
| network models and management protocols. A compilation of new | network models and management protocols. A compilation of new | |||
| requirements from operators was presented; they are being maintained | requirements from operators was presented; they are being maintained | |||
| in [I-D.ietf-nmop-rfc3535-20years-later]. The final presentation of | in [OP-REQ-NM]. The final presentation of the day provided a summary | |||
| the day provided a summary of the survey results and operator | of the survey results and operator feedback gathered from outreach | |||
| feedback gathered from outreach events. | events. | |||
| 3.2.1. Operator Feedback | 3.2.1. Operator Feedback | |||
| [KELLER] shared Deutsche Telekom’s perspective, emphasizing that | [KELLER] shared Deutsche Telekom's perspective, emphasizing that | |||
| while YANG models perform well for provisioning, they currently fall | while YANG models perform well for provisioning, they currently fall | |||
| short in providing the operational stability required for validation. | short in providing the operational stability required for validation. | |||
| In their experience, the IETF service models (where available) were | In their experience, the IETF service models (where available) were | |||
| considered stable and in good condition, whereas the OpenConfig | considered stable and in good condition, whereas the OpenConfig | |||
| device models were noted as lacking feature richness and stability. | device models were noted as lacking feature richness and stability. | |||
| In contrast, vendor YANG models are often more flexible and available | In contrast, vendor YANG models are often more flexible and available | |||
| in a more timely manner. Achieving fully closed-loop automated and | in a more timely manner. Achieving fully closed-loop automated and | |||
| autonomous networking will require a greater focus on observability, | autonomous networking will require a greater focus on observability, | |||
| particularly through advancements in streaming telemetry with the | particularly through advancements in streaming telemetry with the | |||
| "on-change" feature [RFC9196]. | "on-change" feature [RFC9196]. | |||
| skipping to change at page 8, line 31 ¶ | skipping to change at line 344 ¶ | |||
| observability and analytics requirements, issues with data streaming, | observability and analytics requirements, issues with data streaming, | |||
| scalability, diverse models in heterogeneous multi-vendor | scalability, diverse models in heterogeneous multi-vendor | |||
| environments, and mechanisms to secure the network management | environments, and mechanisms to secure the network management | |||
| protocols. The presentation also emphasized how advancements in AI | protocols. The presentation also emphasized how advancements in AI | |||
| and machine learning, along with the potential adaptation of | and machine learning, along with the potential adaptation of | |||
| protocols designed for constrained environments, could drive the next | protocols designed for constrained environments, could drive the next | |||
| evolution in network management. | evolution in network management. | |||
| Using YANG-Push as an example, [GRAF] highlighted how standards | Using YANG-Push as an example, [GRAF] highlighted how standards | |||
| development often fails to align with the needs of network operators, | development often fails to align with the needs of network operators, | |||
| the constraints of network vendors, and the integration requirements. | the constraints of network vendors, and integration requirements. | |||
| Most critically, it lacks an agile, incremental development process. | Most critically, it lacks an agile, incremental development process. | |||
| The presentation advocated for adopting an iterative approach to | The presentation advocated for adopting an iterative approach to | |||
| standards development, focusing on delivering minimal viable products | standards development, focusing on delivering minimal viable products | |||
| as part of the process. | as part of the process. | |||
| [CONTRERAS] emphasized reassessing deployment assumptions and | [CONTRERAS] emphasized reassessing deployment assumptions and | |||
| incorporating updated operator requirements. The authors are | incorporating updated operator requirements. The authors are | |||
| addressing these aspects through | addressing these aspects through [OP-REQ-NM], leveraging feedback and | |||
| [I-D.ietf-nmop-rfc3535-20years-later], leveraging feedback and | discussions from the workshop. Some key requirements, suggestions, | |||
| discussions from the workshop. Some key requirements, suggestions | ||||
| and observations that were highlighted in the workshop: | and observations that were highlighted in the workshop: | |||
| * Network software implementations can only happen with a strong, | * Network software implementations can only happen with a strong, | |||
| committed standardization effort, complemented by active | committed standardization effort, complemented by active | |||
| involvement in open-source projects that facilitate access to | involvement in open-source projects that facilitate access to | |||
| code. | code. | |||
| * Need to rationalize the device model space and avoid redundant | * Need to rationalize the device model space and avoid redundant | |||
| efforts. Unlike service and network models, IETF-defined device | efforts. Unlike service and network models, IETF-defined device | |||
| models are not widely implemented. | models are not widely implemented. | |||
| * Define a reference approach/process for service exposure discovery | * Define a reference approach/process for service exposure discovery | |||
| (API discovery). | (API discovery). | |||
| * Outlines a set of recommendations for core/key features, along | * Outline a set of recommendations for core/key features, along with | |||
| with appropriate justifications, that will help foster more | appropriate justifications, that will help foster more | |||
| implementations that meet operators’ needs. | implementations that meet operators' needs. | |||
| * Reassess the value of some IETF proposals, including compared to | * Reassess the value of some IETF proposals, including comparison to | |||
| competing or emerging solutions (e.g., gNMI vs. YANG-Push) | competing or emerging solutions (e.g., gRPC Network Management | |||
| Interface (gNMI) vs. YANG-Push) | ||||
| * Need for a more agile process for the development and maintenance | * Need for a more agile process for the development and maintenance | |||
| of YANG modules in the IETF. RFCs might not be suited for | of YANG modules in the IETF. RFCs might not be suited for | |||
| documenting YANG modules. | documenting YANG modules. | |||
| * Consider approaches to ease integration by design (e.g., protocols | * Consider approaches to ease integration by design (e.g., protocols | |||
| and data models). | and data models). | |||
| * There is a need for a reference specification to translate YANG- | * Need for a reference specification to translate YANG-based data | |||
| based data into the knowledge graph (KG). | into the knowledge graph (KG). | |||
| * Consider approaches to help YANG models scale. | * Consider approaches to help YANG models scale. | |||
| * Consider programmatic approaches to ensure lossless mappings | * Consider programmatic approaches to ensure lossless mappings | |||
| between service/network/device data models. | between service/network/device data models. | |||
| * Consider approaches to ensure reuse/consistent data structure | * Consider approaches to ensure reuse of / consistent data structure | |||
| across various NM segments. | across various network management segments. | |||
| * Some networks have specific network management requirements, such | * Some networks have specific network management requirements, such | |||
| as the need for asynchronous operations or constraints on data | as the need for asynchronous operations or constraints on data | |||
| compactness. | compactness. | |||
| * There is a necessity to handle the heterogeneity of data, | * Necessity to handle the heterogeneity of data, configuration, and | |||
| configuration, and network management/requirements. Resolving | network management/requirements. Resolving such issues could draw | |||
| such issues could draw on insights from parallel technical fields | on insights from parallel technical fields such as knowledge | |||
| such as knowledge engineering practices and concepts associated | engineering practices and concepts associated with Linked Data in | |||
| with Linked Data in the Semantic Web, areas where it is common to | the Semantic Web, areas where it is common to manage problems of | |||
| manage problems of heterogeneity and data reconciliation across | heterogeneity and data reconciliation across various application | |||
| various application domains. | domains. | |||
| * Consider having YANG as part of the protocol specification/change | * Consider having YANG as part of the protocol specification/change | |||
| where possible, or have the YANG document progress in parallel. | where possible, or have the YANG document progress in parallel. | |||
| * Need to ease the integration of low-level/network-oriented | * Need to ease the integration of low-level/network-oriented | |||
| solutions with native "IT tooling" | solutions with native "IT tooling". | |||
| * Ease exposure of libraries and host tools (e.g., yangkit) to ease | * Ease exposure of libraries and host tools (e.g., yangkit) to ease | |||
| integration. | integration. | |||
| * Focus on tooling is needed, especially on the client side. | * Focus on tooling is needed, especially on the client side. | |||
| * Create an ecosystem where data and networking engineers can | * Create an ecosystem where data and networking engineers can | |||
| collaborate. | collaborate. | |||
| * The distinct approaches followed in both the compute and the | * Distinct approaches are followed in both the compute and the | |||
| network environments to define suitable mechanisms for enabling an | network environments to define suitable mechanisms for enabling an | |||
| efficient interplay, while highly automating the overall service | efficient interplay, while highly automating the overall service | |||
| delivery procedure. | delivery procedure. | |||
| * The target application/applicability of a network management | * The target application/applicability of a network management | |||
| approach should be documented. | approach should be documented. | |||
| * Readily available API specifications could be generalized from | * Readily available API specifications could be generalized from | |||
| YANG modules for fast development, prototyping, and validation. | YANG modules for fast development, prototyping, and validation. | |||
| 3.2.2. Survey | 3.2.2. Survey | |||
| As outlined in Section 2, the workshop program committee organized | As outlined in Section 2, the workshop program committee organized | |||
| outreach initiatives to gather direct feedback and conducted a | outreach initiatives to gather direct feedback and conducted a | |||
| survey. [SURVEY-INSIGHTS] provided an overview of the respondents’ | survey. [SURVEY-INSIGHTS] provided an overview of the respondents' | |||
| backgrounds, as well as insights into the most widely used tools, | backgrounds, as well as insights into the most widely used tools, | |||
| protocols, and APIs for configuration, monitoring, and other network | protocols, and APIs for configuration, monitoring, and other network | |||
| operations. Notably, the survey revealed that Ansible and CLI are | operations. Notably, the survey revealed that Ansible and CLI are | |||
| the most popular configuration tools, NETCONF is the preferred | the most popular configuration tools, NETCONF is the preferred | |||
| configuration protocol, and Prometheus and SNMP are widely used for | configuration protocol, and Prometheus and SNMP are widely used for | |||
| monitoring. The survey also captured feedback on network automation | monitoring. The survey also captured feedback on network automation | |||
| and streaming telemetry. Issues and future requirements such as | and streaming telemetry. Issues and future requirements such as | |||
| scalability, performance, the need for easier mapping of various | scalability, performance, the need for easier mapping of various | |||
| models, tooling, management of legacy devices, collaboration with | models, tooling, management of legacy devices, collaboration with | |||
| open-source, and vendor-specific issues were highlighted. | open source, and vendor-specific issues were highlighted. | |||
| Additionally, valuable insights from direct operator feedback were | Additionally, valuable insights from direct operator feedback were | |||
| also presented (see Appendix A). | presented (see Appendix A). | |||
| 3.2.3. Discussion | 3.2.3. Discussion | |||
| The Session II open discussion featured feedback from implementers, | The Session II open discussion featured feedback from implementers, | |||
| highlighting the difficulty in moving to YANG and mapping to vendor | highlighting the difficulty in moving to YANG and mapping to vendor | |||
| implementations and how divergence in the implementations creates | implementations and how divergence in implementations creates | |||
| complexity and necessitates workarounds. Implementations need to | complexity and necessitates workarounds. Implementations need to | |||
| support standard models alongside native vendor models, which adds | support standard models alongside native vendor models, which adds | |||
| complexity and leads to confusion. Challenges were highlighted in | complexity and leads to confusion. Challenges were highlighted in | |||
| mapping standard models to internal device models and legacy devices, | mapping standard models to internal device models and legacy devices, | |||
| with some cases where mapping is not feasible at all (device-specific | with some cases where mapping is not feasible at all (device-specific | |||
| knobs). The conversation also emphasized the importance of | knobs). The conversation also emphasized the importance of | |||
| developing open-source reference implementations, compliance and | developing open-source reference implementations, compliance and | |||
| interoperability testing for vendors with real data, and better | interoperability testing for vendors with real data, and better | |||
| quality of vendor implementation and documentation. The | quality of vendor implementation and documentation. The | |||
| implementation and support of multiple models (IETF, OpenConfig, and | implementation and support of multiple models (IETF, OpenConfig, and | |||
| native vendor models) is an unavoidable reality in network | native vendor models) is an unavoidable reality in network | |||
| management. Additionally, since the services offered by operators | management. Additionally, since the services offered by operators | |||
| vary significantly, reaching a consensus on a common service model | vary significantly, reaching a consensus on a common service model | |||
| within the IETF can be a challenging task. It was also noted that | within the IETF can be a challenging task. It was also noted that | |||
| the IETF should expedite the publication of standards as well as | the IETF should expedite the publication of standards as well as | |||
| consider gating them with multiple interoperable implementations. | consider gating them with multiple interoperable implementations. | |||
| 3.3. Session III: Future (possible solutions, recommendations and next | 3.3. Session III: Future - Possible Solutions, Recommendations, and | |||
| steps) | Next Steps | |||
| The final day of the workshop centred on exploring potential future | The final day of the workshop centered on exploring potential future | |||
| solutions and identifying key takeaways, recommendations, and next | solutions and identifying key takeaways, recommendations, and next | |||
| steps. At the end of day three, to conclude the workshop, the chairs | steps. At the end of day three, to conclude the workshop, the chairs | |||
| worked to summarize the key takeaways (see Section 3.4) that garnered | worked to summarize the key takeaways (see Section 3.4) that garnered | |||
| consensus among the participants. | consensus among the participants. | |||
| 3.3.1. Suggestions on Future Directions | 3.3.1. Suggestions on Future Directions | |||
| [CLAISE] highlighted the challenges of integrating data models across | [CLAISE] highlighted the challenges of integrating data models across | |||
| different silos, protocols, and data structures, emphasizing the need | different silos, protocols, and data structures, emphasizing the need | |||
| for a machine-readable approach to expose semantics. Additionally, | for a machine-readable approach to expose semantics. Additionally, | |||
| the related tools being developed and showcased in the IETF | the related tools being developed and showcased in the IETF | |||
| Hackathons, along with the various challenges in mapping across | Hackathons, along with the various challenges in mapping across | |||
| protocols and models, were discussed. A potential solution was | protocols and models, were discussed. A potential solution was | |||
| proposed using a knowledge graph based on the Semantic Web Stack, | proposed that uses a knowledge graph based on the Semantic Web Stack, | |||
| along with the need to define a basic ontology for the networking | along with the need to define a basic ontology for the networking | |||
| domain in an iterative manner (outside of RFCs). | domain in an iterative manner (outside of RFCs). | |||
| [WATSEN] recommends prioritizing the following areas in four | [WATSEN] recommended prioritizing the following into four areas: (1) | |||
| recommendations: (1) using RESTCONF+JSON (including YANG-Push Lite) | using RESTCONF+JSON (including YANG-Push Lite) as a single protocol | |||
| as a single protocol beyond network management, (2) utilizing Network | beyond network management, (2) utilizing Network Management Datastore | |||
| Management Datastore Architecture (NMDA) model, (3) creating data | Architecture (NMDA) model, (3) creating data model adapters (off-box | |||
| model adapters (off-box so that common standard models can be | so that common standard models can be developed in parallel to the | |||
| developed in parallel to the required device "native" vendor models), | required device "native" vendor models), and (4) defining device | |||
| and (4) defining device protocol adapters (with RESTCONF-like NBI for | protocol adapters (with RESTCONF-like Northbound Interface (NBI) for | |||
| a common shared-by-all repository). | a common shared-by-all repository). | |||
| [WILTON] recommends reducing unnecessary complexity, delivering | [WILTON] recommended reducing unnecessary complexity, delivering | |||
| timely solutions, fostering open collaboration between vendors and | timely solutions, fostering open collaboration between vendors and | |||
| operators, prioritizing simplicity, and converging to a single model/ | operators, prioritizing simplicity, and converging to a single model/ | |||
| protocol (though this was discussed as difficult to accomplish). | protocol (though this was discussed as difficult to accomplish). | |||
| Practical suggestions include focusing on YANG-Push Lite, introducing | Practical suggestions include focusing on YANG-Push Lite, introducing | |||
| YANG 2.0 through incremental updates, developing NETCONFv2, and | YANG 2.0 through incremental updates, developing NETCONFv2, and | |||
| managing IETF YANG models as code or APIs rather than embedding them | managing IETF YANG models as code or APIs rather than embedding them | |||
| within RFCs. | within RFCs. | |||
| 3.3.2. Discussion | 3.3.2. Discussion | |||
| The open discussion in Session III explored a range of topics. These | The open discussion in Session III explored a range of topics. These | |||
| included the absence of NMDA in OpenConfig and debate over whether | included the absence of NMDA in OpenConfig and debate over whether | |||
| its complexity is justified; the historical context of gNMI’s | its complexity is justified; the historical context of gNMI's | |||
| introduction in the IETF and whether RESTCONF offers advantages over | introduction in the IETF and whether RESTCONF offers advantages over | |||
| it; and the broader challenges of building consensus, with | it; and the broader challenges of building consensus, with | |||
| participants noting that while the process takes time, it should not | participants noting that while the process takes time, it should not | |||
| be short-circuited. The discussion also addressed the practicality | be short-circuited. The discussion also addressed the practicality | |||
| of converging on a single protocol and concluded that such | of converging on a single protocol and concluded that such | |||
| convergence is, in fact, feasible. | convergence is, in fact, feasible. | |||
| The discussion emphasized off-box adapters, which allow vendors to | The discussion emphasized off-box adapters, which allow vendors to | |||
| continue innovating and developing native vendor models rapidly. One | continue innovating and developing native vendor models rapidly. One | |||
| suggestion that attracted a lot of discussion centred on developing a | suggestion that attracted a lot of discussion centered on developing | |||
| standard model mapping to native vendor models that could be | a standard model mapping to native vendor models that could be | |||
| maintained in a common repository, enabling the community to assess | maintained in a common repository, enabling the community to assess | |||
| coverage and alignment. | coverage and alignment. | |||
| Further, the discussion explored alternative approaches to YANG | Further, the discussion explored alternative approaches to YANG | |||
| models within the IETF but outside of RFCs, such as leveraging GitHub | models within the IETF but outside of RFCs, such as leveraging GitHub | |||
| to accelerate the process (along with the challenges associated with | to accelerate the process (along with the challenges associated with | |||
| it), living documents within the WG charter, and supporting academia | it), living documents within the WG charter, and supporting academia | |||
| to take up the open source efforts, such as device adapters. The | to take up the open source efforts, such as device adapters. The | |||
| discussion emphasized the need for process experimentation, | discussion emphasized the need for process experimentation, | |||
| particularly at the working group or area level, where we could have | particularly at the working group or area level, where we could have | |||
| consensus among the YANG/OPS community on how we iterate in WGs | consensus among the YANG/OPS community on how we iterate in WGs | |||
| without IETF/RFC-wide changes, but making sure the operators are | without IETF-/RFC-wide changes, but making sure the operators are | |||
| involved in the process. | involved in the process. | |||
| Conversations ensued around questions asked, such as "Is YANG | Conversations ensued around questions asked, such as "Is YANG | |||
| applicable beyond network management?" and "Can applications adopt | applicable beyond network management?" and "Can applications adopt | |||
| YANG as a modelling language to define their services?" | YANG as a modeling language to define their services?" | |||
| Some key recommendations made by operators during outreach | Some key recommendations made by operators during outreach | |||
| (Section 2) are listed in Appendix B. | (Section 2) are listed in Appendix B. | |||
| 3.4. Key Takeaways | 3.4. Key Takeaways | |||
| At the end of the third day, the discussion turned to key takeaways | At the end of the third day, the discussion turned to key takeaways | |||
| that have a high-level consensus. These were live edited during the | that have a high-level consensus. These were edited live during the | |||
| last discussion of the workshop, and anything that did not reach a | last discussion of the workshop, and anything that did not reach a | |||
| wide consensus was moved into a "future considerations" list | wide consensus was moved into a "future considerations" list | |||
| (Section 3.4.5). | (Section 3.4.5). | |||
| 3.4.1. Ecosystem conclusions | 3.4.1. Ecosystem Conclusions | |||
| The following takeaways try to document the general thinking of the | The following takeaways try to document the general thinking of the | |||
| participants with respect to the entire Network Management ecosystem | participants with respect to the entire network management ecosystem | |||
| as it exists today. | as it exists today. | |||
| 1. The current network management protocols, models and tools still | 1. The current network management protocols, models, and tools still | |||
| fail the ‘ease of use’ requirement. Participants noted that the | fail the 'ease of use' requirement. Participants noted that the | |||
| tools almost matter more than the protocols. | tools almost matter more than the protocols. | |||
| 2. The overall ecosystem is still fragmented for both protocols and | 2. The overall ecosystem is still fragmented for both protocols and | |||
| data models. SNMP is still used extensively for monitoring, and | data models. SNMP is still used extensively for monitoring, and | |||
| the CLI is still heavily relied on for configuration in many | the CLI is still heavily relied on for configuration in many | |||
| networks. Popular protocols include SNMP, NETCONF, RESTCONF, and | networks. Popular protocols include SNMP, NETCONF, RESTCONF, and | |||
| gNMI. | gNMI. | |||
| 3. Documentation about the architecture and usage of the network | 3. Documentation about the architecture and usage of the network | |||
| management ecosystem is lacking. More work is needed to create | management ecosystem is lacking. More work is needed to create | |||
| skipping to change at page 13, line 35 ¶ | skipping to change at line 585 ¶ | |||
| 4. Transitioning between network management frameworks is | 4. Transitioning between network management frameworks is | |||
| challenging, just like it is for transitioning between other | challenging, just like it is for transitioning between other | |||
| protocols like IPv4 to IPv6. | protocols like IPv4 to IPv6. | |||
| 5. Model-driven network management is generally a success where it | 5. Model-driven network management is generally a success where it | |||
| has been implemented and is possible to use. | has been implemented and is possible to use. | |||
| 6. More easily usable network management tools for the operators are | 6. More easily usable network management tools for the operators are | |||
| needed. The lack of open-source tools is seen as a barrier to | needed. The lack of open-source tools is seen as a barrier to | |||
| adoption. Tools need good use cases, example flows and better | adoption. Tools need good use cases, example flows, and better | |||
| analysis of when and how they work and have been successful. | analysis of when and how they work and have been successful. | |||
| 3.4.2. Protocol conclusions | 3.4.2. Protocol Conclusions | |||
| The following conclusions came while discussing Network Management | The following conclusions were reached while discussing network | |||
| protocols, more specifically. | management protocols, more specifically. | |||
| 1. NETCONF and YANG are not used much for monitoring tasks. | 1. NETCONF and YANG are not used much for monitoring tasks. | |||
| 2. NETCONF and YANG do not have full coverage on many devices. | 2. NETCONF and YANG do not have full coverage on many devices. | |||
| 3. Polling-based solutions are still frequently deployed. Push- | 3. Polling-based solutions are still frequently deployed. Push- | |||
| based solutions are often desired but are not yet widely | based solutions are often desired but are not yet widely | |||
| available. | available. | |||
| 3.4.3. Modeling conclusions | 3.4.3. Modeling Conclusions | |||
| The following conclusions came while discussing Network Management | The following conclusions were reached while discussing network | |||
| modeling, more specifically. | management modeling, more specifically. | |||
| 1. Some YANG models can become complex due to the underlying | 1. Some YANG models can become complex due to the underlying | |||
| features they represent, not due to the language itself. | features they represent, not due to the language itself. | |||
| 2. Multi-vendor compatibility support is required. | 2. Multi-vendor compatibility support is required. | |||
| 3. Even vendor-specific features, not just standardized protocol | 3. Even vendor-specific features, not just standardized protocol | |||
| features, need to be exposed through network management models | features, need to be exposed through network management models | |||
| and protocols for a network management ecosystem to be viable. | and protocols for a network management ecosystem to be viable. | |||
| skipping to change at page 14, line 30 ¶ | skipping to change at line 626 ¶ | |||
| level modeling can be a building block to achieve a sufficient | level modeling can be a building block to achieve a sufficient | |||
| service-level model, but it is not a complete solution by itself. | service-level model, but it is not a complete solution by itself. | |||
| 5. Network configuration needs to be verifiable to ensure any | 5. Network configuration needs to be verifiable to ensure any | |||
| potential changes can be accepted by devices. Model translation | potential changes can be accepted by devices. Model translation | |||
| adapters (likely performed on the management station, not the end | adapters (likely performed on the management station, not the end | |||
| device) may be the best path forward to simultaneously achieve | device) may be the best path forward to simultaneously achieve | |||
| this and the goal of supporting one configuration set across a | this and the goal of supporting one configuration set across a | |||
| diversity of devices with different internal models. | diversity of devices with different internal models. | |||
| 3.4.4. Standardization conclusions | 3.4.4. Standardization Conclusions | |||
| The following conclusions were reached while discussing the best ways | The following conclusions were reached while discussing the best ways | |||
| to standardize network management protocols and associated models. | to standardize network management protocols and associated models. | |||
| 1. A methodology of rapid model development procedures is needed to | 1. A methodology of rapid model development procedures is needed to | |||
| ensure model deployment can keep pace with new feature | ensure model deployment can keep pace with new feature | |||
| deployment. We need a solution that significantly increases the | deployment. We need a solution that significantly increases the | |||
| speed and predictable timeline for developing and publishing | speed and predictable timeline for developing and publishing | |||
| models within the IETF. New approaches and methods to make | models within the IETF. New approaches and methods to make | |||
| models live outside of published RFCs should be explored. An | models live outside of published RFCs should be explored. An | |||
| experiment should be started to test a new rapid development | experiment should be started to test a new rapid development | |||
| approach. | approach. | |||
| 2. Protocol and model complexity should be reduced to keep additions | 2. Protocol and model complexity should be reduced to keep additions | |||
| and changes to a minimal set of agreed-upon core features. | and changes to a minimal set of agreed-upon core features. | |||
| 3. More standardization focus is needed on the scalability of the | 3. More standardization focus is needed on the scalability of the | |||
| different roles of network management: monitoring, configuration, | different roles of network management: monitoring, configuration, | |||
| notifications. | and notifications. | |||
| 4. Enhancements to network management protocols and models need to | 4. Enhancements to network management protocols and models need to | |||
| be backed by real-world operator use cases and expected adoption | be backed by real-world operator use cases and expected adoption | |||
| by vendors. Vendors and operators will need to work together to | by vendors. Vendors and operators will need to work together to | |||
| ensure these goals are appropriately met. | ensure these goals are appropriately met. | |||
| 3.4.5. Conclusions that did not reach consensus during the takeaways | 3.4.5. Conclusions That Did Not Reach Consensus During the Takeaways | |||
| discussion | Discussion | |||
| Here we list the things that the group realized needed significantly | Here, we list the things that the group realized needed significantly | |||
| more attention in order to come to a conclusion while updating the | more attention in order to come to a conclusion, while updating the | |||
| key takeaways in real time. | key takeaways in real time. | |||
| 1. Some, but not all, saw NETCONF for configuration as being | 1. Some, but not all, saw NETCONF for configuration as being | |||
| successful in some larger-scale deployments. Although this | successful in some larger-scale deployments. Although this | |||
| statement is true in some contexts, many operators indicated | statement is true in some contexts, many operators indicated | |||
| their need to rely on other forms of access to manage their | their need to rely on other forms of access to manage their | |||
| networks, such as CLIs, Expect scripts, and other protocols. | networks, such as CLIs, Expect scripts, and other protocols. | |||
| 2. Many hope that NETCONF, and RESTCONF more specifically, will | 2. Many hope that NETCONF, and RESTCONF more specifically, will | |||
| continue to move to a long-term configuration management | continue to move to a long-term configuration management | |||
| skipping to change at page 15, line 37 ¶ | skipping to change at line 679 ¶ | |||
| keep pace with the device deployment pace. | keep pace with the device deployment pace. | |||
| While many other items also need further discussion, this list | While many other items also need further discussion, this list | |||
| specifically includes those that were actively discussed during the | specifically includes those that were actively discussed during the | |||
| live editing session in the workshop. | live editing session in the workshop. | |||
| 4. Not Covered in the Workshop | 4. Not Covered in the Workshop | |||
| Some topics absent from the workshop discussions included tooling | Some topics absent from the workshop discussions included tooling | |||
| (what is currently missing) and strategies to support tool | (what is currently missing) and strategies to support tool | |||
| development (who pays, who develops, who maintains). The primary | development (who pays, who develops, and who maintains). The primary | |||
| focus of the discussion was on YANG and NETCONF/RESTCONF, while | focus of the discussion was on YANG and NETCONF/RESTCONF, while | |||
| several other network management protocols and techniques currently | several other network management protocols and techniques currently | |||
| used received less attention during the workshop. The discussion | used received less attention. During the workshop, the discussion on | |||
| during the workshop on possible future directions prioritized | possible future directions prioritized improving existing solutions | |||
| improving existing solutions rather than introducing entirely new | rather than introducing entirely new ones (such as enabling | |||
| ones (such as enabling intelligence in network management). | intelligence in network management). | |||
| 5. Security Considerations | 5. Security Considerations | |||
| This document is a workshop report and does not impact the security | This document is a workshop report and does not impact the security | |||
| of the Internet. | of the Internet. | |||
| 6. IANA Considerations | 6. IANA Considerations | |||
| This document does not have any IANA considerations. | This document has no IANA actions. | |||
| [Note to the RFC Editor: Please remove this section during | ||||
| publication.] | ||||
| 7. Informative References | 7. Informative References | |||
| [BLESS] Bless, R., "An Invariant for Future Resilient Network | [BLESS] Bless, R., "An Invariant for Future Resilient Network | |||
| Management Operations", November 2024, | Management Operations", November 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-paper-an- | <https://www.ietf.org/slides/slides-nemopsws-paper-an- | |||
| invariant-for-future-resilient-network-management- | invariant-for-future-resilient-network-management- | |||
| operations-00.pdf>. | operations-00.pdf>. | |||
| [BORMANN] Bormann, C., "CORECONF: Managing IoT Devices with YANG | [BORMANN] Bormann, C., "CORECONF: Managing IoT Devices with YANG | |||
| Models", November 2024, <https://www.ietf.org/slides/ | Models", November 2024, <https://www.ietf.org/slides/ | |||
| slides-nemopsws-paper-coreconf-managing-iot-devices-with- | slides-nemopsws-paper-coreconf-managing-iot-devices-with- | |||
| yang-models-00.pdf>. | yang-models-00.pdf>. | |||
| [CLAISE] Claise, B., Graf, T., Keller, H., Voyer, D., Lucente, P., | [CLAISE] Claise, B., Graf, T., Keller, H., Voyer, D., Lucente, P., | |||
| Lopez, D., Martinez-Casanueva, I., Peters, B., Fasano, P., | Lopez, D., Martinez-Casanueva, I. D., Peters, B., Fasano, | |||
| Ran, P., Cheng, W., and M. Mackey, "Knowledge Graph | P., Ran, P., Cheng, W., and M. Mackey, "Knowledge Graph | |||
| Framework for Network Operations", November 2024, | Framework for Network Operations", November 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-paper- | <https://www.ietf.org/slides/slides-nemopsws-paper- | |||
| knowledge-graph-framework-for-network-operations-00.pdf>. | knowledge-graph-framework-for-network-operations-00.pdf>. | |||
| [CONTRERAS] | [CONTRERAS] | |||
| Boucadair, M., Contreras, L. M., Gonzalez de Dios, O., | Boucadair, M., Contreras, L. M., Gonzalez de Dios, O., | |||
| Graf, T., Rahman, R., and L. Tailhardat, "RFC 3535, 20 | Graf, T., Rahman, R., and L. Tailhardat, "RFC 3535, 20 | |||
| Years Later: An Update of Operators Requirements on | Years Later: An Update of Operators Requirements on | |||
| Network Management Protocols and Modelling", October 2024, | Network Management Protocols and Modelling", October 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-paper- | <https://www.ietf.org/slides/slides-nemopsws-paper- | |||
| rfc3535-years-later-an-update-of-operators-requirements- | rfc3535-years-later-an-update-of-operators-requirements- | |||
| on-network-management-protocols-and-modelling-00.pdf>. | on-network-management-protocols-and-modelling-00.pdf>. | |||
| [CORECONF] Veillette, M., Van der Stok, P., Pelov, A., Bierman, A., | ||||
| and C. Bormann, "CoAP Management Interface (CORECONF)", | ||||
| Work in Progress, Internet-Draft, draft-ietf-core-comi-21, | ||||
| 2 March 2026, <https://datatracker.ietf.org/doc/html/ | ||||
| draft-ietf-core-comi-21>. | ||||
| [ECKERT] Eckert, T. and M. Richardson, "Resilient Remote | [ECKERT] Eckert, T. and M. Richardson, "Resilient Remote | |||
| Manageability of Wide-Area Network Infrastructures", | Manageability of Wide-Area Network Infrastructures", | |||
| November 2024, <https://www.ietf.org/slides/slides- | November 2024, <https://www.ietf.org/slides/slides- | |||
| nemopsws-paper-resilient-remote-managability-of-wide-area- | nemopsws-paper-resilient-remote-managability-of-wide-area- | |||
| network-infrastructures-00.pdf>. | network-infrastructures-00.pdf>. | |||
| [FARRER] Larsson, K., Lambrechts, K., and I. Farrer, "RFC3535, 20 | [FARRER] Larsson, K., Lambrechts, K., and I. Farrer, "RFC3535, 20 | |||
| Years Later from an Operator's Perspective (Deutsche | Years Later from an Operator's Perspective (Deutsche | |||
| Telekom)", November 2024, <https://www.ietf.org/slides/ | Telekom)", November 2024, <https://www.ietf.org/slides/ | |||
| slides-nemopsws-paper-rfc3535-years-later-from-an- | slides-nemopsws-paper-rfc3535-years-later-from-an- | |||
| operators-perspective-deutsche-telekom-00.pdf>. | operators-perspective-deutsche-telekom-00.pdf>. | |||
| [FOROUGHI] Foroughi, P. and L. Ciavaglia, "Projecting Data Mesh to | [FOROUGHI] Foroughi, P. and L. Ciavaglia, "Projecting Data Mesh to | |||
| Model-driven Telemetry: A Path to Data Ecosystem’s | Model-driven Telemetry: A Path to Data Ecosystem's | |||
| Management Operations", November 2024, | Management Operations", November 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-paper- | <https://www.ietf.org/slides/slides-nemopsws-paper- | |||
| projecting-data-mesh-to-model-driven-telemetry-a-path-to- | projecting-data-mesh-to-model-driven-telemetry-a-path-to- | |||
| data-ecosystems-management-operations-00.pdf>. | data-ecosystems-management-operations-00.pdf>. | |||
| [GIRALT] Contreras, L. M., Schott, R., Randriamasy, S., Yang, R., | [GIRALT] Contreras, L. M., Schott, R., Randriamasy, S., Yang, R., | |||
| and J. Ros-Giralt, "Towards a Unified Compute and | and J. Ros-Giralt, "Towards a Unified Compute and | |||
| Communication Infrastructure for Application and Network | Communication Infrastructure for Application and Network | |||
| Management", November 2024, <https://www.ietf.org/slides/ | Management", November 2024, <https://www.ietf.org/slides/ | |||
| slides-nemopsws-paper-towards-a-unified-compute-and- | slides-nemopsws-paper-towards-a-unified-compute-and- | |||
| communication-infrastructure-for-application-and-network- | communication-infrastructure-for-application-and-network- | |||
| management-00.pdf>. | management-00.pdf>. | |||
| [GRAF] Graf, T., Keller, H., Voyer, D., Lucente, P., Claise, B., | [GRAF] Graf, T., Keller, H., Voyer, D., Lucente, P., Claise, B., | |||
| Wilton, R., Huang-Feng, A., and P. Francois, "Agile | Wilton, R., Huang-Feng, A., and P. Francois, "Agile | |||
| Incremental Driven Development for Network Management", | Incremental Driven Development for Network Management", | |||
| November 2024, <https://www.ietf.org/slides/slides- | November 2024, <https://www.ietf.org/slides/slides- | |||
| nemopsws-paper-agile-incremental-driven-development-for- | nemopsws-paper-agile-incremental-driven-development-for- | |||
| network-management-01.pdf>. | network-management-01.pdf>. | |||
| [GUDI] Gudi, M., Pelov, A., Toutain, L., and J. Bonnin, "Evolving | [GUDI] Gudi, M., Pelov, A., Toutain, L., and J. M. Bonnin, | |||
| Network Management Architecture: Integrating CORECONF with | "Evolving Network Management Architecture: Integrating | |||
| NETCONF for Efficient Telemetry and Management", November | CORECONF with NETCONF for Efficient Telemetry and | |||
| 2024, <https://www.ietf.org/slides/slides-nemopsws-paper- | Management", November 2024, <https://www.ietf.org/slides/ | |||
| evolving-network-management-architecture-integrating- | slides-nemopsws-paper-evolving-network-management- | |||
| coreconf-with-netconf-for-efficient-telemetry-and- | architecture-integrating-coreconf-with-netconf-for- | |||
| management-00.pdf>. | efficient-telemetry-and-management-00.pdf>. | |||
| [HARDAKER] Hardaker, W., "Lessons Learned from 30 Years of Net-SNMP", | [HARDAKER] Hardaker, W., "Lessons Learned from 30 Years of Net-SNMP", | |||
| November 2024, <https://www.ietf.org/slides/slides- | November 2024, <https://www.ietf.org/slides/slides- | |||
| nemopsws-paper-lessons-learned-from-30-years-of-net-snmp- | nemopsws-paper-lessons-learned-from-30-years-of-net-snmp- | |||
| 00.pdf>. | 00.pdf>. | |||
| [I-D.ietf-core-comi] | ||||
| Veillette, M., Van der Stok, P., Pelov, A., Bierman, A., | ||||
| and C. Bormann, "CoAP Management Interface (CORECONF)", | ||||
| Work in Progress, Internet-Draft, draft-ietf-core-comi-20, | ||||
| 6 May 2025, <https://datatracker.ietf.org/doc/html/draft- | ||||
| ietf-core-comi-20>. | ||||
| [I-D.ietf-nmop-rfc3535-20years-later] | ||||
| Boucadair, M., Contreras, L. M., de Dios, O. G., Graf, T., | ||||
| Rahman, R., and L. Tailhardat, "An Update of Operators | ||||
| Requirements on Network Management Protocols and | ||||
| Modelling", Work in Progress, Internet-Draft, draft-ietf- | ||||
| nmop-rfc3535-20years-later-00, 7 August 2025, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-nmop- | ||||
| rfc3535-20years-later-00>. | ||||
| [JIMENEZ] Jiménez, J., Mansfield, S., , Pesonen, M., Torvinen, V., | [JIMENEZ] Jiménez, J., Mansfield, S., , Pesonen, M., Torvinen, V., | |||
| and J. Karvonen, "Evolving Challenges and Solutions in | and J. Karvonen, "Evolving Challenges and Solutions in | |||
| Network Management", November 2024, | Network Management", November 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-paper- | <https://www.ietf.org/slides/slides-nemopsws-paper- | |||
| evolving-challenges-and-solutions-in-network-management- | evolving-challenges-and-solutions-in-network-management- | |||
| 00.pdf>. | 00.pdf>. | |||
| [JIMENEZ-2] | [JIMENEZ-2] | |||
| Jiménez, J., "Managing IoT Devices with LwM2M", November | Jiménez, J., "Managing IoT Devices with LwM2M", November | |||
| 2024, <https://www.ietf.org/slides/slides-nemopsws-paper- | 2024, <https://www.ietf.org/slides/slides-nemopsws-paper- | |||
| managing-iot-devices-with-lwmm-00.pdf>. | managing-iot-devices-with-lwmm-00.pdf>. | |||
| [KELLER] Warnke, N., Geib, R., Horneffer, M., and H. Keller, | [KELLER] Warnke, N., Geib, R., Horneffer, M., and H. Keller, | |||
| "NEMOPS: RFC3535 and the forgotten word — Or Provisioning | "NEMOPS: RFC3535 and the forgotten word - Or Provisioning | |||
| is only a subset of Network Management", November 2024, | is only a subset of Network Management", November 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-nemops- | <https://www.ietf.org/slides/slides-nemopsws-nemops- | |||
| rfc3535-and-the-forgotten-word-00.pdf>. | rfc3535-and-the-forgotten-word-00.pdf>. | |||
| [MARTINEZ] Martinez-Casanueva, I., "IAB NEMOPS Position Paper - | [MARTINEZ] Martinez-Casanueva, I. D., "IAB NEMOPS Position Paper - | |||
| Telefonica", November 2024, <https://www.ietf.org/slides/ | Telefonica", November 2024, <https://www.ietf.org/slides/ | |||
| slides-nemopsws-paper-iab-nemops-position-paper- | slides-nemopsws-paper-iab-nemops-position-paper- | |||
| telefonica-00.pdf>. | telefonica-00.pdf>. | |||
| [NET-SNMP] "Net-SNMP", n.d., <http://www.net-snmp.org/>. | [NET-SNMP] "Net-SNMP", <http://www.net-snmp.org/>. | |||
| [OP-REQ-NM] | ||||
| Boucadair, M., Contreras, L. M., de Dios, O. G., Graf, T., | ||||
| and R. Rahman, "An Update of Operators Requirements on | ||||
| Network Management Protocols and Modelling", Work in | ||||
| Progress, Internet-Draft, draft-ietf-nmop-rfc3535-20years- | ||||
| later-03, 20 March 2026, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-nmop- | ||||
| rfc3535-20years-later-03>. | ||||
| [OPENCONFIG] | [OPENCONFIG] | |||
| "OpenConfig", n.d., <https://www.openconfig.net/>. | "OpenConfig", <https://www.openconfig.net/>. | |||
| [RFC3535] Schoenwaelder, J., "Overview of the 2002 IAB Network | [RFC3535] Schoenwaelder, J., "Overview of the 2002 IAB Network | |||
| Management Workshop", RFC 3535, DOI 10.17487/RFC3535, May | Management Workshop", RFC 3535, DOI 10.17487/RFC3535, May | |||
| 2003, <https://www.rfc-editor.org/rfc/rfc3535>. | 2003, <https://www.rfc-editor.org/info/rfc3535>. | |||
| [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | |||
| and A. Bierman, Ed., "Network Configuration Protocol | and A. Bierman, Ed., "Network Configuration Protocol | |||
| (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | |||
| <https://www.rfc-editor.org/rfc/rfc6241>. | <https://www.rfc-editor.org/info/rfc6241>. | |||
| [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | |||
| RFC 7950, DOI 10.17487/RFC7950, August 2016, | RFC 7950, DOI 10.17487/RFC7950, August 2016, | |||
| <https://www.rfc-editor.org/rfc/rfc7950>. | <https://www.rfc-editor.org/info/rfc7950>. | |||
| [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | |||
| Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | |||
| <https://www.rfc-editor.org/rfc/rfc8040>. | <https://www.rfc-editor.org/info/rfc8040>. | |||
| [RFC8309] Wu, Q., Liu, W., and A. Farrel, "Service Models | [RFC8309] Wu, Q., Liu, W., and A. Farrel, "Service Models | |||
| Explained", RFC 8309, DOI 10.17487/RFC8309, January 2018, | Explained", RFC 8309, DOI 10.17487/RFC8309, January 2018, | |||
| <https://www.rfc-editor.org/rfc/rfc8309>. | <https://www.rfc-editor.org/info/rfc8309>. | |||
| [RFC9196] Lengyel, B., Clemm, A., and B. Claise, "YANG Modules | [RFC9196] Lengyel, B., Clemm, A., and B. Claise, "YANG Modules | |||
| Describing Capabilities for Systems and Datastore Update | Describing Capabilities for Systems and Datastore Update | |||
| Notifications", RFC 9196, DOI 10.17487/RFC9196, February | Notifications", RFC 9196, DOI 10.17487/RFC9196, February | |||
| 2022, <https://www.rfc-editor.org/rfc/rfc9196>. | 2022, <https://www.rfc-editor.org/info/rfc9196>. | |||
| [SCHARF] Scharf, M., "Network Management Challenges for IP-based | [SCHARF] Scharf, M., "Network Management Challenges for IP-based | |||
| Cyber-Physical Networks", November 2024, | Cyber-Physical Networks", November 2024, | |||
| <https://www.ietf.org/slides/slides-nemopsws-paper- | <https://www.ietf.org/slides/slides-nemopsws-paper- | |||
| network-management-challenges-for-ip-based-cyber-physical- | network-management-challenges-for-ip-based-cyber-physical- | |||
| networks-00.pdf>. | networks-00.pdf>. | |||
| [SCHONWALDER] | [SCHONWALDER] | |||
| Schönwälder, J., "Composable, Declarative, Reproducible, | Schönwälder, J., "Composable, Declarative, Reproducible, | |||
| Verifiable Network and Service Configurations", November | Verifiable Network and Service Configurations", November | |||
| skipping to change at page 20, line 20 ¶ | skipping to change at line 885 ¶ | |||
| [WILTON] Wilton, R. and N. Corran, "Device Network Management - | [WILTON] Wilton, R. and N. Corran, "Device Network Management - | |||
| Current Status, and Future Direction", November 2024, | Current Status, and Future Direction", November 2024, | |||
| <https://datatracker.ietf.org/doc/slides-nemopsws-paper- | <https://datatracker.ietf.org/doc/slides-nemopsws-paper- | |||
| device-network-management-current-status-and-future- | device-network-management-current-status-and-future- | |||
| direction/>. | direction/>. | |||
| Appendix A. Operator Feedback | Appendix A. Operator Feedback | |||
| This section compiles the operator feedback gathered through outreach | This section compiles the operator feedback gathered through outreach | |||
| and information gathering at various operational venues (RIPE, NANOG, | and information gathering at various operational venues (RIPE, NANOG, | |||
| APRICOT, LACNIC, AutoConn, etc). The PC synthesized this input and | APRICOT, LACNIC, AutoConn, etc.). The PC synthesized this input and | |||
| presented it during the workshop (see Section 3.2.2). | presented it during the workshop (see Section 3.2.2). | |||
| A.1. General | A.1. General | |||
| 1. In network deployments, operations are typically at the bottom of | 1. In network deployments, operations are typically at the bottom of | |||
| the ladder. It's the most squeezed for time and resources. | the ladder. It's the most squeezed for time and resources. | |||
| Network engineers are not typically seasoned developers. The | Network engineers are not typically seasoned developers. The | |||
| development of needed in-house tools often takes years to | development of needed in-house tools often takes years to | |||
| develop. There is a need for tools that are easy to use and just | develop. There is a need for tools that are easy to use and just | |||
| work. | work. | |||
| 2. The vast majority of smaller operators use CLI and open source to | 2. The vast majority of smaller operators use CLI and open source to | |||
| manage their networks. | manage their networks. | |||
| 3. There is debate fatigue. The protocol/model debate is a | 3. There is debate fatigue. The protocol/model debate is a | |||
| recurring conversation. The problem isn’t going away. | recurring conversation. The problem isn't going away. | |||
| 4. It was suggested that other domains (e.g., K8N/automation) are | 4. It was suggested that other domains (e.g., K8N/automation) are | |||
| years ahead of the current network engineering stack. | years ahead of the current network engineering stack. | |||
| 5. Support for multiple friendly, stable and feature-rich libraries | 5. Support for multiple friendly, stable, and feature-rich libraries | |||
| for programming languages is needed. Many DevOps routines use | for programming languages is needed. Many DevOps routines use | |||
| shell scripts, while others use a high-level programming | shell scripts, while others use a high-level programming | |||
| language. In any case, on the client side, multiple programming | language. In any case, on the client side, multiple programming | |||
| languages are used. | languages are used. | |||
| 6. Screen scraping is unfortunately necessary and painful. This | 6. Screen scraping is unfortunately necessary and painful. This | |||
| most often occurs when interacting with a device having only a | most often occurs when interacting with a device that only has a | |||
| CLI. | CLI. | |||
| 7. It was noted that there could be an outreach to Academia to | 7. It was noted that there could be an outreach to Academia to | |||
| establish programs to teach lessons using modern management | establish programs to teach lessons using modern management | |||
| stacks, and then a new generation of engineers could help to | stacks, and then a new generation of engineers could help to | |||
| improve tooling and automation, with university (and/or IETF) | improve tooling and automation, with university (and/or IETF) | |||
| hackathons. | hackathons. | |||
| A.2. Data Models | A.2. Data Models | |||
| 1. In some network deployments, the focus is solely on service-level | 1. In some network deployments, the focus is solely on service-level | |||
| models, such that device-level protocols and device-level models | models, such that device-level protocols and device-level models | |||
| are unimportant. This assumes the existence of a device | are unimportant. This assumes the existence of a device | |||
| adaptation layer to transcode service-level models to device- | adaptation layer to transcode service-level models to device- | |||
| level models and conform to the device-specific protocol. | level models and conform to the device-specific protocol. | |||
| 2. There is a need for solutions to not hide vendor-specific | 2. There is a need for solutions to not hide vendor-specific | |||
| parameters. Currently, vendors compete by differentiating their | parameters. Currently, vendors compete by differentiating their | |||
| offerings in unique ways. The reason why an Operator may choose | offerings in unique ways. The reason why an operator may choose | |||
| a particular vendor is because of its differentiating features. | a particular vendor is because of its differentiating features. | |||
| Whilst standard models enable conformance, they must not hide the | Whilst standard models enable conformance, they must not hide the | |||
| vendor-specific parameters. YANG deviations are a partial | vendor-specific parameters. YANG deviations are a partial | |||
| solution to not hiding vendor knobs. | solution to not hiding vendor knobs. | |||
| 3. It was emphasized that streaming telemetry requires picking a | 3. It was emphasized that streaming telemetry requires picking a | |||
| model and sticking with it. It is quite a commitment, and the | model and sticking with it. It is quite a commitment, and the | |||
| current environment makes the decision harder. | current environment makes the decision harder. | |||
| 4. It was noted that IETF's focus should be on defining abstract/ | 4. It was noted that IETF's focus should be on defining abstract/ | |||
| service-level data models since it is the only thing the | service-level data models since it is the only thing the | |||
| community may ever agree on. | community may ever agree on. | |||
| 5. It was noted that navigating standard models can be difficult. | 5. It was noted that navigating standard models can be difficult. A | |||
| The Network Engineer knows the vendor CLI commands but has | network engineer knows the vendor CLI commands but has trouble | |||
| trouble locating the corresponding leaves in the standard YANG | locating the corresponding leaves in the standard YANG models | |||
| models defined by SDOs. | defined by Standards Development Organizations (SDOs). | |||
| 6. There was a wish that the IETF and OpenConfig models would merge. | 6. There was a wish that the IETF and OpenConfig models would merge. | |||
| Appendix B. Key Recommendations from Operator Feedback | Appendix B. Key Recommendations from Operator Feedback | |||
| Various recommendations were made by the operators during the | Various recommendations were made by the operators during the | |||
| outreach events. The key ones presented during the workshop were | outreach events. The key ones presented during the workshop were | |||
| (there were a lot more collected): | (note that there were a lot more collected): | |||
| * Everyone: Continue to focus on model-driven management as a means | * Everyone: Continue to focus on model-driven management as a means | |||
| to achieve automation. | to achieve automation. | |||
| * SDOs: Re-introduce “running code” as part of the specification | * SDOs: Re-introduce "running code" as part of the specification | |||
| verification process. | verification process. | |||
| * Operators: Be actively involved with the “running code” efforts. | * Operators: Be actively involved with the "running code" efforts. | |||
| * IETF: Recommend a solution stack for common use cases. | * IETF: Recommend a solution stack for common use cases. | |||
| * Technology Ambassadors: Evangelize the recommended solution stack | * Technology Ambassadors: Evangelize the recommended solution stack | |||
| for common cases. | for common cases. | |||
| * Vendors: Support the recommended approach to the solution stack | * Vendors: Support the recommended approach to the solution stack | |||
| for common cases. | for common cases. | |||
| Appendix C. Position Papers | Appendix C. Position Papers | |||
| 20 position papers were submitted to the workshop call for papers. | 20 position papers were submitted to the workshop call for papers. | |||
| All papers are available at | All papers are available at | |||
| https://datatracker.ietf.org/group/nemopsws/materials/ | <https://datatracker.ietf.org/group/nemopsws/materials/>. | |||
| (https://datatracker.ietf.org/group/nemopsws/materials/). | ||||
| This is the list of all papers: | This is the list of all papers: | |||
| * J Schönwälder: Composable, Declarative, Reproducible, Verifiable | * J. Schönwälder: Composable, Declarative, Reproducible, Verifiable | |||
| Network and Service Configurations [SCHONWALDER] | Network and Service Configurations [SCHONWALDER] | |||
| * K. Larsson, K. Lambrechts, and I. Farrer: RFC3535, 20 Years | * K. Larsson, K. Lambrechts, and I. Farrer: RFC3535, 20 Years Later | |||
| Later from an Operator’s Perspective (Deutsche Telekom) [FARRER] | from an Operator's Perspective (Deutsche Telekom) [FARRER] | |||
| * W. Hardaker: Lessons Learned from 30 Years of Net-SNMP [HARDAKER] | * W. Hardaker: Lessons Learned from 30 Years of Net-SNMP [HARDAKER] | |||
| * C. Bormann: CORECONF: Managing IoT Devices with YANG Models | * C. Bormann: CORECONF: Managing IoT Devices with YANG Models | |||
| [BORMANN] | [BORMANN] | |||
| * R. Shakir: Rethinking Standardisation of Network Management | * R. Shakir: Rethinking Standardisation of Network Management | |||
| [SHAKIR] | [SHAKIR] | |||
| * N. Warnke, R. Geib, M. Horneffer, and H. Keller: NEMOPS: | * N. Warnke, R. Geib, M. Horneffer, and H. Keller: NEMOPS: RFC3535 | |||
| RFC3535 and the forgotten word — Or Provisioning is only a subset | and the forgotten word - Or Provisioning is only a subset of | |||
| of Network Management [KELLER] | Network Management [KELLER] | |||
| * J. Jiménez, S. Mansfield, R. Rodriguez A., M. Pesonen, V. | * J. Jiménez, S. Mansfield, R. Rodriguez A., M. Pesonen, | |||
| Torvinen, and J. Karvonen: Evolving Challenges and Solutions in | V. Torvinen, and J. Karvonen: Evolving Challenges and Solutions in | |||
| Network Management [JIMENEZ] | Network Management [JIMENEZ] | |||
| * M. Boucadair, L. M. Contreras, O. Gonzalez de Dios, T. Graf, | * M. Boucadair, LM. Contreras, O. Gonzalez de Dios, T. Graf, | |||
| R. Rahman, and L. Tailhardat: RFC 3535, 20 Years Later: An | R. Rahman, and L. Tailhardat: RFC 3535, 20 Years Later: An Update | |||
| Update of Operators Requirements on Network Management Protocols | of Operators Requirements on Network Management Protocols and | |||
| and Modelling [CONTRERAS] | Modelling [CONTRERAS] | |||
| * T. Graf, H. Keller, D. Voyer, P. Lucente, B. Claise, R. | * T. Graf, H. Keller, D. Voyer, P. Lucente, B. Claise, R. Wilton, | |||
| Wilton, A. Huang-Feng, and P. Francois: Agile Incremental Driven | A. Huang-Feng, and P. Francois: Agile Incremental Driven | |||
| Development for Network Management [GRAF] | Development for Network Management [GRAF] | |||
| * B. Claise, T. Graf, H. Keller, D. Voyer, P. Lucente, D. | * B. Claise, T. Graf, H. Keller, D. Voyer, P. Lucente, D. Lopez, | |||
| Lopez, I. D. Martinez-Casanueva, B. Peters, P. Fasano, P. | I. D. Martinez-Casanueva, B. Peters, P. Fasano, P. Ran, W. Cheng, | |||
| Ran, W. Cheng, and M. Mackey: Knowledge Graph Framework for | and M. Mackey: Knowledge Graph Framework for Network Operations | |||
| Network Operations [CLAISE] | [CLAISE] | |||
| * K. Watsen: Four Thoughts for How to Improve Network Management | * K. Watsen: Four Thoughts for How to Improve Network Management for | |||
| for Operators [WATSEN] | Operators [WATSEN] | |||
| * R. Wilton and N. Corran: Device Network Management: Current | * R. Wilton and N. Corran: Device Network Management: Current Status | |||
| Status and Future Direction [WILTON] | and Future Direction [WILTON] | |||
| * M. Gudi, A. Pelov, L. Toutain, and J.-M. Bonnin: Evolving | * M. Gudi, A. Pelov, L. Toutain, and J. M. Bonnin: Evolving Network | |||
| Network Management Architecture: Integrating CORECONF with NETCONF | Management Architecture: Integrating CORECONF with NETCONF for | |||
| for Efficient Telemetry and Management [GUDI] | Efficient Telemetry and Management [GUDI] | |||
| * P. Foroughi and L. Ciavaglia: Projecting Data Mesh to Model- | * P. Foroughi and L. Ciavaglia: Projecting Data Mesh to Model-driven | |||
| driven Telemetry: A Path to Data Ecosystem’s Management Operations | Telemetry: A Path to Data Ecosystem's Management Operations | |||
| [FOROUGHI] | [FOROUGHI] | |||
| * I. D. Martinez-Casanueva: IAB NEMOPS Position Paper - Telefonica | * I. D. Martinez-Casanueva: IAB NEMOPS Position Paper - Telefonica | |||
| [MARTINEZ] | [MARTINEZ] | |||
| * J. Jiménez: Managing IoT Devices with LwM2M [JIMENEZ-2] | * J. Jiménez: Managing IoT Devices with LwM2M [JIMENEZ-2] | |||
| * L. M. Contreras, R. Schott, S. Randriamasy, R. Yang, and J. | * LM. Contreras, R. Schott, S. Randriamasy, R. Yang, and J. Ros- | |||
| Ros-Giralt: Towards a Unified Compute and Communication | Giralt: Towards a Unified Compute and Communication Infrastructure | |||
| Infrastructure for Application and Network Management [GIRALT] | for Application and Network Management [GIRALT] | |||
| * T. Eckert and M. Richardson: Resilient Remote Manageability of | * T. Eckert and M. Richardson: Resilient Remote Manageability of | |||
| Wide-Area Network Infrastructures [ECKERT] | Wide-Area Network Infrastructures [ECKERT] | |||
| * R. Bless: An Invariant for Future Resilient Network Management | * R. Bless: An Invariant for Future Resilient Network Management | |||
| Operations [BLESS] | Operations [BLESS] | |||
| * M. Scharf: Network Management Challenges for IP-based Cyber- | * M. Scharf: Network Management Challenges for IP-based Cyber- | |||
| Physical Networks [SCHARF] | Physical Networks [SCHARF] | |||
| Appendix D. Workshop Participants | Appendix D. Workshop Participants | |||
| The workshop participants were Alex Huang, Alexander Clemm, Alexander | The workshop participants were Alex Huang, Alexander Clemm, Alexander | |||
| Pelov, Benoit Claise, Boris Khasanov, Brad Peters, Carsten Bormann, | Pelov, Benoît Claise, Boris Khasanov, Brad Peters, Carsten Bormann, | |||
| Chongfeng Xie, Cindy Morgan, Dan Voyer, Darren Loher, Dean | Chongfeng Xie, Cindy Morgan, Dan Voyer, Darren Loher, Dean | |||
| Bogdanovic, Dean Bogdanović, Dhruv Dhody, Diego Lopez, Ebben Aries, | Bogdanovic, Dean Bogdanović, Dhruv Dhody, Diego Lopez, Ebben Aries, | |||
| Frank (Chong Feng), Holger Keller, Ian Farrer, Jaime Jimenez, James | Frank (Chong Feng), Holger Keller, Ian Farrer, Jaime Jimenez, James | |||
| Cumming, Janne Karvonen, Jason Sterne, Jiaming Ye, Jinming Li, John | Cumming, Janne Karvonen, Jason Sterne, Jiaming Ye, Jinming Li, John | |||
| Carson, Julien Maisonneuve, Jürgen Schönwälder, Kent Watsen, Kris | Carson, Julien Maisonneuve, Jürgen Schönwälder, Kent Watsen, Kris | |||
| Lambrechts, Kristian Larsson, Laurent Ciavaglia, Laurent Toutain, Liz | Lambrechts, Kristian Larsson, Laurent Ciavaglia, Laurent Toutain, Liz | |||
| Flynn, Luis M. Contreras, Mahesh Jethanandani, Manoj Gudi, Martin | Flynn, Luis M. Contreras, Mahesh Jethanandani, Manoj Gudi, Martin | |||
| Horneffer, Matthew Bocci, Med Boucadair, Michael Mackey, Michael | Horneffer, Matthew Bocci, Med Boucadair, Michael Mackey, Michael | |||
| Richardson, Michael Scharf, Mikko Pesonen, Nacho Dominguez, Naveen | Richardson, Michael Scharf, Mikko Pesonen, Nacho Dominguez, Naveen | |||
| Achyuta, Nick Corran, Nils Warnke, Oscar Gonzalez de Dios, Paolo | Achyuta, Nick Corran, Nils Warnke, Oscar Gonzalez de Dios, Paolo | |||
| Lucente, Parisa Foroughi, Per Andersson, Phil Shafer, Qin Wu, Qiufang | Lucente, Parisa Foroughi, Per Andersson, Phil Shafer, Qin Wu, Qiufang | |||
| Ma, Raquel Rodriguez, Reshad Rahman, Rob Shakir, Rob Wilton, Roland | Ma, Raquel Rodriguez, Reshad Rahman, Rob Shakir, Rob Wilton, Roland | |||
| Bless, Roland Schott, Rüdiger Geib, Rui Zhuang, Ruibo Han, Sabine | Bless, Roland Schott, Rüdiger Geib, Rui Zhuang, Ruibo Han, Sabine | |||
| Randriamasy, Scott Mansfield, Scott Robohn, Shengnan Yue, Suresh | Randriamasy, Scott Mansfield, Scott Robohn, Shengnan Yue, Suresh | |||
| Krishnan, Thomas Graf, Toerless Eckert, Wangbo, Warren Kumari, Wes | Krishnan, Thomas Graf, Toerless Eckert, Wangbo, Warren Kumari, Wes | |||
| Hardaker, Wim Henderickx, Xue Yang, Y. Richard Yang, Yangbo, Yisong | Hardaker, Wim Henderickx, Xue Yang, Y. Richard Yang, Yangbo, Yisong | |||
| Liu, and Zhenqiang Li. | Liu, and Zhenqiang Li. | |||
| Appendix E. Workshop Program Committee | Appendix E. Workshop Program Committee | |||
| The workshop program committee members were Wes Hardaker (co-chair), | The workshop program committee members were Wes Hardaker (co-chair), | |||
| Dhruv Dhody (co-chair), Qin Wu, Suresh Krishnan, Benoît Claise, | Dhruv Dhody (co-chair), Qin Wu, Suresh Krishnan, Benoît Claise, | |||
| Mohamed Boucadair, Mahesh Jethanandani, Kent Watsen, and Warren | Mohamed Boucadair, Mahesh Jethanandani, Kent Watsen, and Warren | |||
| Kumari. | Kumari. | |||
| IAB Members at the Time of Approval | IAB Members at the Time of Approval | |||
| End of changes. 123 change blocks. | ||||
| 313 lines changed or deleted | 302 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||