• Aucun résultat trouvé

<CODE BEGINS> file "ietf-network-topology-state@2018-02-26.yang"

module ietf-network-topology-state { yang-version 1.1;

namespace "urn:ietf:params:xml:ns:yang:ietf-network-topology-state";

prefix nt-s;

import ietf-network-state { prefix nw-s;

reference

"RFC 8345: A YANG Data Model for Network Topologies";

}

import ietf-network-topology { prefix nt;

reference

"RFC 8345: A YANG Data Model for Network Topologies";

}

organization

"IETF I2RS (Interface to the Routing System) Working Group";

contact

"WG Web: <https://datatracker.ietf.org/wg/i2rs/>

WG List: <mailto:i2rs@ietf.org>

Editor: Alexander Clemm

<mailto:ludwig@clemm.org>

Editor: Jan Medved

<mailto:jmedved@cisco.com>

Editor: Robert Varga

<mailto:robert.varga@pantheon.tech>

Editor: Nitin Bahadur

<mailto:nitin_bahadur@yahoo.com>

Editor: Hariharan Ananthakrishnan <mailto:hari@packetdesign.com>

Editor: Xufeng Liu

<mailto:xufeng.liu.ietf@gmail.com>";

description

"This module defines a common base data model for network

topology state, representing topology that either (1) is learned or (2) results from applying topology that has been configured per the ’ietf-network-topology’ data model, mirroring the corresponding data nodes in this data model. It augments the base network state data model with links to connect nodes, as well as termination points to terminate links on nodes.

The data model mirrors ’ietf-network-topology’ but contains only read-only state data. The data model is not needed when the underlying implementation infrastructure supports the Network Management Datastore Architecture (NMDA).

Copyright (c) 2018 IETF Trust and the persons identified as authors of the code. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, is permitted pursuant to, and subject to the license terms contained in, the Simplified BSD License set forth in Section 4.c of the IETF Trust’s Legal Provisions Relating to IETF Documents

(https://trustee.ietf.org/license-info).

This version of this YANG module is part of RFC 8345;

see the RFC itself for full legal notices.";

revision 2018-02-26 { description

"Initial revision.";

reference

"RFC 8345: A YANG Data Model for Network Topologies";

}

grouping link-ref {

path "/nw-s:networks/nw-s:network[nw-s:network-id=current()"+

"/../network-ref]/nt-s:link/nt-s:link-id";

path "/nw-s:networks/nw-s:network[nw-s:network-id=current()"+

"/../network-ref]/nw-s:node[nw-s:node-id=current()/../"+

links between the same source and destination nodes.

Likewise, a link could potentially be re-homed between termination points. Therefore, in order to ensure that we would always know to distinguish between links, every link is identified by a dedicated link identifier. Note that a link models a point-to-point link, not a multipoint link.";

container source { description

"This container holds the logical source of a particular link.";

leaf source-node { type leafref {

path "../../../nw-s:node/nw-s:node-id";

require-instance false;

}

description

"Source node identifier. Must be in the same topology.";

}

leaf source-tp { type leafref {

path "../../../nw-s:node[nw-s:node-id=current()/../"+

"source-node]/termination-point/tp-id";

require-instance false;

}

description

"This termination point is located within the source node and terminates the link.";

} }

container destination { description

"This container holds the logical destination of a particular link.";

leaf dest-node { type leafref {

path "../../../nw-s:node/nw-s:node-id";

require-instance false;

}

description

"Destination node identifier. Must be in the same network.";

}

leaf dest-tp {

augment "/nw-s:networks/nw-s:network/nw-s:node" { description

"Augments termination points that terminate links.

Termination points can ultimately be mapped to interfaces.";

list termination-point {

leaf tp-ref { type leafref {

path "/nw-s:networks/nw-s:network[nw-s:network-id="+

"current()/../network-ref]/nw-s:node[nw-s:node-id="+

"current()/../node-ref]/termination-point/tp-id";

require-instance false;

}

description

"Reference to the underlay node (the underlay node must be in a different topology).";

} } } } }

<CODE ENDS>

Appendix C. An Example

This section contains an example of an instance data tree in JSON encoding [RFC7951]. The example instantiates "ietf-network-topology"

(and "ietf-network", which "ietf-network-topology" augments) for the topology depicted in Figure 7. There are three nodes: D1, D2, and D3. D1 has three termination points (1-0-1, 1-2-1, and 1-3-1).

D2 has three termination points as well (2-1-1, 2-0-1, and 2-3-1).

D3 has two termination points (3-1-1 and 3-2-1). In addition, there are six links, two between each pair of nodes with one going in each direction.

+---+ +---+

| D1 | | D2 | /-\ /-\ /-\ /-\

| | 1-0-1 | |--->| | 2-1-1 | | | | 1-2-1 | |<---| | 2-0-1 | | \-/ 1-3-1 \-/ \-/ 2-3-1 \-/

| /----\ | | /----\ | +---| |---+ +---| |---+

\----/ \----/

A | A | | | | | | | | | | | +---+ | | | | | D3 | | | | | /-\ /-\ | | | +--->| | 3-1-1 | |---+ | +---| | 3-2-1 | |<---+

\-/ \-/

| | +---+

Figure 7: A Network Topology Example

The corresponding instance data tree is depicted in Figure 8:

{

"ietf-network:networks": { "network": [

{

"network-types": { },

"network-id": "otn-hc", "node": [

{

"node-id": "D1",

"termination-point": [ {

"tp-id": "1-0-1"

}, {

"tp-id": "1-2-1"

}, {

"tp-id": "1-3-1"

} ] }, {

"node-id": "D2",

"termination-point": [ {

"tp-id": "2-0-1"

}, {

"tp-id": "2-1-1"

}, {

"tp-id": "2-3-1"

} ] },

{

{

"link-id": "D3,3-1-1,D1,1-3-1", "source": {

"source-node": "D3", "source-tp": "3-1-1"

}

"destination": { "dest-node": "D1", "dest-tp": "1-3-1"

} }, {

"link-id": "D2,2-3-1,D3,3-2-1", "source": {

"source-node": "D2", "source-tp": "2-3-1"

}

"destination": { "dest-node": "D3", "dest-tp": "3-2-1"

} }, {

"link-id": "D3,3-2-1,D2,2-3-1", "source": {

"source-node": "D3", "source-tp": "3-2-1"

}

"destination": { "dest-node": "D2", "dest-tp": "2-3-1"

} } ] } ] } }

Figure 8: Instance Data Tree

Acknowledgments

We wish to acknowledge the helpful contributions, comments, and suggestions that were received from Alia Atlas, Andy Bierman, Martin Bjorklund, Igor Bryskin, Benoit Claise, Susan Hares, Ladislav Lhotka, Carlos Pignataro, Juergen Schoenwaelder, Robert Wilton, Qin Wu, and Xian Zhang.

Contributors

More people contributed to the data model presented in this paper than can be listed in the "Authors’ Addresses" section. Additional contributors include:

o Vishnu Pavan Beeram, Juniper o Ken Gray, Cisco

o Tom Nadeau, Brocade o Tony Tkacik

o Kent Watsen, Juniper o Aleksandr Zhdankin, Cisco

Authors’ Addresses Alexander Clemm

Huawei USA - Futurewei Technologies Inc.

Santa Clara, CA

United States of America

Email: ludwig@clemm.org, alexander.clemm@huawei.com

Jan Medved Cisco

Email: jmedved@cisco.com

Robert Varga

Pantheon Technologies SRO

Email: robert.varga@pantheon.tech

Nitin Bahadur Bracket Computing

Email: nitin_bahadur@yahoo.com

Hariharan Ananthakrishnan Packet Design

Email: hari@packetdesign.com

Xufeng Liu Jabil

Email: xufeng.liu.ietf@gmail.com

Documents relatifs