<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info"
     docName="draft-xie-onions-problem-statement-00"
     ipr="trust200902">
  <front>
 
    <title abbrev="Onions Problem Statement">Onions Problem Statement</title>
  
    <author fullname="Chongfeng Xie" initials="C" surname="Xie">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Qiong Sun" initials="Q" surname="Sun">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>sunqiong@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Linda Dunbar" initials="L" surname="Dunbar">
      <organization>Futurewei</organization>

      <address>
    
        <email>ldunbar@futurewei.com</email>
      </address>
    </author>

   
    <date day="30" month="December" year="2025"/>

    <area>OPS Area</area>

    <workgroup>Onions Working Group</workgroup>

    <keyword>RFC</keyword>

    <abstract>

      <t>YANG-based service APIs are widely used to expose network and service
      abstractions to external systems such as controllers, orchestration platforms,
      and OSS/BSS applications. Despite the availability of numerous YANG data models
      and YANG-to-API tools, operators continue to face significant challenges in 
      operationalizing these APIs in a consistent, scalable, and interoperable manner.
      APIs derived from similar YANG models often differ in semantics, lifecycle behavior,
      observability, and consumption patterns, complicating automation and cross-vendor
      integration. This document describes the problem space associated with 
      operationalizing YANG-based service APIs, drawing on operator experience, IAB workshop
      findings, and IETF applicability studies to highlight gaps in current practices
      and motivate requirements for improving API predictability and operational 
      effectiveness, without defining specific solutions, protocols, or tools.</t>
      
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Despite the availability of YANG data models and numerous YANG-to-API
      tools, operators continue to face significant challenges in operationalizing
      YANG-based service APIs in a consistent, scalable, and interoperable manner.
      As highlighted by the IAB Next Era of Network Management Operations (NEMOPS)
      workshop, operational workflows that rely on these APIs remain fragmented 
      and difficult to automate end to end. In practice, APIs generated from similar
      YANG models often differ in structure, semantics, lifecycle behavior, and 
      feedback mechanisms, complicating integration across systems, vendors, and
      deployment environments. </t>

      <t>These challenges are further evidenced by recent IETF applicability studies
      that examine the use of existing YANG models for emerging operational scenarios.
      Applicability drafts focusing on unequal-cost multipath, traffic-engineered
      services, and network service models for telco cloud environments
      (e.g., <xref target="I-D.dunbar-neotec-ac-pe2pe-ucmp-applicability"/>, 
      <xref target="I-D.dunbar-onions-ac-te-applicability"/>,
      and [neotec-ns-models-telcocloud]) identify recurring issues such as ambiguous
      semantics, weak alignment between service intent and realizable network behavior,
      insufficient lifecycle handling, and limited observability when services are 
      exposed through APIs. While these studies address specific technical contexts,
      they collectively demonstrate a broader problem: current YANG-based service APIs
      lack consistent operational semantics and guidance required for reliable automation
      and interoperability.</t>

      <t>The Operationalizing Network and service abstractIONS (ONIONS) Working Group
      is chartered to address this problem space by focusing on the operational aspects
      of YANG-based service APIs, rather than defining new protocols or API technologies.
      The goal of ONIONS is to improve automation, operational efficiency, and 
      interoperability by identifying common problems, clarifying requirements, and
      providing guidance on how YANG-based service APIs should be structured, exposed,
      and consumed by external systems in a predictable and interoperable manner.
      </t>

      <t>This document describes the problem space addressed by the ONIONS Working
      Group. It consolidates operator-observed challenges related to YANG-based 
      service APIs, explains why existing approaches and tools are insufficient
      when considered in isolation, and frames the requirements that ONIONS is 
      chartered to examine to improve the operationalization and consumption of 
      YANG-based service APIs. This document does not propose specific solutions,
      protocols, or data models.</t>
    
      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
      
    </section>

    <section title="Terminology">
      <t>The following terms are used in this document:<list style="symbols">
          <t>Abstraction: refers to the definition of simplified, high-level 
          constructs that represent network and service capabilities, while
          hiding the details of their underlying realization. Such abstractions
          enable interaction between management and automation systems without
          requiring direct exposure of device-specific configurations or protocol
          behaviors.</t>

          <t>Cloud DC: 	Third party data centers that host applications and workloads
          owned by different organizations or tenants.</t>

          
        </list></t>
    </section>

    <section title="Use Cases Highlighting Challenges">

      <t>The following use cases illustrate operational scenarios in which YANG-based
      service APIs are increasingly used to request, operate, and evolve network services.
      They highlight common challenges encountered by operators and automation systems
      when attempting to consume these APIs in a predictable, interoperable, and 
      scalable manner.</t>

         <section title="Inter-Data-Center Connectivity">
         <t>Enterprises and service providers frequently operate across multiple
         data centers and hybrid cloud environments. In such deployments, 
         applications and services rely on reliable, high-speed, and secure 
         connectivity between geographically distributed data centers or cloud
         resource pools. Typical scenarios include service data synchronization,
         cross-cloud disaster recovery, and dynamic scaling of application services
         across locations. In operational practice, orchestration and management
         systems expect to request inter-data-center connectivity as a service, 
         specifying endpoints and desired characteristics while relying on 
         YANG-based service APIs to instantiate, modify, and monitor the service.
         However, existing APIs often expose network configuration constructs 
         rather than a coherent service abstraction, making it difficult to 
         express service intent, track service lifecycle, or confirm that connectivity
         objectives are being met. This use case highlights challenges related to
         lifecycle handling, semantic consistency, and observability when YANG-based
         service APIs are used to support inter-data-center services across vendors
         or administrative domains.</t>
         </section>

         <section title="Data Transmission for Data-Intensive Workloads">
         <t>As the industry enters the AI era, data has become a primary driver of 
         productivity growth, leading to a sharp increase in data processing and 
         transfer demands. To improve efficiency and control costs, computing resources
         are increasingly centralized in cloud or large-scale data center environments,
         while data sources may remain distributed.</t>
         <t>In this context, massive datasets are routinely transferred to centralized
         computing and storage infrastructure for analysis and processing. These 
         transfers may involve large volumes of data, require predictable completion 
         times, and demand bandwidth that varies significantly over time. From an operational
         perspective, orchestration systems rely on YANG-based service APIs to request 
         connectivity that can support these data transfers.</t> 
         <t>Operational experience shows that existing YANG-based service APIs often
         lack the semantics needed to express such data-driven connectivity needs in
         a service-oriented manner. As a result, automation systems must compensate
         with additional logic to manage bandwidth changes, track progress, or 
         determine when a transfer-oriented service has completed, complicating 
         integration and reducing interoperability.</t>
         </section>

          <section title="On-Orbit Networking with Dynamic Interconnection">
         <t>Emerging on-orbit networking environments introduce highly dynamic 
         operational conditions. Networks with steerable beams may depend on 
         infrastructure provided by other networks, such as third-party ground
         stations or additional on-orbit assets. Connectivity requirements can
         change rapidly based on orbital movement, coverage availability, 
         and mission needs.</t>
         
         <t>In these environments, network services must be instantiated, modified,
         and torn down on short timescales. Constructs such as bearers or attachment
         circuits may need to be dynamically established to interconnect infrastructure
         at orbital speeds. YANG-based service APIs are a natural interface for 
         exposing such services to planning and control systems.</t> 
         
         <t>However, most existing YANG-based service APIs are designed for 
         relatively static terrestrial networks and lack clear semantics for 
         short-lived services, rapid reconfiguration, or coordination across
         heterogeneous infrastructure. This use case highlights the difficulty
         of operationalizing YANG-based service APIs in highly dynamic, 
         multi-operator environments.</t>
         </section>

         <section title="Summary">
         <t>Across these use cases, YANG-based service APIs are expected to serve 
         as the primary interface between network infrastructure and external automation
         systems. The scenarios demonstrate that while APIs and models exist, 
         operators continue to face challenges related to lifecycle management,
         semantic clarity, observability, and interoperability. These challenges
         motivate the problem statements discussed in subsequent sections and 
         inform the requirements outlined later in this document.</t> 
         </section>
         
    </section>

    <section title="Operational Challenges with Network and Service Abstractions">

      <t>To support the use cases described in previous section, operators
      increasingly rely on service and network abstractions exposed through
      YANG-based service APIs. While these abstractions are widely deployed,
      operators report persistent challenges in operationalizing them in a 
      consistent, scalable, and automatable manner. As highlighted by the 
      IAB Next Era of Network Management Operations (NEMOPS) workshop [NEMOPS],
      these challenges are systemic and operational in nature, arising from 
      fragmented tooling, inconsistent abstraction semantics, and limited 
      end-to-end coordination. They are not confined to a specific technology
      or service type, but recur across abstraction domains and deployment 
      environments.</t>

      <section title="Fragmented Operational Lifecycles">
      <t>Operational workflows associated with service abstractions, such 
      as service instantiation, monitoring, troubleshooting, modification,
      and decommissioning, are often fragmented and inconsistently handled.
      Even when abstractions coexist within the same network or service
      offering, they frequently rely on different tools, data models, 
      and interfaces. NEMOPS discussions highlighted that operators 
      commonly depend on a heterogeneous mix of management protocols,
      vendor-specific APIs, and legacy mechanisms to complete these
      workflows, significantly increasing operational complexity and
      cost.</t> 
      <t>In practice, lifecycle actions initiated through YANG-based 
      service APIs often require coordination across orchestration systems,
      controllers, and device configurations. However, these components are
      rarely aligned in terms of lifecycle semantics, data models, or 
      operational assumptions. This fragmentation limits end-to-end 
      automation, complicates validation and rollback, and increases
      the likelihood of configuration drift and operational errors. 
      Existing service and network abstractions generally lack native constructs
      to express lifecycle attributes such as activation time, duration, 
      expiration, or rollback behavior. As a result, transient service 
      intents must be tracked and enforced outside the abstraction 
      framework, increasing operational complexity and the risk of
      inconsistency.</t>

      </section>





      <section title="Misalignment Between Abstraction Layers">
      <t>Service abstractions are typically realized through a combination
      of service-level models, network-level models, control-plane 
      behavior, and management interfaces. These layers are often developed
      independently, with limited coordination across working groups or 
      operational domains.</t>
      <t>This misalignment can manifest as: </t>
      <t indent="4">-Service abstractions that do not cleanly map to underlying
      network capabilities. </t>
      <t indent="4">-Network models that expose parameters without clear 
      service-level semantics. </t>
      <t indent="4">- Control-plane behaviors that are difficult to correlate 
      with service-level intent.</t>
      <t>As a result, operators face challenges ensuring that a service 
      behaves as intended throughout its lifecycle, particularly when changes
      occur at one layer without corresponding visibility or coordination 
      at others. </t>
      </section>

      <section title=" Inconsistent Semantics and Operational Assumptions ">
      <t>Service and network abstractions frequently rely on metrics, attributes,
      or parameters whose semantics vary across models, implementations, or 
      consumption contexts. Concepts such as cost, availability, or performance
      may be represented using different definitions, units, scopes, or 
      update models.</t>
      <t>These inconsistencies complicate integration between systems and 
      undermine the reliability of automation. Consumers of YANG-based 
      service APIs cannot assume uniform behavior or interpretation, forcing
      operators to introduce custom logic, static assumptions, or manual 
      intervention. Over time, this erodes interoperability and limits scalability.</t>
      </section>


<section title="Limited Integration with Automation and External Systems">
<t>Service abstractions are commonly exposed to external systems, such as orchestration platforms and OSS/BSS applications, through APIs derived from YANG data models. However, the lack of consistent guidance on how abstractions should be modeled, exposed, and consumed results in APIs that vary significantly across vendors and deployments.
This variability makes it difficult for external systems to consume YANG-based service APIs in a predictable and interoperable manner. Integration often requires bespoke adaptations and vendor-specific knowledge, limiting reuse and slowing the adoption of automation across domains and administrative boundaries.</t>
</section>

<section title="Gaps Revealed by Applicability and Deployment Experience">
<t>Recent IETF applicability studies and deployment experience further highlight these operational challenges across different abstraction contexts. Recurring issues include unclear semantics, difficulty aligning service intent with realizable network behavior, limited lifecycle handling, and challenges integrating abstractions across technologies and domains.</t>
<t>Although these efforts focus on specific use cases or technical areas, they expose common operational gaps that extend beyond any single abstraction or working group. Collectively, they reinforce the need for improved consistency, coordination, and operational guidance when service abstractions are exposed and consumed through YANG-based service APIs.</t>
</section>


<section title="Impact on Operational Efficiency and Interoperability">


<t>The challenges described above directly impact operational efficiency, automation, and interoperability. Operators are required to invest significant effort in integration, validation, and troubleshooting, reducing the benefits that abstractions are intended to provide. Without a more coordinated approach to abstraction modeling and operational usage, these issues are likely to persist as networks continue to evolve.</t>

</section>

<section title="Limited Feedback and Observability for Abstraction Enforcement">
<t>Existing abstractions primarily focus on configuration and offer limited standardized mechanisms for reporting whether requested behaviors have been successfully applied or remain valid over time. This lack of feedback impedes closed-loop automation and increases reliance on manual monitoring and intervention.</t>
  </section>    


    </section>






<section title="Limitations of Existing Approaches">
<t>A wide range of mechanisms, models, and frameworks already exist within the IETF to support service and network abstractions. These include protocol-specific control-plane mechanisms, device- and network-level YANG data models, and management frameworks for service configuration and monitoring. While these efforts address important aspects of abstraction definition and realization, operators report that they are insufficient when applied independently to support consistent, end-to-end operational workflows.</t>
<section title="Fragmentation Across Working Groups and Technologies">
<t>Service and network abstractions are defined and evolved across multiple IETF working groups, each focusing on a specific technology, protocol, or layer. Although this separation is appropriate for protocol development, it has resulted in abstraction models and operational assumptions that are not well coordinated across domains.
As a result, operators must integrate abstractions that were designed with different scopes, semantics, and lifecycle assumptions. This fragmentation increases integration effort and complicates automation, particularly when a service abstraction spans multiple technologies or administrative domains. </t>
</section>

 <section title="Insufficient Alignment Between Abstractions and Realization">
<t>Existing abstraction models often focus on configuration or control-plane aspects without fully considering how abstractions are realized operationally across networks. In practice, operators must reconcile service-level intent with network-level capabilities, control-plane behaviors, and device-specific constraints.
When abstraction definitions do not align cleanly with realizable behaviors, operators encounter difficulties validating service behavior, correlating faults, or evolving services over time. These gaps are typically addressed through custom logic or manual processes, reducing portability and interoperability.</t>
</section>

<section title="Lack of Consistent Operational Semantics">
<t>Many abstraction models expose parameters or metrics that are syntactically similar but semantically inconsistent across technologies or implementations. Differences in interpretation, update frequency, or scope can lead to unpredictable behavior when abstractions are consumed by automation systems.</t>
<t>Without consistent operational semantics, it is difficult for management and orchestration systems to reliably interpret abstraction state, compare information across domains, or make automated decisions based on abstraction models alone.</t>
</section>

<section title="Limited Guidance for API-Based Consumption">
<t>YANG data models are commonly used as the basis for APIs that expose service abstractions to external systems. However, existing work provides limited guidance on how these abstractions should be exposed, versioned, or consumed in a predictable and interoperable manner. As a result, APIs derived from similar abstraction models may differ significantly across vendors or deployments, requiring bespoke integration by operators and OSS/BSS systems. This variability undermines the portability and reuse that abstractions are intended to provide.</t>
</section>

<section title="Incomplete Support for End-to-End Automation">
<t>While individual mechanisms support automation at specific layers or points in the service lifecycle, they do not collectively provide a coherent framework for abstraction-driven automation across systems. Automation workflows frequently span service modeling, network configuration, monitoring, and fault management, yet existing approaches treat these aspects in isolation.</t>
<t>This lack of coordination limits the effectiveness of automation and makes it difficult to implement closed-loop operational workflows that adapt to changes in service requirements or network conditions.</t>
</section>

<section title="Summary">
<t>Taken together, these limitations demonstrate that existing mechanisms, while necessary, are not sufficient to address the operational challenges associated with service and network abstractions. The gaps are not primarily due to missing protocols or data models, but to the lack of coordination, consistency, and operational guidance across abstraction efforts. Addressing these issues requires a holistic examination of abstraction modeling and operational usage, which is the focus of the ONIONS WG.</t>
</section>
</section>

 <section title="Operational Evidence from the IAB NEMOPS Workshop">

<t>The operational challenges described in this document are consistent with, and reinforced by, the findings of the IAB Next Era of Network Management Operations (NEMOPS)<xref target="NEMOPS"/> workshop, which examined the state of network management and automation based on operator experience across diverse deployment environments.</t>

 <t>The NEMOPS workshop identified that, despite significant progress in protocol development and data modeling, operational workflows remain fragmented and difficult to automate end-to-end. Operators reported continued reliance on a heterogeneous mix of tools, protocols, and interfaces, including YANG-based management protocols, vendor-specific APIs, legacy mechanisms such as CLI and SNMP, and bespoke orchestration logic to deploy and operate services. This fragmentation increases operational complexity and limits the effectiveness of abstraction-driven automation.</t>

<t>A key observation from the workshop is that model-driven network management is generally successful, yet insufficient on its own to address higher-level operational needs. In particular, the workshop highlighted gaps between device-level and service-level abstractions, noting that existing models often lack the semantic alignment and contextual information required by orchestration and OSS/BSS systems. As a result, operators must perform extensive model mapping, data transformation, and system-specific integration outside the scope of standardized abstractions.</t>

<t>The workshop further emphasized challenges related to observability, verification, and feedback. While configuration mechanisms are relatively mature, operators reported limited ability to validate whether service intent is being met over time or to correlate operational state across abstraction layers. This lack of consistent feedback undermines closed-loop automation and complicates troubleshooting, particularly in multi-vendor and multi-domain environments.</t>
<t>Another recurring theme from the NEMOPS discussions is the lack of architectural documentation and operational guidance explaining how existing abstractions, models, protocols, and tools are intended to work together as a system. Operators expressed difficulty understanding which abstractions to use, how they should be combined, and how responsibilities are divided across layers and working groups. This absence of cohesive guidance leads to divergent interpretations and inconsistent deployments.</t>
<t>These findings closely align with the limitations identified in the applicability studies discussed earlier and reinforce a broader operational problem: while many of the necessary technical components for service and network abstractions exist, they are not sufficiently coordinated, aligned, or documented to support consistent, interoperable, and automatable operations. Addressing these systemic issues requires a focus on abstraction coherence, lifecycle semantics, and operational consumption concerns that fall squarely within the scope of the ONIONS Working Group.</t>
</section>



   <section title="Requirements to Network Operation">

      <t>Based on the illustrations above, the following requirements have been identified.</t>
      <t indent="4">-  Application and Network Coordination</t>
      <t indent="5">The network operation must be aware of the requirements
      for supporting services, including: establishing Overlay connections
      for specific service needs, providing on-demand underlay physical resource
      guarantees, and achieving coordination between the network and services.</t>  

      <t indent="4">-  On-Demand Setup, Teardown, and Flexible Networking</t>
      <t indent="5">The network operation and maintenance system must be capable of 
      rapidly establishing real-time service connections between the user-specified
      start and end points based on user requirements. Upon service completion, 
      connections should be dismantled and resources released, providing users 
      with on-demand connectivity and billing. This meets users' sudden service 
      demands and reduces their expenses.</t>  
      <t indent="4">-  Elastic Provision of Super high-Bandwidth Services</t>

      <t indent="5">The network must possess the capability to elastically provide
      super high bandwidth, meeting users' elastic resource requirements and enabling
      full utilization of network resources. </t> 
      <t indent="4">-  Ubiquitous Access Provisioning</t>
      <t indent="5">To facilitate user convenience in accessing computational 
      resources, the network must support ubiquitous access and wide coverage,
      allowing users to flexibly connect through various methods and ensuring
      computational resources are readily available on demand.</t>  
      <t indent="4">-  Trustworthiness and Reliability</t>
      <t indent="5">The network must be trustworthy and reliable, strictly 
      ensuring the security and dependability of user data transmission.  </t>
      <t indent="4">-  Cross-Domain Coordination</t>
      <t indent="5">For user data transmission needs across domains or even 
      across different operators, the network must possess cross-domain 
      coordination capabilities, enabling flexible end-to-end scheduling of 
      network resources and services.</t>

      <t>The above requirements need the network operation system needs to 
      dynamicaly coordinate behavior across multiple network segments, 
      expose the YANG-based network and service capabilities through 
      open APIs, driven  by service-level events, workload changes, or
      short-lived operational needs.</t>
         
    </section>

<section title="Manageability Considerations">
<t>TBD.</t>
</section>

<section title="Security Considerations">
<t>TBD.</t>
</section>

<section title="IANA Considerations">
<t>No Action is needed.</t>
</section>


  </middle>

  <back>
    <references title="Normative References">

 <?rfc include="reference.RFC.2119"?>

        <?rfc include="reference.RFC.8174"?>
     
    </references>

    <references title="Informative References">


      <?rfc include="reference.I-D.dunbar-onions-ac-te-applicability"?>

      <?rfc include="reference.I-D.dunbar-neotec-ac-pe2pe-ucmp-applicability"?>
      
      <reference anchor="NEMOPS" target="https://datatracker.ietf.org/group/nemopsws/about/">
        <front>
          <title>NEMOPS</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>
    </references>
  </back>
</rfc>