<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-network-inventory-topology-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Inventory Topology Mapping">A YANG Network Data Model for Inventory Topology Mapping</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-07"/>
    <author fullname="Bo Wu" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="19"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG</workgroup>
    <keyword>Automation</keyword>
    <keyword>Network Digital Map</keyword>
    <keyword>Network Inventory</keyword>
    <keyword>Network Operation</keyword>
    <keyword>Network Topology</keyword>
    <abstract>
      <?line 54?>

<t>This document defines a YANG data model that extends the network
topology data model (RFC 8345) to map network topologies with inventories. The data model
introduces the "inventory-topology" network type and augmentations
for physical entity mappings and capabilities, which may be used by
any overlay network topology for service provisioning validation,
network maintenance, and capacity planning.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Inventory YANG Working Group mailing list (inventory-yang@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-ivy-wg/network-inventory-topology"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-ivy-network-inventory-yang"/> defines the base network inventory
  model to aggregate the inventory data of Network Elements (NEs). This data includes identification of these NEs and their hardware,
  firmware, and software components.  Examples
   of inventory hardware components could be rack, shelf, slot, board,
   or physical port.  Examples of inventory software components could
   be platform Operating System (OS), software-modules, bios, or boot-loader <xref target="I-D.ietf-ivy-network-inventory-software"/>.</t>
      <t>In order to ease navigation between inventory and network topologies,
this document extends the network topology data model <xref target="RFC8345"/> for network
inventory mapping: "ietf-network-inventory-topology" (<xref target="sec-module"/>).  This data model provides a mechanism for the correlation with existing
network and topology data models, such as "A YANG Network Data Model for Service Attachment Points (SAPs)" <xref target="RFC9408"/>,
"A YANG Data Model for Layer 2 Network Topologies" <xref target="RFC8944"/>, and "A YANG Data Model for Layer 3 Topologies" <xref target="RFC8346"/>.</t>
      <t>Similar to the base inventory data model  <xref target="I-D.ietf-ivy-network-inventory-yang"/>, the network inventory topology
does not make any assumption about involved NEs and their roles in topologies. As such, the mapping
data model can be applied independent of the network type (optical local loops, access network, core network, etc.) and application.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
          </li>
        </ul>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>AAAA --&gt; the assigned RFC number for <xref target="I-D.ietf-ivy-network-inventory-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The meanings of the symbols in the YANG tree diagrams are defined in <xref target="RFC8340"/>.</t>
      <t>This document uses terms defined in <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <t>The document adheres to the folding conventions in <xref target="RFC8792"/>.</t>
    </section>
    <section anchor="sample">
      <name>Sample Use Cases of the Data Model</name>
      <section anchor="determine-available-resources-of-service-attachment-points-saps">
        <name>Determine Available Resources of Service Attachment Points (SAPs)</name>
        <t>The inventory topology data model correlates underlay physical
resource information with the SAP network data model <xref target="RFC9408"/>.
While the SAP data model provides the provider network view with the
points from which services can be attached, the inventory
topology model maps those SAPs to their underlying physical
ports, enabling the orchestrator to verify whether a candidate
SAP has sufficient physical capacity.</t>
        <t><xref target="nwi-topology-usage"/> illustrates the query interactions.
During service provisioning, the orchestrator can issue a query using the SAP
data model (e.g., obtaining a list of SAPs across multiple PEs
as shown in <xref section="A" sectionFormat="of" target="RFC9408"/>), and then uses the
inventory topology data model to check the physical resources of the
candidate SAPs.  Specifically, the "parent-termination-point"
of a SAP is mapped to the corresponding "port-component-ref"
in the inventory topology, allowing the orchestrator to verify
port availability and capacity.</t>
        <t>If the physical port underlying a candidate SAP has insufficient
resources (e.g., port speed fully utilized), the orchestrator
can select an alternate SAP that maps to a different port
with adequate capacity.  If no alternative SAP is available,
the orchestrator flags the request for manual intervention,
providing the operator with precise inventory information
about the bottleneck (e.g., "Port GE0/6/1 on NE-PE1 is at 95% utilization").
The resource constraint can also feed into a "what-if" analysis
(see <xref target="sec-whatif"/>) to evaluate hardware upgrades or
alternative underlay paths.</t>
        <figure anchor="nwi-topology-usage">
          <name>An Example Usage of Network Inventory Topology</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="488" viewBox="0 0 488 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,288 L 32,320" fill="none" stroke="black"/>
                <path d="M 136,32 L 136,64" fill="none" stroke="black"/>
                <path d="M 136,112 L 136,160" fill="none" stroke="black"/>
                <path d="M 136,208 L 136,256" fill="none" stroke="black"/>
                <path d="M 192,160 L 192,200" fill="none" stroke="black"/>
                <path d="M 208,64 L 208,104" fill="none" stroke="black"/>
                <path d="M 208,256 L 208,288" fill="none" stroke="black"/>
                <path d="M 224,160 L 224,200" fill="none" stroke="black"/>
                <path d="M 280,32 L 280,64" fill="none" stroke="black"/>
                <path d="M 280,112 L 280,160" fill="none" stroke="black"/>
                <path d="M 280,208 L 280,256" fill="none" stroke="black"/>
                <path d="M 384,288 L 384,320" fill="none" stroke="black"/>
                <path d="M 136,32 L 280,32" fill="none" stroke="black"/>
                <path d="M 136,64 L 280,64" fill="none" stroke="black"/>
                <path d="M 136,112 L 280,112" fill="none" stroke="black"/>
                <path d="M 136,160 L 280,160" fill="none" stroke="black"/>
                <path d="M 136,208 L 280,208" fill="none" stroke="black"/>
                <path d="M 136,256 L 280,256" fill="none" stroke="black"/>
                <path d="M 32,288 L 384,288" fill="none" stroke="black"/>
                <path d="M 32,320 L 384,320" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="232,200 220,194.4 220,205.6" fill="black" transform="rotate(90,224,200)"/>
                <polygon class="arrowhead" points="216,104 204,98.4 204,109.6" fill="black" transform="rotate(90,208,104)"/>
                <polygon class="arrowhead" points="200,200 188,194.4 188,205.6" fill="black" transform="rotate(90,192,200)"/>
                <g class="text">
                  <text x="212" y="52">Customer</text>
                  <text x="36" y="84">Customer</text>
                  <text x="104" y="84">Service</text>
                  <text x="168" y="84">request</text>
                  <text x="52" y="100">(e.g.,</text>
                  <text x="100" y="100">L3SM</text>
                  <text x="136" y="100">and</text>
                  <text x="176" y="100">L2SM)</text>
                  <text x="200" y="132">Service</text>
                  <text x="208" y="148">Orchestration</text>
                  <text x="76" y="180">(1a)</text>
                  <text x="120" y="180">Query</text>
                  <text x="164" y="180">SAPs</text>
                  <text x="252" y="180">(1b)</text>
                  <text x="300" y="180">Verify</text>
                  <text x="364" y="180">physical</text>
                  <text x="32" y="196">via</text>
                  <text x="64" y="196">SAP</text>
                  <text x="100" y="196">Data</text>
                  <text x="144" y="196">Model</text>
                  <text x="268" y="196">capacity</text>
                  <text x="320" y="196">via</text>
                  <text x="376" y="196">Inventory</text>
                  <text x="452" y="196">Topology</text>
                  <text x="208" y="228">Network</text>
                  <text x="204" y="244">Controller</text>
                  <text x="208" y="308">Network</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                  .-----------------.
                  |     Customer    |
                  '--------+--------'
  Customer Service request |
     (e.g., L3SM and L2SM) v
                  .--------+--------.
                  |    Service      |
                  |  Orchestration  |
                  '------+---+------'
         (1a) Query SAPs |   | (1b) Verify physical
    via SAP Data Model   v   v capacity via Inventory Topology
                  .------+---+------.
                  |     Network     |
                  |   Controller    |
                  '--------+--------'
                           |
     .---------------------+---------------------.
     |                  Network                  |
     '-------------------------------------------'
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sec-whatif">
        <name>"What-if" Scenarios</name>
        <t><xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> defines Network Digital Twin (NDT)
   as a virtual representation of the physical network.  Such
    representation is meant to be used to analyze,
   diagnose, emulate, and then manage the physical network based on
   data, models, and interfaces.</t>
        <t><xref target="I-D.ietf-nmop-simap-concept"/> defines Service and Infrastructure Maps (SIMAP)
 as an abstraction model that provides a unified view of both service and
 infrastructure information, enabling correlation between service requirements
 and underlying resource capabilities.</t>
        <t>Both architectures require accurate mapping between logical network topology
 and physical inventory as a foundational data layer. This model provides
 the essential physical resource information to such systems, enabling
 them to perform accurate "what-if" analysis (e.g., impact prediction
 of hardware End-of-Life, path re-optimization under resource constraints, service
 availability assessment).</t>
      </section>
    </section>
    <section anchor="module-tree-structure">
      <name>Module Tree Structure</name>
      <t>An overview of the structure of the "ietf-network-inventory-topology" module is shown in <xref target="tree"/>.</t>
      <figure anchor="tree">
        <name>The Structure of the Network Inventory Mapping Data Model</name>
        <artwork type="ascii-art" align="center"><![CDATA[
module: ietf-network-inventory-topology

  augment /nw:networks/nw:network/nw:network-types:
    +--rw inventory-topology!
  augment /nw:networks/nw:network/nw:node:
    +--rw inventory-mapping-attributes
       +--rw ne-ref?   nwi:ne-ref
  augment /nw:networks/nw:network/nt:link:
    +--rw inventory-mapping-attributes
       +--rw link-type?   identityref
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw inventory-mapping-attributes
    |  +--rw ne-ref?     nwi:ne-ref
    |  +--rw port-ref?   leafref
    +--ro port-breakout!
       +--ro breakout-channel* [channel-id]
          +--ro channel-id    uint16
]]></artwork>
      </figure>
      <t>The module augments the "ietf-network-topology" module as follows:</t>
      <dl>
        <dt>Inventory mapping attributes for nodes, and termination points:</dt>
        <dd>
          <t>The corresponding containers augments the topology module with the references to the base network inventory</t>
        </dd>
      </dl>
      <section anchor="link-extensions">
        <name>Link Extensions</name>
        <t>This document adds a lightweight "link-type" leaf to the topology link mapping to enable basic physical media classification.</t>
        <dl>
          <dt>"link-type":</dt>
          <dd>
            <t>An identityref indicating the link media type.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of wired link types are "copper", "fiber", or "coax". For wireless media, values such as "microwave", or "wlan" may be used. See also <xref target="RFC9656"/> for more detailed microwave radio attributes.</t>
          </dd>
          <dt/>
          <dd>
            <t>The "link-type" serves as a lightweight discriminator that guides to the
 appropriate specialized inventory model for detailed resource information.
 For example, wired media ("fiber" or "copper") typically references a passive
 network inventory model such as the one defined in <xref target="I-D.ygb-ivy-passive-network-inventory"/>.</t>
          </dd>
        </dl>
      </section>
      <section anchor="port-breakout-capability">
        <name>Port-Breakout Capability</name>
        <t>High-density Ethernet ports (e.g., 400 Gb/s DR4) can be split into
multiple independent lower-speed channels. The breakout channels
represent the intrinsic capability of the port to be partitioned,
regardless of whether the port is currently configured as a trunk or as
a breakout port.</t>
        <t>A trunk port is associated with exactly one physical interface.
A breakout port is a port that is decomposed into two or more physical
interfaces; those interfaces may run at the same or different speeds
and may consume the same or a different number of breakout channels.</t>
        <t>The container "port-breakout" is added under the termination-point
augmentation.  It lists the logical channels into which the single
physical port can be divided.  Only termination-points whose parent
port is breakout-capable need to instantiate the container; otherwise
the container is omitted, keeping the topology model minimal for the
common non-breakout case.</t>
        <t>Breakout channel is an atomic resource element obtained by partitioning a breakout port.
One physical interface may be associated with one or more breakout
channels, but one breakout channel MUST NOT be associated with more
than one physical interface. Appendix B provides example configurations.</t>
        <t>It is assumed that a port which supports breakout can be configured
either as a trunk port or as a breakout port. Interface channelisation (e.g., VLAN sub-interfaces) is
outside the scope of this document and is addressed by the Layer 2 network topology model <xref target="RFC8944"/>.</t>
      </section>
    </section>
    <section anchor="sec-module">
      <name>Network Inventory Topology YANG Module</name>
      <t>This module augments the Network Topology module defined in <xref target="RFC8345"/>.</t>
      <t>This module imports the base network inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <sourcecode type="yang" markers="true" name="ietf-network-inventory-topology@2026-05-19.yang"><![CDATA[
module ietf-network-inventory-topology {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology";
  prefix nwit;

  import ietf-network {
    prefix nw;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies,
                 Section 4.1";
  }
  import ietf-network-topology {
    prefix nt;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies,
                 Section 4.2";
  }
  import ietf-network-inventory {
    prefix nwi;
    reference
      "RFC AAAA: A YANG Data Model for Network Inventory";
  }

  organization
    "IETF Network Inventory YANG (ivy) Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/ivy>
     WG List:  IVY <mailto:inventory-yang@ietf.org>

     Editor: Bo Wu
             <lana.wubo@huawei.com>
     Editor: Mohamed Boucadair
             <mohamed.boucadair@orange.com>
     Author: Cheng Zhou
             <zhouchengyjy@chinamobile.com>
     Author: Qin Wu
             <bill.wu@huawei.com>";
  description
    "This YANG module defines a YANG module for network
     topology and inventory mapping.

     Copyright (c) 2026 IETF Trust and the persons identified
     as authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.";

  revision 2026-05-19 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A Network Data Model for Inventory Topology
                 Mapping";
  }

  identity link-type {
    description
      "Base identity for classifying the physical media type of a
       link at the inventory topology layer.  Specialized inventory
       models are expected to define derived identities for specific
       media, e.g., fiber, copper, or wireless.";
  }

  identity copper {
    base link-type;
    description
      "Copper-based physical link.";
  }

  identity fiber {
    base link-type;
    description
      "Fiber-based physical link.";
  }

  identity coax {
    base link-type;
    description
      "Coaxial cable-based physical link.";
  }

  identity microwave {
    base link-type;
    description
      "Microwave-based wireless link.
       Detailed microwave radio attributes are defined in the
       microwave topology data model.";
    reference
      "RFC 9656: A YANG Data Model for Microwave Topology";
  }

  identity wlan {
    base link-type;
    description
      "IEEE 802.11 wireless link.";
  }

  identity unknown {
    base link-type;
    description
      "The link media type is unknown or could not be determined.
       This identity is used as a fallback when the physical medium
       cannot be classified into any of the other defined types.";
  }

  identity leased-fiber {
    base fiber;
    description
      "Leased fiber link.  The physical medium is fiber, but the link
       is provided by a third-party operator.  Detailed physical
       attributes are typically not visible to the lessee.";
  }

  // Main blocks

  augment "/nw:networks/nw:network/nw:network-types" {
    description
      "Introduces a new network type for inventory topology
       mapping.";
    container inventory-topology {
      presence
        "Indicates this is a bottom-most physical topology instance,
         containing physical-layer attributes including inventory
         mapping, port breakout capabilities, and link media types.";
      description
        "Container for the inventory-topology network type.
         When present, it signals that the network contains
         physical-layer augmentations as defined in this module.
         This network type is intended to serve as the underlay
         for logical network topologies (Layer 2, Layer 3,
         Traffic Engineering (TE), etc.).";
    }
  }

  augment "/nw:networks/nw:network/nw:node" {
    when '../nw:network-types/nwit:inventory-topology';
    description
      "Augments the network topology node with inventory mapping
       attributes. This enables correlation between the logical node
       and its physical network element.";
    container inventory-mapping-attributes {
      description
        "Container for inventory mapping attributes of a node.";
      leaf ne-ref {
        type nwi:ne-ref;
        description
          "Reference to the NE in the inventory that corresponds to
           this topology node.

           This reference establishes a 1:1 mapping between the
           logical node and its physical NE.";
      }
    }
  }

  augment "/nw:networks/nw:network/nt:link" {
    when '../nw:network-types/nwit:inventory-topology';
    description
      "Augments the network topology link with inventory-related
       attributes.";
    container inventory-mapping-attributes {
      description
        "Container for inventory-related attributes of a link.

         This container provides lightweight media classification.
         The link-type indicates which specialized inventory model
         contains detailed resource information:

         - Wired media (fiber, copper): passive network inventory
         - Wireless media (microwave, Wi-Fi): wireless-specific
           inventory

           Detailed inventory references may be added in future
           modules.";
      leaf link-type {
        type identityref {
          base link-type;
        }
        description
          "Classification of the link media type at the topology
           layer.

           The base identity 'link-type' is extensible. Examples
           of derived identities include 'copper', 'fiber',
           'coax', 'microwave', and 'wlan'.

           This leaf serves as a lightweight discriminator.  When
           the value is 'microwave', detailed microwave link
           attributes are defined in the microwave topology data
           model. Wired media (e.g., fiber, copper, or coax) may
           be detailed in a passive network inventory data
           model.";
      }
    }
  }

  augment "/nw:networks/nw:network/nw:node/nt:termination-point" {
    when '../../nw:network-types/nwit:inventory-topology';
    description
      "Augments the TP with inventory mapping and port breakout.";
    container inventory-mapping-attributes {
      description
        "Container for inventory mapping attributes of a TP.";
      uses nwi:port-ref {
        refine "port-ref" {
          description
            "Reference to the physical port component in the
             network inventory. This reference establishes a 1:1
             mapping between the logical TP and its physical port
             component.";
        }
      }
    }
    // breakout channels (lightweight, per physical port)
    container port-breakout {
      presence "Indicates the port supports channel breakout.";
      config false;
      description
        "Breakout capability of the physical port represented by
         this TP. One TP maps to one physical port; channels are
         listed here. This container is present only when the
         underlying hardware supports partitioning the port into
         multiple independent channels (e.g., 400G to 4x100G).";
      list breakout-channel {
        key "channel-id";
        description
          "List of breakout channels available on this port.
           Each entry represents an independent lane or sub-port
           that can be used for channelized interfaces.";
        leaf channel-id {
          type uint16;
          description
            "Unique identifier for the breakout channel within the
             scope of the parent port.";
        }
      } // breakout-channel
    } // port-breakout       
  }
}
]]></sourcecode>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This model enables a network controller to report discovered network topology and inventory information. Automatic discovery serves as the primary mechanism, with selective configuration capabilities provided for scenarios where discovery is not feasible.</t>
      <t>For typical operations such as service provisioning and network planning, the model offers read-only query
access to authoritative mappings between logical topology and physical inventory.
The inventory-mapping-attributes containers are defined as read-write (config true) to accommodate cases where automatic discovery is not possible, including:</t>
      <ul spacing="normal">
        <li>
          <t>Customer-premises equipment (CPE) outside the operator's management domain</t>
        </li>
        <li>
          <t>Leased lines and third-party transport resources</t>
        </li>
        <li>
          <t>Planned or hypothetical resources for future deployment</t>
        </li>
      </ul>
      <t>In these cases, the operator manually configures the mapping to maintain accurate topology-to-inventory correlation.</t>
      <t>The following nodes are read-only (config false) as they represent hardware-determined state:</t>
      <dl>
        <dt>port-breakout:</dt>
        <dd>
          <t>Hardware capability determined by physical port characteristics</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section is modeled after the template described in <xref section="3.7.1" sectionFormat="of" target="RFC9907"/>.</t>
      <t>The "ietf-network-inventory-topology" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
Network Configuration (NETCONF) <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management (1) have to
use a secure transport layer (e.g., Secure Shell (SSH) <xref target="RFC4252"/>, TLS <xref target="I-D.ietf-tls-rfc8446bis"/>, and
QUIC {{?RFC9000]) and (2) have to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., "config true", which is the
   default).  All writable data nodes are likely to be sensitive or
   vulnerable in some network environments.  Write
   operations (e.g., edit-config) and delete operations to these data
   nodes without proper protection or authentication can have a negative
   effect on network operations.  The following subtrees and data nodes
   have particular sensitivities/vulnerabilities:</t>
      <t>'ne-ref', 'port-ref', 'link-type':
  These nodes are sensitive as they establish the mapping
  between logical topology and physical inventory. Unauthorized
  modification could lead to incorrect resource allocation or
  service disruption.</t>
      <t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
      <t>'ne-ref':
   The references may be used to track the set of network elements. While
   read-only, they may reveal network infrastructure details.</t>
      <t>'port-breakout':
   This node exposes hardware capabilities.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
   the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   URI:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
   Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
   Name:  ietf-network-inventory-topology
   Maintained by IANA?  N
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-topology
   Prefix:  nwit
   Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="13" month="May" year="2026"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-17"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-software">
          <front>
            <title>A YANG Network Data Model of Network Inventory Software Extensions</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="15" month="April" year="2026"/>
            <abstract>
              <t>   This document extends the base Network Inventory YANG model to
   support non-physical network elements (NEs), such as controllers,
   virtual routers, and virtual firewalls, as well as software
   components like platform operating systems and software modules.  In
   addition to the software revisions and patches already defined in the
   base model, this extension introduces software status and time stamp
   information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-software-03"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   Digital Twin technology has seen rapid adoption in Industry 4.0.  The
   application of Digital Twin technology in the networking field is
   meant to develop various rich network applications, realize efficient
   and cost-effective data-driven network management, and accelerate
   network innovation.

   This document presents an overview of the concepts of Network Digital
   Twin, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-12"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-simap-concept">
          <front>
            <title>SIMAP: Concept, Requirements, and Use Cases</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Everything OPS</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="31" month="March" year="2026"/>
            <abstract>
              <t>   This document defines the concept of Service &amp; Infrastructure Maps
   (SIMAP) and identifies a set of SIMAP requirements and use cases.
   The SIMAP was previously known as Digital Map. SIMAP evolves the
   earlier 'Digital Map' concept by making explicit the ties between
   service and infrastructure layers, clarifying expected outcomes for
   operations and automation, and addressing ambiguity associated with
   the term 'digital.'

   The document intends to be used as a reference for the assessment of
   the various topology modules to meet SIMAP requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-10"/>
        </reference>
        <reference anchor="RFC9656">
          <front>
            <title>A YANG Data Model for Microwave Topology</title>
            <author fullname="S. Mansfield" initials="S." role="editor" surname="Mansfield"/>
            <author fullname="J. Ahlberg" initials="J." surname="Ahlberg"/>
            <author fullname="M. Ye" initials="M." surname="Ye"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="D. Spreafico" initials="D." surname="Spreafico"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document defines a YANG data model to describe microwave and millimeter-wave radio links in a network topology.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9656"/>
          <seriesInfo name="DOI" value="10.17487/RFC9656"/>
        </reference>
        <reference anchor="I-D.ygb-ivy-passive-network-inventory">
          <front>
            <title>A YANG Data Model for Passive Network Inventory</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="tom van caenegem" initials="T." surname="van caenegem">
              <organization>Nokia</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Mauro Tilocca" initials="M." surname="Tilocca">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Brad Peters" initials="B." surname="Peters">
              <organization>NBN</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document presents a YANG data model for tracking and managing
   passive network inventory.  The model enhances the base model
   outlined in [I-D.draft-ietf-ivy-network-inventory-yang] and is
   intended for use in the northbound interface of a domain controller
   as defined in [RFC8453].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ygb-ivy-passive-network-inventory-04"/>
        </reference>
        <reference anchor="RFC9907">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="March" year="2026"/>
            <abstract>
              <t>This document provides guidelines for authors and reviewers of specifications containing YANG data models, including IANA-maintained YANG modules. Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.</t>
              <t>This document obsoletes RFC 8407; it also updates RFC 8126 by providing additional guidelines for writing the IANA considerations for RFCs that specify IANA-maintained YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="9907"/>
          <seriesInfo name="DOI" value="10.17487/RFC9907"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
      </references>
    </references>
    <?line 599?>

<section anchor="link-type-usage-examples">
      <name>'link-type' Usage Examples</name>
      <t>This appendix provides examples illustrating the usage of the
"link-type" data node.</t>
      <t>Scenario: Device "SW-1" and device "SW-2" are directly connected by a fiber.</t>
      <t>Physical topology:</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="456" viewBox="0 0 456 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
            <path d="M 80,32 L 80,96" fill="none" stroke="black"/>
            <path d="M 376,32 L 376,96" fill="none" stroke="black"/>
            <path d="M 448,32 L 448,96" fill="none" stroke="black"/>
            <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
            <path d="M 376,32 L 448,32" fill="none" stroke="black"/>
            <path d="M 80,62 L 152,62" fill="none" stroke="black"/>
            <path d="M 80,66 L 152,66" fill="none" stroke="black"/>
            <path d="M 256,62 L 376,62" fill="none" stroke="black"/>
            <path d="M 256,66 L 376,66" fill="none" stroke="black"/>
            <path d="M 8,96 L 80,96" fill="none" stroke="black"/>
            <path d="M 376,96 L 448,96" fill="none" stroke="black"/>
            <g class="text">
              <text x="44" y="68">SW-1</text>
              <text x="184" y="68">fiber</text>
              <text x="228" y="68">link</text>
              <text x="412" y="68">SW-2</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
.--------.                                    .--------.
|        |                                    |        |
|  SW-1  +========= fiber link ===============+  SW-2  |
|        |                                    |        |
'--------'                                    '--------'
]]></artwork>
      </artset>
      <t>Key parts of the JSON example are as follows:</t>
      <sourcecode type="json"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "example:campus-topology",
        "node": [
          {
            "node-id": "example:SW-1",
            "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
              "ne-ref": "example:NE-SW1"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "example:TP-SW1-P1",
                "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
                  "ne-ref": "example:NE-SW1",
                  "port-ref": "/nwi:network-inventory/nwi:network-\
elements/nwi:network-element[ne-id='example:NE-SW1']/nwi:components/\
                            nwi:component[component-id='eth-port-1']"
                }
              }
            ]
          },
          {
            "node-id": "example:SW-2",
            "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
              "ne-ref": "example:NE-SW2"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "example:TP-SW2-P1",
                "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
                  "ne-ref": "example:NE-SW2",
                  "port-ref": "/nwi:network-inventory/nwi:network-\
elements/nwi:network-element[ne-id='NE-SW2']/nwi:components/nwi:\
                                component[component-id='eth-port-1']"
                }
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "example:Link-SW1-SW2",
            "source": {
              "source-node": "example:SW-1",
              "source-tp": "example:TP-SW1-P1"
            },
            "destination": {
              "dest-node": "example:SW-2",
              "dest-tp": "example:TP-SW2-P1"
            },
            "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
              "link-type": "fiber"
            }
          }
        ]
      }
    ]
  }
}
]]></sourcecode>
    </section>
    <section anchor="json-example-of-an-multi-fibre-push-on-mpo-breakout-channel-port">
      <name>JSON Example of an Multi-fibre Push On (MPO) Breakout-Channel Port</name>
      <t>This appendix provides an example of a 400 Gb/s DR4 port that is physically implemented as four independent 100 Gb/s lanes (an MPO breakout). The lanes are exposed as breakout-channel entries so that the port can later be configured as either a single 400G trunk or four 100G breakout interfaces. The instance data below shows the minimal JSON encoding <xref target="RFC7951"/> of the "port-breakout" container for this port.</t>
      <sourcecode type="json"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network-topology:networks": {
    "network": [
      {
        "network-id": "example:underlay-topology-400g",
        "node": [
          {
            "node-id": "example:n1",
            "termination-point": [
              {
                "tp-id": "example:400g-1/0/1",
                "ietf-network-inventory-topology:inventory-mapping-\
                                                       attributes": {
                  "ne-ref": "example:NE-1",
                  "port-ref": "example:port-1"
                },
                "ietf-network-inventory-topology:port-breakout": {
                  "breakout-channel": [
                    { "channel-id": 1 },
                    { "channel-id": 2 },
                    { "channel-id": 3 },
                    { "channel-id": 4 }
                  ]
                }
              }
            ]
          }
        ]
      }
    ]
  }
}
]]></sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank Italo Busi, Olga Havel, Aihua Guo, Oscar
   Gonzalez de Dios, and many others for their helpful comments and
   suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Chaode Yu">
        <organization>Huawei</organization>
        <address>
          <email>yuchaode@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
