Internet DRAFT - draft-hares-i2rs-dataflow-req

draft-hares-i2rs-dataflow-req







I2RS working group                                              S. Hares
Internet-Draft                                                    Huawei
Intended status: Standards Track                                 A. Dass
Expires: November 6, 2016                                       Ericsson
                                                             May 5, 2016


                      I2RS Data Flow Requirements
                  draft-hares-i2rs-dataflow-req-04.txt

Abstract

   This document covers requests to the netmod and netconf Working
   Groups for functionality to support the data flows described in the
   I2RS architecture and the I2RS use cases requirements summary.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 6, 2016.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.




Hares & Dass            Expires November 6, 2016                [Page 1]

Internet-Draft               I2RS Data Flow                     May 2016


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements language . . . . . . . . . . . . . . . . . .   3
   2.  Summary of I2RS Data Flow Requirements  . . . . . . . . . . .   3
   3.  Generic Interfaces to Routing Functions . . . . . . . . . . .   5
     3.1.  I2RS Data Flow Requirements . . . . . . . . . . . . . . .   5
   4.  Large Data Flow Requirements  . . . . . . . . . . . . . . . .   5
     4.1.  Use Case Requirements for Traffic Flow Measurements . . .   6
     4.2.  Protocol Requirements based on Traffic Measurement Data
           Flows . . . . . . . . . . . . . . . . . . . . . . . . . .   7
     4.3.  Publication/Subscription Service  . . . . . . . . . . . .   7
     4.4.  Data Flow Requirements for Transports . . . . . . . . . .   8
     4.5.  I2RS Requirements for Large Data Flow . . . . . . . . . .   8
   5.  I2RS Data Flow during OAM or Outages  . . . . . . . . . . . .   8
     5.1.  I2RS Data Flow Requirements during OAM or Outages . . . .   9
   6.  Changes to YANG . . . . . . . . . . . . . . . . . . . . . . .   9
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  10
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  10
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  10
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  10
     10.2.  Informative References . . . . . . . . . . . . . . . . .  10
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13

1.  Introduction

   The Interface to the Routing System (I2RS) Working Group is chartered
   with providing architecture and mechanisms to inject into and
   retrieve information from the routing system.  The I2RS Architecture
   document [I-D.ietf-i2rs-architecture] abstractly documents a number
   of requirements for implementing the I2RS requirements.

   The I2RS Working Group has chosen to use the YANG data modeling
   language [RFC6020] as the basis to implement its mechanisms.

   Additionally, the I2RS Working group has chosen to use the NETCONF
   [RFC6241] and its similar but lighter-weight relative RESTCONF
   [I-D.ietf-netconf-restconf] as the protocols for carrying I2RS.
   NETCONF and RESTCONF are suitable for handling the configuration
   portion of the I2RS protocol, but need extensions to handle the I2RS
   use cases described in [I-D.ietf-i2rs-usecase-reqs-summary].  The
   requirements for these functionalities have been specified:

   o  ephemeral state - as defined in [I-D.ietf-i2rs-ephemeral-state]

   o  notifications and events - as defined in
      [I-D.ietf-i2rs-pub-sub-requirements]



Hares & Dass            Expires November 6, 2016                [Page 2]

Internet-Draft               I2RS Data Flow                     May 2016


   o  traceability - as defined in [I-D.ietf-i2rs-traceability]

   o  protocol security - as defined in
      [I-D.ietf-i2rs-protocol-security-requirements]

   The requirements for the data flows in the following use cases have
   not been specified:

      Generic interfaces to Protocol Local-RIBs or Policy Data bases,

      Large data flows,

      Traffic monitoring data,

      Data flows for action sequences, and

      data flows during network outages or attacks

   This document describes the protocol requirements for these last five
   types of requirements.  The first summarizes the data flow
   requirements for the I2RS protocol version 1, and data flow
   requirements that may occur in future I2RS protocol versions.

   Section 3 provides details on the data flow requirements for the
   generic interfaces.  Section 4 considers large data flows and traffic
   monitoring data flows.  Section 5 considers data flows and
   constraints during action and attacks.

1.1.  Requirements language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

2.  Summary of I2RS Data Flow Requirements

   The following are the data flow related requirements for I2RS
   protocol version 1:

   I2RS-DF-REQ-01:No Validation RPCs   I2RS generic interfaces in I2RS
      protocol independent modules or I2RS protocol dependent modules
      should be able to optionally create rpcs which store configuration
      data in the I2RS ephemeral data store without the normal
      configuration checking.  The only thing check will be the syntax
      within the protocol packets.  The data models allowing must
      provide a "no-checking flag" at the level the rpc stores the data.
      For example, the I2RS RIB could create a rpc for a route-add that




Hares & Dass            Expires November 6, 2016                [Page 3]

Internet-Draft               I2RS Data Flow                     May 2016


      allowed a flag that indicates validation status ("full or no-
      checks")

   I2RS-DF-REQ-02: XML and JSON:    encoding formats SHOULD be supported
      in RESTCONF and NETCONF.

   I2RS-DF-REQ-03: Transport Protocols:    MAY be negotiated between
      I2RS client and I2RS agent from a list of mandatory transports and
      optional transports.

   I2RS-DF-REQ-04: Insecure Transport:    For a few select data models,
      the communication between the I2RS client and I2RS agent MAY run
      over an insecure transports.  The I2RS client and I2RS agent
      should negotiate this insecure protocol, and the portion of the
      data model which can be sent via the insecure transport SHOULD be
      marked in YANG data model with "i2rs-insecure-transport ok".

   I2RS-DF-REQ-05: Resource Contraints on the I2RS Agent:    should have
      the ability to constraints for OAM functions operating to limit
      CPU processing, data rate across a transport, the rate of
      publication of data in a subscription, and logging rates.

   I2RS-DF-REQ-06: Alternative Transport protocols or ports:   The I2RS
      should be able to support an OAM actions that select alternate
      transports from available list of transports, and to support
      selection of alternate ports for these protocols.  The alternate
      transports may have constraints specified for security levels,
      sizes of messages, or data flow priorities.

   I2RS-DF-REQ-07: Priorization of Data Flows:    The I2RS Agent should
      be able to prioritize some of the management data flows in the
      I2RS Agent-I2RS Client data flows.  This prioriziation can for
      data schedule for publication, data flows within a single
      transport, or data flows flows within a single transport, or
      between multiple data flow streams an I2RS Agent is sending.  This
      priorization may be for the data flows the I2RS Agent is
      receiving.

   DF-REQ-08: Yang indicates rpc with no validation:  Yang MUST have a
      way to indicate rpc can write without validating data except for
      syntax of data because I2RS client has validated data.

         ephemeral-validation nocheck"

   DF-REQ-09: Yang for Data sent over insecure transport :  Yang MUST
      have a way to indicate in a data model that insecure transmission
      is ok.




Hares & Dass            Expires November 6, 2016                [Page 4]

Internet-Draft               I2RS Data Flow                     May 2016


         i2rs-transport-insecure ok"

   Requirement for Future versions of I2RS Protocol:

      SHOULD be supported as an optional component protocol by the I2RS
      protocol.

3.  Generic Interfaces to Routing Functions

   The generic interfaces to the routing system includes generic
   interface to the RIB, forwarding policies, and an interface to the
   topology information.  The existing I2RS protocol independent data
   models have provided these generic models in the I2RS RIB
   ([I-D.ietf-i2rs-rib-info-model], [I-D.ietf-i2rs-rib-data-model]), the
   I2RS Filter-Based RIB ([I-D.kini-i2rs-fb-rib-info-model],
   [I-D.hares-i2rs-fb-rib-data-model]), and the topology genetric model
   ([I-D.ietf-i2rs-yang-network-topo]) and plus layer models
   ([I-D.ietf-i2rs-yang-l2-network-topology],
   [I-D.ietf-i2rs-yang-l3-topology].

   The only addition to the generic model is the ability for the I2RS
   client to be able to do all of the data value checking, and simply
   download the data to the I2RS Agent.  The I2RS RIB updates are done
   with rpcs (rib-add, rib-delete, route-add, route-delete, route-
   update, nh-add, nh-delete).  The I2RS FB-RIB updates are done with
   rpcs (fset-add, fs-dete, fpolicy-add, fpolicy-delete, fpolicy-update,
   fgroup-add, fgoup-delete, fgroup-update).  The requirement is to
   allow create rpcs that do not require validation, but simply input
   syntax.

3.1.  I2RS Data Flow Requirements

   [DF-REQ-01:No Validation RPCs  I2RS generic interfaces in I2RS
      protocol independent modules or I2RS protocol dependent modules
      should be able to optionally create rpcs which store configuration
      data in the I2RS ephemeral data store without the normal
      configuration checking.  The only thing check will be the syntax
      within the protocol packets.  The data models allowing must
      provide a "no-checking flag" at the level the rpc stores the data.
      For example, the I2RS RIB could create a rpc for a route-add that
      allowed a flag that indicates no validation checks.

4.  Large Data Flow Requirements

   This section decribes the I2RS management data flow requirements for
   data transfers for large data flows, traffic measurments, and non-
   secure data flows.




Hares & Dass            Expires November 6, 2016                [Page 5]

Internet-Draft               I2RS Data Flow                     May 2016


   Large data transfers to/from the I2RS Agent can be from tables
   relating to generic interfaces (RIB, FIB, Filter-Based RIB policy,
   generic connectivity topologies), protocol state, traffic
   measurements or user state.  The generic interfaces were described in
   the section above.

   The I2RS interaction with the protocol are to configure the
   protocols, and retrieve general state information (RIB, FIB,
   topologies and policy).  The data flow for the management of protocol
   state has the same type of flows.

   The unique type of data flows are management flows based on traffic
   flow measurement or I2RS data traveling across insecure connections.
   These requirements are described in this section.

   Traffic monitoring can occur in a network under DDoS with high levels
   of congestion and loss the use of these protocols which rely on
   transport-level retransmission may not be as resilient as needed.
   The data flow problems involved in sending monitoring data during
   network congestion or outage are considered in section 5 on
   operations during network outages or congestoin.

4.1.  Use Case Requirements for Traffic Flow Measurements

   The I2RS requirements for the Protocol independent use cases requires
   the support of traffic flow measurements protocols (requirements PI-
   REQ-05, PI-REQ06 in [I-D.ietf-i2rs-usecase-reqs-summary]), and
   operational state regarding flow filtering.

   The following IETF protocol pass traffic flow measurements:

   o  IPFIX - IP Flow Information ([RFC7011]) that reports on a wide
      variety of routing system statistics, and

   o  IPPM - IP Performance mangement ([RFC2330], [RFC7312]) that
      reports on one-way or two-way end-to-end network performance
      statistics,

   In addition the SFLOW([RFC3176]) of layer 2 devices is supported by
   many routers.  Other traffic flows may be measured in support of IDS/
   IPS, but these will be covered in the section on security flows.

   Flow Filtering data models with policy rules (BGP Flow Specification,
   I2RS Filter-Based RIB, and n-tuple policy routing RIB) often save
   operational state on how often these policies are match.

   Traffic flow data can provide large streams of traffic.  The I2RS
   mechanism for handling the data bursts in these protocols is to



Hares & Dass            Expires November 6, 2016                [Page 6]

Internet-Draft               I2RS Data Flow                     May 2016


   utilize a traffic monitoring protocol, IPFIX) or to utilize a
   publication/subscription service in order to send just what clients
   want.

4.2.  Protocol Requirements based on Traffic Measurement Data Flows

   Due to the potentially large data flow the traffic measurment
   statistics generate, these statistics are best handled by publication
   techniques within NETCONF or a separate protocol such as IPFIX.  The
   publication/subscription model within NETCONF could use either push
   pub-sub model or a pull pub-sub model.  Thresholds for reporting can
   be set per data models or per client so the pub-sub model allows the
   I2RS client-I2RS Agent to meter the amount of data flow these
   statistics carry.  The push portion of the pub-sub model is supported
   by [I-D.ietf-netconf-yang-push], but the pull portion of the pub-sub
   model is not defined.

   The support of IPFIX protocol ([RFC7011]) as a component protocol in
   I2RS requires the I2RS Agent supports an IPFIX exporting process
   sending data to a I2RS client running an IPFIX collector process.
   The IPFIX templates could be stored as ephemeral state or reference
   configured state.  The IPFIX data flows may run over SCTP, UDP, or
   TCP utilizing the congestion services at each time.  The IPFIX
   connections assumes that: a) congestion is an temporary anomaly, b)
   dropping data during a congestion is reported, and c) for some
   exporiting process it is acceptable to have drop data in a reliable
   protocol.  The I2RS protocol must support the establishment of an
   IPFIX connection.

4.3.  Publication/Subscription Service

   All use case requirements for the publication/subscription service
   for the push service from large data requirements 01-04 and 6-12 is
   found in [I-D.ietf-i2rs-pub-sub-requirements], and an example
   protocol addition to netconf is include in
   [I-D.ietf-netconf-yang-push].

   The requirements for the publication/subscription service for the
   pull model are not specified in the
   [I-D.ietf-i2rs-pub-sub-requirements], but a majority of the pub-sub
   requirements and mechanisms can be reused.  In a pull, the publisher
   prepares the data that is pulled by a few receivers who then
   distribute it to the receivers.  The pull mechanism would have a
   different "pull latency" versus the push latencey, and a set of
   parameters which indicate the amount of data stored if receivers did
   not pull the data within a certain time.





Hares & Dass            Expires November 6, 2016                [Page 7]

Internet-Draft               I2RS Data Flow                     May 2016


   At this time, the pull-model of the publication/subscription model is
   not being requested by vendors or operators.

4.4.  Data Flow Requirements for Transports

   The use case requirements ([I-D.ietf-i2rs-usecase-reqs-summary]) for
   large data flows also include support for data flows via any
   transport (L-Dat-REQ-04) and any data format (L-Data-REQ-05).

   One of the requirements is to be able to support an insecure
   transport for a small set of data.  Examples of this type of data may
   be outage/restoration information the operator wishes to make public.

4.5.  I2RS Requirements for Large Data Flow

   Current Data Flow Requirements:

   I2RS-DF-REQ-02: XML and JSON:    encoding formats SHOULD be supported
      in RESTCONF and NETCONF.

   I2RS-DF-REQ-03: Transport Protocols:    MAY be negotiated between
      I2RS client and I2RS agent from a list of mandatory transports and
      optional transports.

   I2RS-DF-REQ-04: Insecure Transport:    For a few select data models,
      the communication between the I2RS client and I2RS agent MAY run
      over an insecure transports.  The I2RS client and I2RS agent
      should negotiate this insecure protocol, and the portion of the
      data model which can be sent via the insecure transport SHOULD be
      marked in YANG data model with "i2rs-insecure-transport ok".

   Future Data Flow Requirements:

   Future-DF-REQ-01: IPFIX Protocol and templates:  SHOULD be supported
      as an optional component protocol by the I2RS protocol.

5.  I2RS Data Flow during OAM or Outages

   The data flow requirements for Operations and Management (OAM)
   actions must be able to be constrained in order not to impact the
   routing system.  During periods of normal connectivity, it is
   important that any OAM function not impact the the routing systems
   function.  During periods of outage, the I2RS protocol must operate
   when data bandwidth is reduced and network connectivity fluctuates.
   The constraints on the I2RS client-agent communication may be
   increased or decreased from the normal state depending on what
   management traffic needs to flow in order to help detect outages or
   resist attacks.



Hares & Dass            Expires November 6, 2016                [Page 8]

Internet-Draft               I2RS Data Flow                     May 2016


   I2RS agents must be able to adjust operation of event notifications,
   logging, or data traffic during these outage periods.  Data Models
   and I2RS agent configuration must allow operator-applied policy to
   prioritize data during this period.  The I2RS Agent should be able to
   signal the I2RS Client that such a time period is occuring.

   A quick list of some of the types of outages may illustrate why the
   I2RS agent need the ability to balance internal processing and the
   rate of communication with the I2RS client.  Network Outages may
   occur due connectivity failures or security attacks.  Security
   attacks can be distributed or target incidents that exploit
   vulnerabilities in software, network devices, protocols using
   botnets, malware attacks, identity theft, port spams, icmp blasts,
   and other attacks.  Some outages are caused by Distributed Denial of
   Service (DDoS) attacks may impact multiple routing systems so the
   constraints on management data flow may be required even when the
   routing system is not the specific device under attack.

5.1.  I2RS Data Flow Requirements during OAM or Outages

   I2RS-DF-REQ-05: Resource Contraints on the I2RS Agent:    should have
      the ability to constraints for OAM functions operating to limit
      CPU processing, data rate across a transport, the rate of
      publication of data in a subscription, and logging rates.

   I2RS-DF-REQ-06: Alternative Transport protocols or ports:   The I2RS
      should be able to support an OAM actions that select alternate
      transports from available list of transports, and to support
      selection of alternate ports for these protocols.  The alternate
      transports may have constraints specified for security levels,
      sizes of messages, or priority

   I2RS-DF-REQ-07: Priorization of Data Flows:    The I2RS Agent should
      be able to prioritize some of the management data flows in the
      I2RS Agent-I2RS Client data flows.  This prioriziation can for
      data schedule for publication, data flows within a single
      transport, or data flows flows within a single transport, or
      between multiple data flow streams an I2RS Agent is sending.

6.  Changes to YANG

   To support the above requirements, the yang modules will need to
   support the following features:

   DF-REQ-08: Yang indicates rpc with no validation:  Yang MUST have a
      way to indicate rpc can write without validating data except for
      syntax of data because I2RS client has validated data.




Hares & Dass            Expires November 6, 2016                [Page 9]

Internet-Draft               I2RS Data Flow                     May 2016


         ephemeral-validation nocheck"

   DF-REQ-09: Yang for Data sent over insecure transport :  Yang MUST
      have a way to indicate in a data model that insecure transmission
      is ok.

         i2rs-transport-insecure ok"

7.  IANA Considerations

   There are no IANA requirements for this document.

8.  Security Considerations

   The security requirements for the I2RS protocol are covered in
   [I-D.ietf-i2rs-protocol-security-requirements] document.

9.  Acknowledgements

   The following people have aided in the discuss

   o  Russ White,

   o  Joel Halpern,

   o  Linda Dunbar,

   o  Frank Xia, and

   o  Robert Moskowitz

10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

10.2.  Informative References

   [I-D.hares-i2rs-fb-rib-data-model]
              Hares, S., Kini, S., Dunbar, L., Krishnan, R., Bogdanovic,
              D., and R. White, "Filter-Based RIB Data Model", draft-
              hares-i2rs-fb-rib-data-model-03 (work in progress), March
              2016.




Hares & Dass            Expires November 6, 2016               [Page 10]

Internet-Draft               I2RS Data Flow                     May 2016


   [I-D.ietf-i2rs-architecture]
              Atlas, A., Halpern, J., Hares, S., Ward, D., and T.
              Nadeau, "An Architecture for the Interface to the Routing
              System", draft-ietf-i2rs-architecture-15 (work in
              progress), April 2016.

   [I-D.ietf-i2rs-ephemeral-state]
              Haas, J. and S. Hares, "I2RS Ephemeral State
              Requirements", draft-ietf-i2rs-ephemeral-state-05 (work in
              progress), March 2016.

   [I-D.ietf-i2rs-protocol-security-requirements]
              Hares, S., Migault, D., and J. Halpern, "I2RS Security
              Related Requirements", draft-ietf-i2rs-protocol-security-
              requirements-03 (work in progress), March 2016.

   [I-D.ietf-i2rs-pub-sub-requirements]
              Voit, E., Clemm, A., and A. Prieto, "Requirements for
              Subscription to YANG Datastores", draft-ietf-i2rs-pub-sub-
              requirements-07 (work in progress), May 2016.

   [I-D.ietf-i2rs-rib-data-model]
              Wang, L., Ananthakrishnan, H., Chen, M.,
              amit.dass@ericsson.com, a., Kini, S., and N. Bahadur, "A
              YANG Data Model for Routing Information Base (RIB)",
              draft-ietf-i2rs-rib-data-model-05 (work in progress),
              March 2016.

   [I-D.ietf-i2rs-rib-info-model]
              Bahadur, N., Kini, S., and J. Medved, "Routing Information
              Base Info Model", draft-ietf-i2rs-rib-info-model-08 (work
              in progress), October 2015.

   [I-D.ietf-i2rs-traceability]
              Clarke, J., Salgueiro, G., and C. Pignataro, "Interface to
              the Routing System (I2RS) Traceability: Framework and
              Information Model", draft-ietf-i2rs-traceability-09 (work
              in progress), May 2016.

   [I-D.ietf-i2rs-usecase-reqs-summary]
              Hares, S. and M. Chen, "Summary of I2RS Use Case
              Requirements", draft-ietf-i2rs-usecase-reqs-summary-02
              (work in progress), March 2016.

   [I-D.ietf-i2rs-yang-l2-network-topology]
              Dong, J. and X. Wei, "A YANG Data Model for Layer-2
              Network Topologies", draft-ietf-i2rs-yang-l2-network-
              topology-02 (work in progress), December 2015.



Hares & Dass            Expires November 6, 2016               [Page 11]

Internet-Draft               I2RS Data Flow                     May 2016


   [I-D.ietf-i2rs-yang-l3-topology]
              Clemm, A., Medved, J., Varga, R., Tkacik, T., Liu, X.,
              Bryskin, I., Guo, A., Ananthakrishnan, H., Bahadur, N.,
              and V. Beeram, "A YANG Data Model for Layer 3 Topologies",
              draft-ietf-i2rs-yang-l3-topology-01 (work in progress),
              December 2015.

   [I-D.ietf-i2rs-yang-network-topo]
              Clemm, A., Medved, J., Varga, R., Tkacik, T., Bahadur, N.,
              and H. Ananthakrishnan, "A Data Model for Network
              Topologies", draft-ietf-i2rs-yang-network-topo-02 (work in
              progress), December 2015.

   [I-D.ietf-netconf-restconf]
              Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
              Protocol", draft-ietf-netconf-restconf-13 (work in
              progress), April 2016.

   [I-D.ietf-netconf-yang-push]
              Clemm, A., Prieto, A., Voit, E., Tripathy, A., and E.
              Einar, "Subscribing to YANG datastore push updates",
              draft-ietf-netconf-yang-push-02 (work in progress), March
              2016.

   [I-D.kini-i2rs-fb-rib-info-model]
              Kini, S., Hares, S., Dunbar, L., Ghanwani, A., Krishnan,
              R., Bogdanovic, D., and R. White, "Filter-Based RIB
              Information Model", draft-kini-i2rs-fb-rib-info-model-03
              (work in progress), February 2016.

   [RFC2330]  Paxson, V., Almes, G., Mahdavi, J., and M. Mathis,
              "Framework for IP Performance Metrics", RFC 2330,
              DOI 10.17487/RFC2330, May 1998,
              <http://www.rfc-editor.org/info/rfc2330>.

   [RFC3176]  Phaal, P., Panchen, S., and N. McKee, "InMon Corporation's
              sFlow: A Method for Monitoring Traffic in Switched and
              Routed Networks", RFC 3176, DOI 10.17487/RFC3176,
              September 2001, <http://www.rfc-editor.org/info/rfc3176>.

   [RFC6020]  Bjorklund, M., Ed., "YANG - A Data Modeling Language for
              the Network Configuration Protocol (NETCONF)", RFC 6020,
              DOI 10.17487/RFC6020, October 2010,
              <http://www.rfc-editor.org/info/rfc6020>.







Hares & Dass            Expires November 6, 2016               [Page 12]

Internet-Draft               I2RS Data Flow                     May 2016


   [RFC6241]  Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
              and A. Bierman, Ed., "Network Configuration Protocol
              (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
              <http://www.rfc-editor.org/info/rfc6241>.

   [RFC7011]  Claise, B., Ed., Trammell, B., Ed., and P. Aitken,
              "Specification of the IP Flow Information Export (IPFIX)
              Protocol for the Exchange of Flow Information", STD 77,
              RFC 7011, DOI 10.17487/RFC7011, September 2013,
              <http://www.rfc-editor.org/info/rfc7011>.

   [RFC7312]  Fabini, J. and A. Morton, "Advanced Stream and Sampling
              Framework for IP Performance Metrics (IPPM)", RFC 7312,
              DOI 10.17487/RFC7312, August 2014,
              <http://www.rfc-editor.org/info/rfc7312>.

Authors' Addresses

   Susan Hares
   Huawei
   Saline
   US

   Email: shares@ndzh.com


   Amit Daas
   Ericsson

   Email: amit.dass@ericsson.com





















Hares & Dass            Expires November 6, 2016               [Page 13]