<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-ippm-twamp-yang-13" indexInclude="true" ipr="trust200902" number="8913" prepTime="2021-11-17T22:43:01" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-ippm-twamp-yang-13" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8913" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="TWAMP YANG Data Model">Two-Way Active Measurement Protocol (TWAMP) YANG Data Model</title>
    <seriesInfo name="RFC" value="8913" stream="IETF"/>
    <author fullname="Ruth Civil" initials="R." surname="Civil">
      <organization showOnFrontPage="true">Ciena Corporation</organization>
      <address>
        <postal>
          <street>307 Legget Drive</street>
          <city>Kanata</city>
          <region>ON</region>
          <code>K2K 3C8</code>
          <country>Canada</country>
        </postal>
        <email>ruthcivil@gmail.com</email>
        <uri>www.ciena.com</uri>
      </address>
    </author>
    <author fullname="Al Morton" initials="A." surname="Morton">
      <organization showOnFrontPage="true">AT&amp;T Labs</organization>
      <address>
        <postal>
          <street>200 Laurel Avenue South</street>
          <city>Middletown</city>
          <region>NJ</region>
          <code>07748</code>
          <country>United States of America</country>
        </postal>
        <phone>+1 732 420 1571</phone>
        <email>acmorton@att.com</email>
        <uri/>
      </address>
    </author>
    <author fullname="Reshad Rahman" initials="R." surname="Rahman">
      <organization showOnFrontPage="true"/>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>Canada</country>
        </postal>
        <email>reshad@yahoo.com</email>
      </address>
    </author>
    <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
      <organization showOnFrontPage="true">Xoriant Corporation</organization>
      <address>
        <postal>
          <street>1248 Reamwood Avenue</street>
          <city>Sunnyvale</city>
          <region>CA</region>
          <code>94089</code>
          <country>United States of America</country>
        </postal>
        <email>mjethanandani@gmail.com</email>
      </address>
    </author>
    <author fullname="Kostas Pentikousis" initials="K." surname="Pentikousis" role="editor">
      <organization showOnFrontPage="true">Detecon</organization>
      <address>
        <postal>
          <street>Winterfeldtstrasse 21</street>
          <code>10781</code>
          <city>Berlin</city>
          <country>Germany</country>
        </postal>
        <email>kostas.pentikousis@detecon.com</email>
      </address>
    </author>
    <date month="11" year="2021"/>
    <area>Transport</area>
    <workgroup>IPPM</workgroup>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document specifies a data model for client and server
      implementations of the Two-Way Active Measurement Protocol (TWAMP). This
      document defines the TWAMP data model through Unified Modeling Language
      (UML) class diagrams and formally specifies it using the YANG data
      modeling language (RFC 7950).  The data model is compliant with the Network Management Datastore Architecture
      (NMDA).</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8913" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-motivation">Motivation</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.3">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.3.1"><xref derivedContent="1.3" format="counter" sectionFormat="of" target="section-1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-document-organization">Document Organization</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-scope-model-and-applicabili">Scope, Model, and Applicability</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model-overview">Data Model Overview</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-client">Control-Client</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-server">Server</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender">Session-Sender</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector">Session-Reflector</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model-parameters">Data Model Parameters</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-client-2">Control-Client</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-server-2">Server</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender-2">Session-Sender</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector-2">Session-Reflector</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model">Data Model</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-yang-tree-diagram">YANG Tree Diagram</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-yang-module">YANG Module</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-model-examples">Data Model Examples</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-client-3">Control-Client</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-server-3">Server</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.3">
                <t indent="0" pn="section-toc.1-1.6.2.3.1"><xref derivedContent="6.3" format="counter" sectionFormat="of" target="section-6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender-3">Session-Sender</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.4">
                <t indent="0" pn="section-toc.1-1.6.2.4.1"><xref derivedContent="6.4" format="counter" sectionFormat="of" target="section-6.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector-3">Session-Reflector</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detailed-data-model-example">Detailed Data Model Examples</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.10.2">
              <li pn="section-toc.1-1.10.2.1">
                <t indent="0" pn="section-toc.1-1.10.2.1.1"><xref derivedContent="A.1" format="counter" sectionFormat="of" target="section-appendix.a.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-client-4">Control-Client</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.2">
                <t indent="0" pn="section-toc.1-1.10.2.2.1"><xref derivedContent="A.2" format="counter" sectionFormat="of" target="section-appendix.a.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-server-4">Server</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.3">
                <t indent="0" pn="section-toc.1-1.10.2.3.1"><xref derivedContent="A.3" format="counter" sectionFormat="of" target="section-appendix.a.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender-4">Session-Sender</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.4">
                <t indent="0" pn="section-toc.1-1.10.2.4.1"><xref derivedContent="A.4" format="counter" sectionFormat="of" target="section-appendix.a.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector-4">Session-Reflector</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="Appendix B" format="default" sectionFormat="of" target="section-appendix.b"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-twamp-operational-commands">TWAMP Operational Commands</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.d"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.e"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">The <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357">Two-Way Active Measurement Protocol
      (TWAMP) </xref> is used to measure network performance parameters such
      as latency, bandwidth, and packet loss by sending probe packets and
      measuring their experience in the network. To date, TWAMP
      implementations do not come with a standard management framework, and,
      as such, implementers have no choice except to provide a proprietary
      mechanism. This document addresses this gap by defining the model using
      Unified Modeling Language (UML) class diagrams <xref target="UML" format="default" sectionFormat="of" derivedContent="UML"/> and formally specifying a TWAMP data model
      that is compliant with the Network Management Datastore Architecture
      (NMDA) <xref target="RFC8342" format="default" sectionFormat="of" derivedContent="RFC8342"/>, using
      <xref target="RFC7950" format="default" sectionFormat="of" derivedContent="RFC7950">YANG 1.1 </xref>.</t>
      <section anchor="motivation" numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-motivation">Motivation</name>
        <t indent="0" pn="section-1.1-1">In current TWAMP deployments, the lack of a standardized data model
        limits the flexibility to dynamically instantiate TWAMP-based
        measurements across equipment from different vendors. In large,
        virtualized, and dynamically instantiated infrastructures where
        network functions are placed according to orchestration algorithms,
        proprietary mechanisms for managing TWAMP measurements pose severe
        limitations with respect to programmability.</t>
        <t indent="0" pn="section-1.1-2">Two major trends call for standardizing TWAMP management aspects.
        First, it is expected that in the coming years large-scale and
        multi-vendor TWAMP deployments will become the norm. From an
        operations perspective, using several vendor-specific TWAMP
        configuration mechanisms when one standard mechanism could provide an
        alternative is expensive and inefficient. Second, the increasingly
        software-defined and virtualized nature of network infrastructures,
        based on dynamic service chains <xref target="NSC" format="default" sectionFormat="of" derivedContent="NSC"/> and programmable
        control and management planes <xref target="RFC7426" format="default" sectionFormat="of" derivedContent="RFC7426"/>, requires
        a well-defined data model for TWAMP implementations. This document
        defines such a TWAMP data model and specifies it formally using the
        <xref target="RFC7950" format="default" sectionFormat="of" derivedContent="RFC7950">YANG 1.1 data modeling language</xref>.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-terminology">Terminology</name>
        <t indent="0" pn="section-1.2-1">The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
        "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>",
        "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>",
        "<bcp14>SHOULD NOT</bcp14>",
        "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
        "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document
        are to be interpreted as described in BCP 14
        <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.3">
        <name slugifiedName="name-document-organization">Document Organization</name>
        <t indent="0" pn="section-1.3-1">The rest of this document is organized as follows. <xref target="scope" format="default" sectionFormat="of" derivedContent="Section 2"/> presents the scope and applicability of this
        document. <xref target="structure" format="default" sectionFormat="of" derivedContent="Section 3"/> provides a high-level overview of
        the TWAMP data model. <xref target="parameters" format="default" sectionFormat="of" derivedContent="Section 4"/> details the
        configuration parameters of the data model, and <xref target="module" format="default" sectionFormat="of" derivedContent="Section 5"/>
        specifies in YANG the TWAMP data model. <xref target="examples" format="default" sectionFormat="of" derivedContent="Section 6"/>
        lists illustrative examples that conform to the YANG data model
        specified in this document. <xref target="AuthExample" format="default" sectionFormat="of" derivedContent="Appendix A"/> elaborates
        these examples further.</t>
      </section>
    </section>
    <section anchor="scope" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-scope-model-and-applicabili">Scope, Model, and Applicability</name>
      <t indent="0" pn="section-2-1">The purpose of this document is the specification of a
      vendor-independent data model for TWAMP implementations.</t>
      <t indent="0" pn="section-2-2"><xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/> illustrates a redrawn version of the TWAMP
      logical model found in <xref target="RFC5357" sectionFormat="of" section="1.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5357#section-1.2" derivedContent="RFC5357">TWAMP</xref>. The figure is annotated with pointers to the
      <xref target="UML" format="default" sectionFormat="of" derivedContent="UML">UML diagrams</xref> provided in this document and
      associated with the data model of the four logical entities in a TWAMP
      deployment, namely the TWAMP Control-Client, Server, Session-Sender, and
      Session-Reflector. A UML Notation Guide is available in Section 5
      of UML <xref target="UML" format="default" sectionFormat="of" derivedContent="UML"/>.</t>
      <t indent="0" pn="section-2-3">As per <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357">TWAMP </xref>, unlabeled links in <xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/> are left unspecified and may be proprietary
      protocols.</t>
      <figure anchor="fig_scope" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-annotated-twamp-logical-mod">Annotated TWAMP Logical Model</name>
        <artwork name="" type="" align="left" alt="" pn="section-2-4.1">
         (Figure 3)                              (Figure 4)
     +----------------+                          +--------+
     | Control-Client |  &lt;-- TWAMP-Control --&gt;   | Server |
     +----------------+                          +--------+ 
             ^                                        ^
             |                                        |
             V                                        V
     +----------------+                     +-------------------+
     | Session-Sender |  &lt;-- TWAMP-Test --&gt; | Session-Reflector |
     +----------------+                     +-------------------+
         (Figure 5)                               (Figure 6)</artwork>
      </figure>
      <t indent="0" pn="section-2-5">As per <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357">TWAMP </xref>, a TWAMP implementation
      may follow a simplified logical model, in which the same node acts as both
      Control-Client and Session-Sender, while another node acts at the
      same time as both TWAMP Server and Session-Reflector. <xref target="fig_scope2" format="default" sectionFormat="of" derivedContent="Figure 2"/> illustrates this simplified logical model and
      indicates the interaction between the TWAMP configuration client and
      server using, for instance, <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241">NETCONF </xref> or
      <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040">RESTCONF </xref>.</t>
      <figure anchor="fig_scope2" align="left" suppress-title="false" pn="figure-2">
        <name slugifiedName="name-simplified-twamp-model-and-">Simplified TWAMP Model and Protocols</name>
        <artwork name="" type="" align="left" alt="" pn="section-2-6.1">
  o-------------------o                       o-------------------o
  |   Config client   |                       |   Config client   |
  o-------------------o                       o-------------------o
           ||                                          ||
   NETCONF || RESTCONF                         NETCONF || RESTCONF
           ||                                          ||
  o-------------------o                       o-------------------o
  |   Config server   |                       |   Config server   |
  | (Figures 3 and 5) |                       | (Figures 4 and 6) |
  +-------------------+                       +-------------------+
  |   Control-Client  | &lt;-- TWAMP-Control --&gt; |      Server       |
  |                   |                       |                   |
  |   Session-Sender  |  &lt;-- TWAMP-Test --&gt;   | Session-Reflector |
  +-------------------+                       +-------------------+</artwork>
      </figure>
      <t indent="0" pn="section-2-7">The data model defined in this document is orthogonal to the specific
      protocol used between the Config client and Config server to communicate
      the TWAMP configuration parameters.</t>
      <t indent="0" pn="section-2-8">Operational actions such as how TWAMP-Test sessions are started and
      stopped, how performance measurement results are retrieved, or how
      stored results are cleared, and so on, are not addressed by the
      configuration model defined in this document. As noted above, such
      operational actions are not part of the TWAMP specification <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357"/> and hence are out of scope for this
      document. See also <xref target="OperationalCommands" format="default" sectionFormat="of" derivedContent="Appendix B"/>. In addition,
      for operational state, the information provided in the Performance Metrics Registry <xref target="RFC8911" format="default" sectionFormat="of" derivedContent="RFC8911"/> and
      <xref target="PERF-METRICS" format="default" sectionFormat="of" derivedContent="PERF-METRICS"/> can be used to develop an independent model for the
      Performance Metrics that need to be captured and retrieved.</t>
    </section>
    <section anchor="structure" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-data-model-overview">Data Model Overview</name>
      <t indent="0" pn="section-3-1">The TWAMP data model includes four categories of configuration
      items.</t>
      <t indent="0" pn="section-3-2">First, global configuration items relate to parameters that are set
      on a per-device level. For example, the administrative status of the
      device with respect to whether it allows TWAMP sessions and, if so, in
      what capacity (e.g., Control-Client, Server, or both) is a typical
      instance of a global configuration item.</t>
      <t indent="0" pn="section-3-3">A second category includes attributes that can be configured on a
      per‑TWAMP-Control-connection basis, such as the Server IP address.</t>
      <t indent="0" pn="section-3-4">A third category includes attributes related to
      per-TWAMP-Test-session attributes -- for instance, setting different values in the
      Differentiated Services Code Point (DSCP) field.</t>
      <t indent="0" pn="section-3-5">Finally, the data model includes attributes that relate to the
      operational state of the TWAMP implementation.</t>
      <t indent="0" pn="section-3-6">As the TWAMP data model is described in the remaining sections of
      this document, readers should keep in mind the functional entity
      grouping illustrated in <xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/>.</t>
      <section anchor="twamp-client" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-control-client">Control-Client</name>
        <t indent="0" pn="section-3.1-1">A TWAMP Control-Client has an administrative status field set at
        the device level that indicates whether the node is enabled to
        function as such.</t>
        <t indent="0" pn="section-3.1-2">Each TWAMP Control-Client is associated with zero or more
        TWAMP‑Control connections. The main configuration parameters of each
        control connection are: </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.1-3">
          <li pn="section-3.1-3.1">A name that can be used to uniquely identify at the
            Control-Client a particular control connection. This name is
            necessary for programmability reasons because at the time of
            creation of a TWAMP-Control connection not all IP and TCP port
            number information needed to uniquely identify the connection is
            available.</li>
          <li pn="section-3.1-3.2">The IP address of the interface the Control-Client will use for
            connections.</li>
          <li pn="section-3.1-3.3">The IP address of the remote TWAMP Server.</li>
          <li pn="section-3.1-3.4">Authentication and encryption attributes such as KeyID, Token,
            and the Control-Client Initialization Vector (Client-IV); see also
            Section <xref target="RFC4656" sectionFormat="bare" section="3.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4656#section-3.1" derivedContent="RFC4656"/> of <xref target="RFC4656" format="default" sectionFormat="of" derivedContent="RFC4656">"A One-way
          Active Measurement Protocol (OWAMP)"</xref> and <xref target="RFC4086" format="default" sectionFormat="of" derivedContent="RFC4086">"Randomness Requirements for Security"</xref>.</li>
        </ul>
        <t indent="0" pn="section-3.1-4">Each TWAMP-Control connection, in turn, is associated with zero or
        more TWAMP-Test sessions. For each test session, the following
        configuration items should be noted: </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.1-5">
          <li pn="section-3.1-5.1">The test session name, which uniquely identifies a particular test
            session at the Control-Client and Session-Sender. Similar to the
            control connections mentioned above, this unique test session name is needed
            because at the time of creation of a TWAMP-Test session, for
            example, the source UDP port number is not known to uniquely
            identify the test session.</li>
          <li pn="section-3.1-5.2">The IP address and UDP port number of the Session-Sender on the
            path under test by TWAMP.</li>
          <li pn="section-3.1-5.3">The IP address and UDP port number of the Session-Reflector on
            said path.</li>
          <li pn="section-3.1-5.4">Information pertaining to the test packet stream, such as the
            test starting time; which Performance Metric is to be used, as
            defined in <xref target="RFC8911" format="default" sectionFormat="of" derivedContent="RFC8911">"Registry
            for Performance Metrics"</xref>; or whether the test should be
            repeated.</li>
        </ul>
      </section>
      <section anchor="twamp-server" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-server">Server</name>
        <t indent="0" pn="section-3.2-1">Each TWAMP Server has an administrative status field set at the
        device level to indicate whether the node is enabled to function as a
        TWAMP Server.</t>
        <t indent="0" pn="section-3.2-2">Each Server is associated with zero or more TWAMP-Control
        connections. Each control connection is uniquely identified by the
        4-tuple {Control-Client IP address, Control-Client TCP port number,
        Server IP address, Server TCP port}.  Control connection configuration
        items on a TWAMP Server are read-only.</t>
      </section>
      <section anchor="twampSender" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-session-sender">Session-Sender</name>
        <t indent="0" pn="section-3.3-1">A TWAMP Session-Sender has an administrative status field set at
        the device level that indicates whether the node is enabled to
        function as such.</t>
        <t indent="0" pn="section-3.3-2">There is one Session-Sender instance for each TWAMP-Test session
        that is initiated from the sending device. Primary configuration
        fields include: </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.3-3">
          <li pn="section-3.3-3.1">The test session name, which <bcp14>MUST</bcp14> be identical to the corresponding
            test session name on the TWAMP Control-Client (<xref target="twamp-client" format="default" sectionFormat="of" derivedContent="Section 3.1"/>).</li>
          <li pn="section-3.3-3.2">The control connection name, which, along with the test session
            name, uniquely identifies the TWAMP Session-Sender instance.</li>
          <li pn="section-3.3-3.3">Information pertaining to the test packet stream, such as the
            number of test packets and the packet distribution to be employed;
            see also <xref target="RFC3432" format="default" sectionFormat="of" derivedContent="RFC3432">"Network performance measurement
            with periodic streams"</xref>.</li>
        </ul>
      </section>
      <section anchor="twampReflector" numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-session-reflector">Session-Reflector</name>
        <t indent="0" pn="section-3.4-1">Each TWAMP Session-Reflector has an administrative status field set
        at the device level to indicate whether the node is enabled to
        function as such.</t>
        <t indent="0" pn="section-3.4-2">Each Session-Reflector is associated with zero or more TWAMP-Test
        sessions. For each test session, the REFWAIT timeout parameter, which
        determines whether to discontinue the session if no packets have been
        received (<xref target="RFC5357" sectionFormat="comma" section="4.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5357#section-4.2" derivedContent="RFC5357">TWAMP</xref>), can be
        configured.</t>
        <t indent="0" pn="section-3.4-3">Read-only access to other data model parameters, such as the Sender
        IP address, is foreseen. Each test session can be uniquely identified
        by the 4-tuple mentioned in <xref target="twamp-server" format="default" sectionFormat="of" derivedContent="Section 3.2"/>.</t>
      </section>
    </section>
    <section anchor="parameters" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-data-model-parameters">Data Model Parameters</name>
      <t indent="0" pn="section-4-1">This section defines the TWAMP data model using UML <xref target="UML" format="default" sectionFormat="of" derivedContent="UML"/> and introduces selected parameters associated
      with the four TWAMP logical entities. The complete TWAMP data model
      specification is provided in the YANG module presented in <xref target="yangmodule" format="default" sectionFormat="of" derivedContent="Section 5.2"/>.</t>
      <section anchor="clientConfig" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-control-client-2">Control-Client</name>
        <t indent="0" pn="section-4.1-1">The client container (see <xref target="fig_twamp-client" format="default" sectionFormat="of" derivedContent="Figure 3"/>) holds
        items that are related to the configuration of the TWAMP
        Control-Client logical entity (recall <xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/>).</t>
        <t indent="0" pn="section-4.1-2">The client container includes an administrative configuration
        parameter (client/admin-state) that indicates whether the device is
        allowed to initiate TWAMP-Control connections.</t>
        <figure anchor="fig_twamp-client" align="left" suppress-title="false" pn="figure-3">
          <name slugifiedName="name-twamp-control-client-uml-cl">TWAMP Control-Client UML Class Diagram</name>
          <artwork name="" type="" align="left" alt="" pn="section-4.1-3.1">
  +-------------+
  | client      |
  +-------------+                   1..* +-----------------------+
  | admin-state |&lt;&gt;----------------------| mode-preference-chain |
  |             |                        +-----------------------+
  |             |  1..* +------------+   | priority              |
  |             |&lt;&gt;-----| key-chain  |   | mode                  |
  +-------------+       +------------+   +-----------------------+
         ^              | key-id     |
         V              | secret-key |
         |              +------------+
         | 0..*
  +------------------------+
  | ctrl-connection        |
  +------------------------+
  | name                   |
  | client-ip              |
  | server-ip              |
  | server-tcp-port        |    0..* +----------------------+
  | control-packet-dscp    |&lt;&gt;-------| test-session-request |
  | key-id                 |         +----------------------+
  | max-count              |         | name                 |
  | client-tcp-port   {ro} |         | sender-ip            |
  | server-start-time {ro} |         | sender-udp-port      |
  | state             {ro} |         | reflector-ip         |
  | selected-mode     {ro} |         | reflector-udp-port   |
  | token             {ro} |         | timeout              |
  | client-iv         {ro} |         | padding-length       |
  +------------------------+         | test-packet-dscp     |
                                     | start-time           |
              +-------------+ 1      | repeat               |
              | pm-reg-list |------&lt;&gt;| repeat-interval      |
              +-------------+        | state           {ro} |
              | pm-index    |        | sid             {ro} |
              +-------------+        +----------------------+</artwork>
        </figure>
        <t indent="0" pn="section-4.1-4">The client container holds a list (mode-preference-chain) that
        specifies the mode values according to their preferred order of use by
        the operator of this Control-Client, including the authentication and
        encryption modes. Specifically, mode-preference-chain lists the mode
        and its corresponding priority, expressed as a 16-bit unsigned integer. Values
        for the priority start with zero, the highest priority, and decreasing
        priority value is indicated by every increase in value by one.</t>
        <t indent="0" pn="section-4.1-5">Depending on the modes available in the Server Greeting, the
        Control-Client <bcp14>MUST</bcp14> choose the highest-priority mode from the
        configured mode-preference-chain list.</t>
        <t indent="0" pn="section-4.1-6">Note that the list of preferred modes may set multiple bit
        positions independently, such as when referring to the extended TWAMP
        features in <xref target="RFC5618" format="default" sectionFormat="of" derivedContent="RFC5618">"Mixed Security
        Mode for the Two-Way Active Measurement Protocol (TWAMP)"</xref>,
        <xref target="RFC5938" format="default" sectionFormat="of" derivedContent="RFC5938">"Individual Session Control
        Feature for the Two-Way Active Measurement Protocol (TWAMP)"</xref>, <xref target="RFC6038" format="default" sectionFormat="of" derivedContent="RFC6038">"Two-Way Active 
Measurement Protocol (TWAMP) Reflect Octets and Symmetrical Size Features"</xref>, and <xref target="RFC7717" format="default" sectionFormat="of" derivedContent="RFC7717">"IKEv2-Derived Shared Secret Key for
        the One-Way Active Measurement Protocol (OWAMP) and
        Two-Way Active Measurement Protocol (TWAMP)"</xref>. If the Control-Client cannot determine an acceptable mode, or
        when the bit combinations do not make sense, e.g., authenticated
        and unauthenticated bits are both set, it <bcp14>MUST</bcp14> respond with zero Mode bits
        set in the Set-Up-Response message, indicating that it will not continue
        with the control connection.</t>
        <t indent="0" pn="section-4.1-7">In addition, the client container holds a list named "key-chain",
        which relates key-id with the respective secret-key. Both the Server
        and the Control-Client use the same mappings from key-id to secret‑key
        (in <xref target="fig_twamp-client" format="default" sectionFormat="of" derivedContent="Figure 3"/>); in order for this to work
        properly, key-id must be unique across all systems in the
        administrative domain. The Server, being prepared to conduct sessions
        with more than one Control-Client, uses key-id to choose the
        appropriate secret-key; a Control-Client would typically have
        different secret keys for different Servers. The secret-key is the
        shared secret, of type "binary", and the length <bcp14>SHOULD</bcp14> contain at least
        128 bits of entropy. The key-id and secret-key encoding <bcp14>SHOULD</bcp14> follow
        <xref target="RFC7950" sectionFormat="of" section="9.8" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7950#section-9.8" derivedContent="RFC7950">YANG</xref>. The derived key
        length (dkLen as defined in <xref target="RFC8018" format="default" sectionFormat="of" derivedContent="RFC8018">"PKCS #5: Password-Based
        Cryptography Specification Version 2.1"</xref>) <bcp14>MUST</bcp14> be 16 octets for
        the AES Session-key used for encryption and 32 octets for the
        HMAC-SHA1 Session-key used for authentication; see also <xref target="RFC4656" sectionFormat="of" section="6.10" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4656#section-6.10" derivedContent="RFC4656">OWAMP</xref>.</t>
        <t indent="0" pn="section-4.1-8">Each client container also holds a list of control connections,
        where each item in the list describes a TWAMP-Control connection
        initiated by this Control-Client. There <bcp14>SHALL</bcp14> be one ctrl-connection
        per TWAMP-Control (TCP) connection that is to be initiated from this
        device.</t>
        <t indent="0" pn="section-4.1-9">In turn, each ctrl-connection holds a test-session-request list.
        Each test-session-request holds information associated with the
        Control-Client for this test session. This includes information
        associated with the Request-TW-Session/Accept-Session message exchange
        (see <xref target="RFC5357" sectionFormat="of" section="3.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5357#section-3.5" derivedContent="RFC5357">TWAMP</xref>).</t>
        <t indent="0" pn="section-4.1-10">There <bcp14>SHALL</bcp14> be one instance of test-session-request for each
        TWAMP‑Test session that is to be negotiated by this TWAMP-Control
        connection via a Request-TW-Session/Accept-Session exchange.</t>
        <t indent="0" pn="section-4.1-11">The Control-Client is also responsible for scheduling TWAMP-Test
        sessions; therefore, test-session-request holds information related to
        these actions (e.g., pm-index, repeat-interval).</t>
      </section>
      <section anchor="serverConfig" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-server-2">Server</name>
        <t indent="0" pn="section-4.2-1">The server container (see <xref target="fig_twamp-server" format="default" sectionFormat="of" derivedContent="Figure 4"/>) holds
        items that are related to the configuration of the TWAMP Server
        logical entity (recall <xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/>).</t>
        <t indent="0" pn="section-4.2-2">The server container includes an administrative configuration
        parameter (server/admin-state) that indicates whether the device is
        allowed to receive TWAMP-Control connections.</t>
        <t indent="0" pn="section-4.2-3">A device operating in the Server Role cannot configure attributes
        on a per-TWAMP-Control-connection basis, as it has no foreknowledge of
        the incoming TWAMP-Control connections to be received. Consequently,
        any parameter that the Server might want to apply to an incoming
        control connection must be configured at the overall Server level and
        applied to all incoming TWAMP-Control connections.</t>
        <figure anchor="fig_twamp-server" align="left" suppress-title="false" pn="figure-4">
          <name slugifiedName="name-twamp-server-uml-class-diag">TWAMP Server UML Class Diagram</name>
          <artwork name="" type="" align="left" alt="" pn="section-4.2-4.1">
    +---------------------+
    | server              |
    +---------------------+
    | admin-state         |   1..* +------------+
    | server-tcp-port     |&lt;&gt;------| key-chain  |
    | servwait            |        +------------+
    | control-packet-dscp |        | key-id     |
    | count               |        | secret-key |
    | max-count           |        +------------+
    | modes               |
    |                     |   0..* +--------------------------+
    |                     |&lt;&gt;------| ctrl-connection          |
    +---------------------+        +--------------------------+
                                   | client-ip           {ro} |
                                   | client-tcp-port     {ro} |
                                   | server-ip           {ro} |
                                   | server-tcp-port     {ro} |
                                   | state               {ro} |
                                   | control-packet-dscp {ro} |
                                   | selected-mode       {ro} |
                                   | key-id              {ro} |
                                   | count               {ro} |
                                   | max-count           {ro} |
                                   | salt                {ro} | 
                                   | server-iv           {ro} |
                                   | challenge           {ro} |
                                   +--------------------------+</artwork>
        </figure>
        <t indent="0" pn="section-4.2-5">Each server container holds a list named "key-chain", which relates
        key-id with the respective secret-key. As mentioned in <xref target="clientConfig" format="default" sectionFormat="of" derivedContent="Section 4.1"/>, both the Server and the Control-Client use
        the same mapping from key‑id to the shared secret-key; in order for this
        to work properly, key-id must be unique across all the systems in the
        administrative domain. The Server, being prepared to conduct sessions
        with more than one Control-Client, uses key-id to choose the
        appropriate secret-key; a Control-Client would typically have
        different secret keys for different Servers.  key-id tells the
        Server which shared secret-key the Control-Client wishes to use for
        authentication or encryption.</t>
        <t indent="0" pn="section-4.2-6">Each incoming control connection active on the Server is
        represented by a ctrl-connection. There <bcp14>SHALL</bcp14> be one ctrl-connection
        per incoming TWAMP-Control (TCP) connection that is received and
        active on the Server. Each ctrl-connection can be uniquely identified
        by the 4-tuple {client-ip, client-tcp-port, server-ip,
        server-tcp-port}.  All items in the ctrl-connection list are
        read-only.</t>
      </section>
      <section anchor="senderConfig" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-session-sender-2">Session-Sender</name>
        <t indent="0" pn="section-4.3-1">The session-sender container, illustrated in <xref target="fig_twampSenders" format="default" sectionFormat="of" derivedContent="Figure 5"/>, holds items that are related to the
        configuration of the TWAMP Session-Sender logical entity.</t>
        <t indent="0" pn="section-4.3-2">The session-sender container includes an administrative parameter
        (session-sender/admin-state) that controls whether the device is
        allowed to initiate TWAMP-Test sessions.</t>
        <figure anchor="fig_twampSenders" align="left" suppress-title="false" pn="figure-5">
          <name slugifiedName="name-twamp-session-sender-uml-cl">TWAMP Session-Sender UML Class Diagram</name>
          <artwork name="" type="" align="left" alt="" pn="section-4.3-3.1">
      +----------------+
      | session-sender |
      +----------------+  0..* +---------------------------+
      | admin-state    |&lt;&gt;-----| test-session              |
      +----------------+       +---------------------------+
                               | name                      |
                               | ctrl-connection-name {ro} |
                               | fill-mode                 |
                               | number-of-packets         |
                               | state                {ro} |
                               | sent-packets         {ro} |
                               | rcv-packets          {ro} |
                               | last-sent-seq        {ro} |
                               | last-rcv-seq         {ro} |
                               +---------------------------+
                                            ^
                                            V
                                            | 1
                                +---------------------+
                                | packet-distribution |
                                +---------------------+
                                | periodic / poisson  |
                                +---------------------+
                                    |           |
                         +-------------------+  |
                         | periodic-interval |  | 
                         +-------------------+  |
                                                |
                                        +--------------+
                                        | lambda       | 
                                        | max-interval |
                                        +--------------+</artwork>
        </figure>
        <t indent="0" pn="section-4.3-4">Each TWAMP-Test session initiated by the Session-Sender will be
        represented by an instance of a test-session object. There <bcp14>SHALL</bcp14> be
        one instance of test-session for each TWAMP-Test session for which
        packets are being sent.</t>
      </section>
      <section anchor="reflectorConfig" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-session-reflector-2">Session-Reflector</name>
        <t indent="0" pn="section-4.4-1">The session-reflector container, illustrated in <xref target="fig_twampReflector" format="default" sectionFormat="of" derivedContent="Figure 6"/>, holds items that are related to the
        configuration of the TWAMP Session-Reflector logical entity.</t>
        <t indent="0" pn="section-4.4-2">The session-reflector container includes an administrative
        parameter (session-reflector/admin-state) that controls whether the
        device is allowed to respond to incoming TWAMP-Test sessions.</t>
        <t indent="0" pn="section-4.4-3">A device operating in the Session-Reflector Role cannot configure
        attributes on a per-session basis, as it has no foreknowledge of what
        incoming sessions it will receive. As such, any parameter that the
        Session-Reflector might want to apply to an incoming TWAMP-Test
        session must be configured at the overall Session-Reflector level and
        applied to all incoming sessions.</t>
        <figure anchor="fig_twampReflector" align="left" suppress-title="false" pn="figure-6">
          <name slugifiedName="name-twamp-session-reflector-uml">TWAMP Session-Reflector UML Class Diagram</name>
          <artwork name="" type="" align="left" alt="" pn="section-4.4-4.1">
             +-------------------+
             | session-reflector |
             +-------------------+
             | admin-state       |
             | refwait           |
             +-------------------+
                      ^
                      V
                      |
                      | 0..*
             +----------------------------------------+
             | test-session                           |
             +----------------------------------------+
             | sid                               {ro} |
             | sender-ip                         {ro} |
             | sender-udp-port                   {ro} |
             | reflector-ip                      {ro} |
             | reflector-udp-port                {ro} |
             | parent-connection-client-ip       {ro} |
             | parent-connection-client-tcp-port {ro} |
             | parent-connection-server-ip       {ro} |
             | parent-connection-server-tcp-port {ro} |
             | test-packet-dscp                  {ro} |
             | sent-packets                      {ro} |
             | rcv-packets                       {ro} |
             | last-sent-seq                     {ro} |
             | last-rcv-seq                      {ro} |
             +----------------------------------------+</artwork>
        </figure>
        <t indent="0" pn="section-4.4-5">Each incoming TWAMP-Test session that is active on the
        Session-Reflector <bcp14>SHALL</bcp14> be represented by an instance of a
        test-session object. All items in the test-session object are
        read-only.</t>
        <t indent="0" pn="section-4.4-6">Instances of test-session are indexed by a Session Identifier
        (SID) (the sid parameter). This SID value is auto-allocated by the TWAMP Server as test
        session requests are received and is communicated back to the
        Control-Client in the SID field of the Accept-Session message; see
        Section <xref target="RFC6038" sectionFormat="bare" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6038#section-4.3" derivedContent="RFC6038"/> of
        <xref target="RFC6038" format="default" sectionFormat="of" derivedContent="RFC6038">"Two-Way
        Active Measurement Protocol (TWAMP) Reflect Octets and Symmetrical
        Size Features"</xref>.</t>
        <t indent="0" pn="section-4.4-7">When attempting to retrieve operational data for active test
        sessions from a Session-Reflector device, the user will not know what
        sessions are currently active on that device or what SIDs have been
        auto‑allocated for these test sessions. If the user has network access
        to the Control-Client device, then it is possible to read the data for
        this session under client/ctrl-connection/test-session-request/sid and
        obtain the SID (see <xref target="fig_twamp-client" format="default" sectionFormat="of" derivedContent="Figure 3"/>). The user may
        then use this SID value as an index to retrieve an individual
        session-reflector/test-session instance on the Session-Reflector
        device.</t>
        <t indent="0" pn="section-4.4-8">If the user has no network access to the Control-Client device,
        then the only option is to retrieve all test-session instances from
        the Session-Reflector device and then pick out specific test-session
        instances of interest to the user. This could be problematic if a
        large number of test sessions are currently active on that device.</t>
        <t indent="0" pn="section-4.4-9">Each Session-Reflector TWAMP-Test session contains the following
        4-tuple: {parent-connection-client-ip,
        parent-connection-client-tcp-port, parent-connection-server-ip,
        parent-connection-server-tcp-port}.  This 4-tuple <bcp14>MUST</bcp14> correspond to
        the equivalent 4-tuple {client-ip, client-tcp-port, server-ip,
        server-tcp-port} in server⁠/ctrl-connection. This 4-tuple allows the
        user to trace back from the TWAMP-Test session to the (parent)
        TWAMP-Control connection that negotiated this test session.</t>
      </section>
    </section>
    <section anchor="module" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-data-model">Data Model</name>
      <t indent="0" pn="section-5-1">This section formally specifies the TWAMP data model using YANG.</t>
      <section anchor="yangtree" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-yang-tree-diagram">YANG Tree Diagram</name>
        <t indent="0" pn="section-5.1-1">This section presents a simplified graphical representation of the
        TWAMP data model using a YANG tree diagram. Readers should keep in
        mind that the limit of 72 characters per line forces us to introduce
        artificial line breaks in some tree diagram nodes. Tree diagrams used
        in this document follow the notation defined in <xref target="RFC8340" format="default" sectionFormat="of" derivedContent="RFC8340">"YANG Tree Diagrams"</xref>.</t>
        <t indent="0" pn="section-5.1-2">Please note that the backslash ('\') character near the end of the
        diagram is used for formatting purposes only
        (i.e., "reflector‑udp‑port]" should be treated as part of
        the same line as "[sender‑ip sender‑udp‑port reflector‑ip").</t>
        <figure anchor="fig_yangtree" align="left" suppress-title="false" pn="figure-7">
          <name slugifiedName="name-yang-tree-diagram-2">YANG Tree Diagram</name>
          <sourcecode type="yangtree" markers="false" pn="section-5.1-3.1">
module: ietf-twamp
  +--rw twamp
     +--rw client {control-client}?
     |  +--rw admin-state?             boolean
     |  +--rw mode-preference-chain* [priority]
     |  |  +--rw priority    uint16
     |  |  +--rw mode?       twamp-modes
     |  +--rw key-chain* [key-id]
     |  |  +--rw key-id        string
     |  |  +--rw secret-key?   binary
     |  +--rw ctrl-connection* [name]
     |     +--rw name                    string
     |     +--rw client-ip?              inet:ip-address
     |     +--rw server-ip               inet:ip-address
     |     +--rw server-tcp-port?        inet:port-number
     |     +--rw control-packet-dscp?    inet:dscp
     |     +--rw key-id?                 string
     |     +--rw max-count-exponent?     uint8
     |     +--ro client-tcp-port?        inet:port-number
     |     +--ro server-start-time?      uint64
     |     +--ro repeat-count?           uint64
     |     +--ro state?
     |     |       control-client-connection-state
     |     +--ro selected-mode?          twamp-modes
     |     +--ro token?                  binary
     |     +--ro client-iv?              binary
     |     +--rw test-session-request* [name]
     |        +--rw name                  string
     |        +--rw sender-ip?            inet:ip-address
     |        +--rw sender-udp-port?      union
     |        +--rw reflector-ip          inet:ip-address
     |        +--rw reflector-udp-port?   inet:port-number
     |        +--rw timeout?              uint64
     |        +--rw padding-length?       uint32
     |        +--rw test-packet-dscp?     inet:dscp
     |        +--rw start-time?           uint64
     |        +--rw repeat?               uint32
     |        +--rw repeat-interval?      uint32
     |        +--rw pm-reg-list* [pm-index]
     |        |  +--rw pm-index    uint16
     |        +--ro state?                test-session-state
     |        +--ro sid?                  string
     +--rw server {server}?
     |  +--rw admin-state?           boolean
     |  +--rw server-tcp-port?       inet:port-number
     |  +--rw servwait?              uint32
     |  +--rw control-packet-dscp?   inet:dscp
     |  +--rw count?                 uint8
     |  +--rw max-count-exponent?    uint8
     |  +--rw modes?                 twamp-modes
     |  +--rw key-chain* [key-id]
     |  |  +--rw key-id        string
     |  |  +--rw secret-key?   binary
     |  +--ro ctrl-connection*
     |          [client-ip client-tcp-port server-ip server-tcp-port]
     |     +--ro client-ip              inet:ip-address
     |     +--ro client-tcp-port        inet:port-number
     |     +--ro server-ip              inet:ip-address
     |     +--ro server-tcp-port        inet:port-number
     |     +--ro state?                 server-ctrl-connection-state
     |     +--ro control-packet-dscp?   inet:dscp
     |     +--ro selected-mode?         twamp-modes
     |     +--ro key-id?                string
     |     +--ro count?                 uint8
     |     +--ro max-count-exponent?    uint8
     |     +--ro salt?                  binary
     |     +--ro server-iv?             binary
     |     +--ro challenge?             binary
     +--rw session-sender {session-sender}?
     |  +--rw admin-state?    boolean
     |  +--rw test-session* [name]
     |     +--rw name                    string
     |     +--ro ctrl-connection-name?   string
     |     +--rw fill-mode?              padding-fill-mode
     |     +--rw number-of-packets       uint32
     |     +--rw (packet-distribution)?
     |     |  +--:(periodic)
     |     |  |  +--rw periodic-interval       decimal64
     |     |  +--:(poisson)
     |     |     +--rw lambda                  decimal64
     |     |     +--rw max-interval?           decimal64
     |     +--ro state?                  sender-session-state
     |     +--ro sent-packets?           uint32
     |     +--ro rcv-packets?            uint32
     |     +--ro last-sent-seq?          uint32
     |     +--ro last-rcv-seq?           uint32
     +--rw session-reflector {session-reflector}?
        +--rw admin-state?    boolean
        +--rw refwait?        uint32
        +--ro test-session*
                [sender-ip sender-udp-port reflector-ip \
                 reflector-udp-port]
           +--ro sid?                                string
           +--ro sender-ip                           inet:ip-address
           +--ro sender-udp-port
           |       dynamic-port-number
           +--ro reflector-ip                        inet:ip-address
           +--ro reflector-udp-port                  inet:port-number
           +--ro parent-connection-client-ip?        inet:ip-address
           +--ro parent-connection-client-tcp-port?  inet:port-number
           +--ro parent-connection-server-ip?        inet:ip-address
           +--ro parent-connection-server-tcp-port?  inet:port-number
           +--ro test-packet-dscp?                   inet:dscp
           +--ro sent-packets?                       uint32
           +--ro rcv-packets?                        uint32
           +--ro last-sent-seq?                      uint32
           +--ro last-rcv-seq?                       uint32</sourcecode>
        </figure>
      </section>
      <section anchor="yangmodule" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-yang-module">YANG Module</name>
        <t indent="0" pn="section-5.2-1">This section presents the YANG module for the TWAMP data model
        defined in this document. The module imports definitions from <xref target="RFC6991" format="default" sectionFormat="of" derivedContent="RFC6991">"Common YANG Data Types"</xref> and
        references <xref target="RFC2330" format="default" sectionFormat="of" derivedContent="RFC2330">"Framework for IP Performance
        Metrics"</xref>,
        <xref target="RFC3432" format="default" sectionFormat="of" derivedContent="RFC3432">"Network performance measurement with periodic
        streams"</xref>, <xref target="RFC4656" format="default" sectionFormat="of" derivedContent="RFC4656">"A One-way Active Measurement Protocol
        (OWAMP)"</xref>, <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357">"A Two-Way
        Active Measurement Protocol (TWAMP)"</xref>,
        <xref target="RFC5618" format="default" sectionFormat="of" derivedContent="RFC5618">"Mixed Security Mode for the
        Two-Way Active Measurement Protocol (TWAMP)"</xref>,
        <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905">"Network Time
        Protocol Version 4: Protocol and Algorithms Specification"</xref>,
        <xref target="RFC5938" format="default" sectionFormat="of" derivedContent="RFC5938">"Individual Session Control Feature
 for the Two-Way Active Measurement Protocol (TWAMP)"</xref>, <xref target="RFC6038" format="default" sectionFormat="of" derivedContent="RFC6038">"Two-Way Active Measurement Protocol (TWAMP) Reflect
        Octets and Symmetrical Size Features"</xref>, <xref target="RFC7312" format="default" sectionFormat="of" derivedContent="RFC7312">"Advanced
        Stream and Sampling Framework for IP Performance Metrics
        (IPPM)"</xref>, <xref target="RFC7717" format="default" sectionFormat="of" derivedContent="RFC7717">"IKEv2-Derived
        Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP)"</xref>, <xref target="RFC8545" format="default" sectionFormat="of" derivedContent="RFC8545">"Well-Known Port Assignments for the One-Way Active
        Measurement Protocol (OWAMP) and the Two-Way Active Measurement
        Protocol (TWAMP)"</xref>, and <xref target="RFC8911" format="default" sectionFormat="of" derivedContent="RFC8911">"Registry for
        Performance Metrics"</xref>.</t>
        <sourcecode name="ietf-twamp@2021-11-17.yang" type="yang" markers="true" pn="section-5.2-2">

module ietf-twamp {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-twamp";
  prefix ietf-twamp;

  import ietf-inet-types {
    prefix inet;
    reference
      "RFC 6991: Common YANG Data Types";
  }

  organization
    "IETF IPPM (IP Performance Metrics) Working Group";
  contact
    "WG Web: &lt;https://datatracker.ietf.org/wg/ippm/documents/&gt;
     WG List: &lt;mailto:ippm@ietf.org&gt;

     Editor: Ruth Civil
             &lt;mailto:ruthcivil@gmail.com&gt;

     Editor: Al Morton
             &lt;mailto:acmorton@att.com&gt;

     Editor: Reshad Rahman
             &lt;mailto:reshad@yahoo.com&gt;

     Editor: Mahesh Jethanandani
             &lt;mailto:mjethanandani@gmail.com&gt;

     Editor: Kostas Pentikousis
             &lt;mailto:kostas.pentikousis@detecon.com&gt;";
  description
    "This YANG module specifies a vendor-independent data
     model for the Two-Way Active Measurement Protocol (TWAMP).

     The data model defines four TWAMP logical entities, namely
     Control-Client, Server, Session-Sender, and Session-Reflector,
     as illustrated in the annotated TWAMP logical model (Figure 1
     of RFC 8913).

     This YANG module uses features to indicate which of the four
     logical entities are supported by a TWAMP implementation.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2021 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 8913; see the
     RFC itself for full legal notices.";

  revision 2021-11-17 {
    description
      "Initial revision.

       References RFC 5357, RFC 5618, RFC 5938, RFC 6038, RFC 7717,
       and RFC 8911.";
    reference
      "RFC 8913: Two-Way Active Measurement Protocol (TWAMP) YANG
       Data Model";
  }

  /*
   * Typedefs
   */

  typedef twamp-modes {
    type bits {
      bit unauthenticated {
        position 0;
        description
          "Unauthenticated mode, in which no encryption or
           authentication is applied in TWAMP-Control and
           TWAMP-Test.  KeyID, Token, and Client-IV are not used in
           the Set-Up-Response message.  See Section 3.1 of
           RFC 4656.";
        reference
          "RFC 4656: A One-way Active Measurement Protocol (OWAMP),
                     Section 3.1";
      }
      bit authenticated {
        position 1;
        description
          "Authenticated mode, in which the Control-Client and
           Server possess a shared secret, thus prohibiting
           'theft of service'.  As per Section 6 of RFC 4656,
           in 'authenticated mode, the timestamp is in the clear
           and is not protected cryptographically in any way,
           while the rest of the message has the same protection
           as in encrypted mode.  This mode allows one to trade off
           cryptographic protection against accuracy of
           timestamps.'";
        reference
          "RFC 4656: A One-way Active Measurement Protocol (OWAMP),
                     Section 6";
      }
      bit encrypted {
        position 2;
        description
          "Encrypted mode 'makes it impossible to alter
           timestamps undetectably' (Section 1 of RFC 4656).
           See also Section 4 of RFC 7717.";
        reference
          "RFC 4656: A One-way Active Measurement Protocol (OWAMP),
                     Section 6
           RFC 7717: IKEv2-Derived Shared Secret Key for the One-Way
           Active Measurement Protocol (OWAMP) and Two-Way Active
           Measurement Protocol (TWAMP), Section 4";
      }
      bit unauth-test-encrypt-control {
        position 3;
        description
          "When using the mixed security mode, the TWAMP-Test
           protocol operates in unauthenticated mode and the
           TWAMP-Control protocol operates in encrypted mode.";
        reference
          "RFC 5618: Mixed Security Mode for the Two-Way Active
           Measurement Protocol (TWAMP)";
      }
      bit individual-session-control {
        position 4;
        description
          "This mode enables individual test sessions using
           Session Identifiers.";
        reference
          "RFC 5938: Individual Session Control Feature
           for the Two-Way Active Measurement Protocol (TWAMP)";
      }
      bit reflect-octets {
        position 5;
        description
          "This mode indicates the reflect octets capability.";
        reference
          "RFC 6038: Two-Way Active Measurement Protocol (TWAMP)
           Reflect Octets and Symmetrical Size Features";
      }
      bit symmetrical-size {
        position 6;
        description
          "This mode indicates support for the symmetrical size
           sender test packet format.";
        reference
          "RFC 6038: Two-Way Active Measurement Protocol (TWAMP)
           Reflect Octets and Symmetrical Size Features";
      }
      bit IKEv2Derived {
        position 7;
        description
          "In this mode, the shared key is derived
           from an Internet Key Exchange Protocol Version 2 (IKEv2)
           security association (SA).";
        reference
          "RFC 7717: IKEv2-Derived Shared Secret Key for
           the One-Way Active Measurement Protocol (OWAMP)
           and Two-Way Active Measurement Protocol (TWAMP)";
      }
    }
    description
      "Specifies the configurable TWAMP-Modes supported during a
       TWAMP-Control connection setup between a Control-Client
       and a Server.  Section 7 of RFC 7717 summarizes the
       'TWAMP-Modes' Registry and points to their
       formal specification.";
  }

  typedef control-client-connection-state {
    type enumeration {
      enum active {
        description
          "Indicates an active TWAMP-Control connection to the
           Server.";
      }
      enum idle {
        description
          "Indicates an idle TWAMP-Control connection to the
           Server.";
      }
    }
    description
      "Indicates the Control-Client TWAMP-Control connection
       state.";
  }

  typedef test-session-state {
    type enumeration {
      enum accepted {
        value 0;
        description
          "Indicates an accepted TWAMP-Test session request.";
      }
      enum failed {
        value 1;
        description
          "Indicates a TWAMP-Test session failure due to
           some unspecified reason (catch-all).";
      }
      enum internal-error {
        value 2;
        description
          "Indicates a TWAMP-Test session failure due to
           an internal error.";
      }
      enum not-supported {
        value 3;
        description
          "Indicates a TWAMP-Test session failure because
           some aspect of the TWAMP-Test session request
           is not supported.";
      }
      enum permanent-resource-limit {
        value 4;
        description
          "Indicates a TWAMP-Test session failure due to
           permanent resource limitations.";
      }
      enum temp-resource-limit {
        value 5;
        description
          "Indicates a TWAMP-Test session failure due to
           temporary resource limitations.";
      }
    }
    description
      "Indicates the Control-Client TWAMP-Test session state.";
  }

  typedef server-ctrl-connection-state {
    type enumeration {
      enum active {
        description
          "Indicates an active TWAMP-Control connection
           to the Control-Client.";
      }
      enum servwait {
        description
          "Indicates that the TWAMP-Control connection to the
           Control-Client is in SERVWAIT as per the definition in
           Section 3.1 of RFC 5357.";
        reference
          "RFC 5357: A Two-Way Active Measurement Protocol (TWAMP),
                     Section 3.1";
      }
    }
    description
      "Indicates the Server TWAMP-Control connection state.";
  }

  typedef sender-session-state {
    type enumeration {
      enum active {
        description
          "Indicates that the TWAMP-Test session is active.";
      }
      enum failure {
        description
          "Indicates that the TWAMP-Test session has failed.";
      }
    }
    description
      "Indicates the Session-Sender TWAMP-Test session state.";
  }

  typedef padding-fill-mode {
    type enumeration {
      enum zero {
        description
          "TWAMP-Test packets are padded with all zeros.";
      }
      enum random {
        description
          "TWAMP-Test packets are padded with pseudorandom
           numbers.";
      }
    }
    description
      "Indicates what type of packet padding is used in the
       TWAMP-Test packets.";
  }

  typedef dynamic-port-number {
    type inet:port-number {
      range "49152..65535";
    }
    description
      "Dynamic range for port numbers.";
  }

  /*
   * Features
   */

  feature control-client {
    description
      "Indicates that the device supports configuration of the
       TWAMP Control-Client logical entity.";
  }

  feature server {
    description
      "Indicates that the device supports configuration of the
       TWAMP Server logical entity.";
  }

  feature session-sender {
    description
      "Indicates that the device supports configuration of the
       TWAMP Session-Sender logical entity.";
  }

  feature session-reflector {
    description
      "Indicates that the device supports configuration of the
       TWAMP Session-Reflector logical entity.";
  }

  /*
   * Reusable node groups
   */

  grouping key-management {
    list key-chain {
      key "key-id";
      leaf key-id {
        type string {
          length "1..80";
        }
        description
          "KeyID used for a TWAMP-Control connection.  As per
           Section 3.1 of RFC 4656, KeyID is 'a UTF-8 string, up to
           80 octets in length' and is used to select which 'shared
           secret the client' (Control-Client) 'wishes to use to
           authenticate or encrypt'.";
      }
      leaf secret-key {
        type binary;
        description
          "The secret key corresponding to the KeyID for this
           TWAMP-Control connection.";
      }
      description
        "Relates KeyIDs with their respective secret keys
         in a TWAMP-Control connection.";
    }
    description
      "Used by the Control-Client and Server for TWAMP-Control
       key management.";
  }

  grouping maintenance-statistics {
    leaf sent-packets {
      type uint32;
      config false;
      description
        "Indicates the number of packets sent.";
    }
    leaf rcv-packets {
      type uint32;
      config false;
      description
        "Indicates the number of packets received.";
    }
    leaf last-sent-seq {
      type uint32;
      config false;
      description
        "Indicates the last sent sequence number.";
    }
    leaf last-rcv-seq {
      type uint32;
      config false;
      description
        "Indicates the last received sequence number.";
    }
    description
      "Used for TWAMP-Test maintenance statistics.";
  }

  grouping count {
    leaf count {
      type uint8 {
        range "10..31";
      }
      default "15";
      description
        "Parameter communicated to the Control-Client as part of
         the Server Greeting message and used for deriving a key
         from a shared secret as per Section 3.1 of RFC 4656:
         MUST be a power of 2 and at least 1024.  It is configured
         by providing said power.  For example, configuring 20 here
         means count 2^20 = 1048576.  The default is 15,
         meaning 2^15 = 32768.";
    }
    description
      "Reusable data structure for count, which is used in both the
       Server and the Control-Client.";
  }

  grouping max-count-exponent {
    leaf max-count-exponent {
      type uint8 {
        range "10..31";
      }
      default "20";
      description
        "This parameter limits the maximum Count value, which MUST
         be a power of 2 and at least 1024 as per RFC 5357.  It is
         configured by providing said power.  For example,
         configuring 10 here means max count 2^10 = 1024.
         The default is 20, meaning 2^20 = 1048576.

         A TWAMP Server uses this configured value in the
         Server Greeting message sent to the Control-Client.

         A TWAMP Control-Client uses this configured value to
         prevent denial-of-service (DoS) attacks by closing the
         control connection to the Server if it 'receives a
         Server-Greeting message with Count greater that [sic] its
         maximum configured value', as per Section 6 of RFC 5357.

         Further, note that according to Section 6 of RFC 5357:

         'If an attacking system set the maximum value in Count
         (2**32), then the system under attack would stall for a
         significant period of time while it attempts to generate
         keys.  Therefore, TWAMP-compliant systems SHOULD have a
         configuration control to limit the maximum Count value.
         The default maximum Count value SHOULD be 32768.'

         In the case of this document, the default max-count-exponent
         value SHOULD be 15, which corresponds to a maximum value of
         2**15 or 32768.

         RFC 5357 does not qualify 'significant period' in terms of
         time, but it is clear that this depends on the processing
         capacity available, and operators need to pay attention to
         this security consideration.";
    }
    description
      "Reusable data structure for max-count that is used in both
       the client (Control-Client) container and the server
       container.";
  }

  /*
   * Configuration data nodes
   */

  container twamp {
    description
      "TWAMP logical entity configuration grouping of four models
       that correspond to the four TWAMP logical entities
       Control-Client, Server, Session-Sender, and Session-Reflector
       as illustrated in Figure 1 of RFC 8913.";
    container client {
      if-feature "control-client";
      description
        "Configuration of the TWAMP Control-Client logical entity.";
      leaf admin-state {
        type boolean;
        default "true";
        description
          "Indicates whether the device is allowed to operate as a
           TWAMP Control-Client.";
      }
      list mode-preference-chain {
        key "priority";
        unique "mode";
        leaf priority {
          type uint16;
          description
            "Indicates the Control-Client mode preference priority,
             expressed as a 16-bit unsigned integer.  Values for the
             priority start with zero, the highest priority, and
             decreasing priority value is indicated by every increase
             in value by one.";
        }
        leaf mode {
          type twamp-modes;
          description
            "The supported TWAMP-Modes matching the corresponding
             priority.";
        }
        description
          "Indicates the Control-Client preferred order of use of
           the supported TWAMP-Modes.

           Depending on the modes available in the TWAMP Server
           Greeting message (see Figure 2 of RFC 7717), the
           Control-Client MUST choose the highest-priority
           mode from the configured mode-preference-chain list.";
      }
      uses key-management;
      list ctrl-connection {
        key "name";
        description
          "List of TWAMP Control-Client control connections.
           Each item in the list describes a control connection
           that will be initiated by this Control-Client.";
        leaf name {
          type string;
          description
            "A unique name used as a key to identify this
             individual TWAMP-Control connection on the
             Control-Client device.";
        }
        leaf client-ip {
          type inet:ip-address;
          description
            "The IP address of the local Control-Client device,
             to be placed in the source IP address field of the
             IP header in TWAMP-Control (TCP) packets belonging
             to this control connection.  If not configured, the
             device SHALL choose its own source IP address.";
        }
        leaf server-ip {
          type inet:ip-address;
          mandatory true;
          description
            "The IP address of the remote Server device to which
             the TWAMP-Control connection will be initiated.";
        }
        leaf server-tcp-port {
          type inet:port-number;
          default "862";
          description
            "This parameter defines the TCP port number that is
             to be used by this outgoing TWAMP-Control connection.
             Typically, this is the well-known TWAMP-Control
             port number (862) as per RFC 5357.  However, there are
             known realizations of TWAMP in the field that were
             implemented before this well-known port number was
             allocated.  These early implementations allowed the
             port number to be configured.  This parameter is
             therefore provided for backward-compatibility
             reasons.";
        }
        leaf control-packet-dscp {
          type inet:dscp;
          default "0";
          description
            "The Differentiated Services Code Point (DSCP) value
             to be placed in the IP header of TWAMP-Control (TCP)
             packets generated by this Control-Client.";
        }
        leaf key-id {
          type string {
            length "1..80";
          }
          description
            "Indicates the KeyID value selected for this
             TWAMP-Control connection.";
        }
        uses max-count-exponent;
        leaf client-tcp-port {
          type inet:port-number;
          config false;
          description
            "Indicates the source TCP port number used in the
             TWAMP-Control packets belonging to this control
             connection.";
        }
        leaf server-start-time {
          type uint64;
          config false;
          description
            "Indicates the Start-Time advertised by the Server in
             the Server-Start message (RFC 4656, Section 3.1),
             representing the time when the current
             instantiation of the Server started operating.
             The timestamp format follows RFC 5905, according to
             Section 4.1.2 of RFC 4656.";
          reference
            "RFC 4656: A One-way Active Measurement Protocol (OWAMP),
             Sections 3.1 and 4.1.2
             RFC 5905: Network Time Protocol Version 4: Protocol and
             Algorithms Specification";
        }
        leaf repeat-count {
          type uint64;
          config false;
          description
            "Indicates how many times the test session has been
             repeated.  When a test is running, this value will be
             greater than 0.  If the repeat parameter is non-zero,
             this value is smaller than or equal to the repeat
             parameter.";
        }
        leaf state {
          type control-client-connection-state;
          config false;
          description
            "Indicates the current TWAMP-Control connection state.";
        }
        leaf selected-mode {
          type twamp-modes;
          config false;
          description
            "The TWAMP-Modes that the Control-Client has chosen for
             this control connection as set in the Mode field of
             the Set-Up-Response message.";
          reference
            "RFC 4656: A One-way Active Measurement Protocol (OWAMP),
                       Section 3.1";
        }
        leaf token {
          type binary {
            length "64";
          }
          config false;
          description
            "This parameter holds the 64 octets containing the
             concatenation of a 16-octet Challenge, a 16-octet AES
             Session-key used for encryption, and a 32-octet
             HMAC-SHA1 Session-key used for authentication; see
             also the last paragraph of Section 6.10 of RFC 4656.

             If the mode defined in RFC 7717 is selected
             (selected-mode), Token is limited to 16 octets.";
          reference
            "RFC 4656: A One-way Active Measurement Protocol (OWAMP),
                       Section 6.10
             RFC 7717: IKEv2-Derived Shared Secret Key for the
             One-Way Active Measurement Protocol (OWAMP) and
             Two-Way Active Measurement Protocol (TWAMP)";
        }
        leaf client-iv {
          type binary {
            length "16";
          }
          config false;
          description
            "Indicates the Control-Client Initialization Vector
             (Client-IV), which is generated randomly by the
             Control-Client.  As per RFC 4656:

             'Client-IV merely needs to be unique (i.e., it MUST
             never be repeated for different sessions using the
             same secret key; a simple way to achieve that without
             the use of cumbersome state is to generate the
             Client-IV values using a cryptographically secure
             pseudo-random number source.'

             If the mode defined in RFC 7717 is selected
             (selected-mode), Client-IV is limited to 12 octets.";
          reference
            "RFC 4656: A One-way Active Measurement Protocol (OWAMP)
             RFC 7717: IKEv2-Derived Shared Secret Key for the
             One-Way Active Measurement Protocol (OWAMP) and
             Two-Way Active Measurement Protocol (TWAMP)";
        }
        list test-session-request {
          key "name";
          description
            "Information associated with the Control-Client
             for this test session.";
          leaf name {
            type string;
            description
              "A unique name to be used for identification of
               this TWAMP-Test session on the Control-Client.";
          }
          leaf sender-ip {
            type inet:ip-address;
            description
              "The IP address of the Session-Sender device,
               which is to be placed in the source IP address
               field of the IP header in TWAMP-Test (UDP) packets
               belonging to this test session.  This value will be
               used to populate the Sender Address field of the
               Request-TW-Session message.

               If not configured, the device SHALL choose its own
               source IP address.";
          }
          leaf sender-udp-port {
            type union {
              type dynamic-port-number;
              type enumeration {
                enum autoallocate {
                  description
                    "Indicates that the Control-Client will
                     auto-allocate the TWAMP-Test (UDP) port number
                     from the dynamic port range.";
                }
              }
            }
            default "autoallocate";
            description
              "The UDP port number that is to be used by
               the Session-Sender for this TWAMP-Test session.
               The number is restricted to the dynamic port range.

               By default, the Control-Client SHALL auto-allocate a
               UDP port number for this TWAMP-Test session.

               The configured (or auto-allocated) value is
               advertised in the Sender Port field of the
               Request-TW-Session message (see Section 3.5 of
               RFC 5357).  Note that in the scenario where a device
               auto-allocates a UDP port number for a session and
               the repeat parameter for that session indicates that
               it should be repeated, the device is free to
               auto-allocate a different UDP port number when it
               negotiates the next (repeated) iteration of this
               session.";
          }
          leaf reflector-ip {
            type inet:ip-address;
            mandatory true;
            description
              "The IP address belonging to the remote
               Session-Reflector device to which the TWAMP-Test
               session will be initiated.  This value will be
               used to populate the Receiver Address field of
               the Request-TW-Session message.";
          }
          leaf reflector-udp-port {
            type inet:port-number {
              range "862 | 49152..65535";
            }
            description
              "This parameter defines the UDP port number that
               will be used by the Session-Reflector for
               this TWAMP-Test session.  The default number is
               within the dynamic port range and is to be placed
               in the Receiver Port field of the Request-TW-Session
               message.  The well-known port (862) MAY be used.";
            reference
              "RFC 8545: Well-Known Port Assignments for the One-Way
               Active Measurement Protocol (OWAMP) and the Two-Way
               Active Measurement Protocol (TWAMP)";
          }
          leaf timeout {
            type uint64;
            units "seconds";
            default "2";
            description
              "The length of time (in seconds) that the
               Session-Reflector should continue to respond to
               packets belonging to this TWAMP-Test session after
               a Stop-Sessions TWAMP-Control message has been
               received.

               This value will be placed in the Timeout field of
               the Request-TW-Session message.";
            reference
              "RFC 5357: A Two-Way Active Measurement Protocol
               (TWAMP), Section 3.5";
          }
          leaf padding-length {
            type uint32 {
              range "64..4096";
            }
            description
              "The number of padding bytes to be added to the
               TWAMP-Test (UDP) packets generated by the
               Session-Sender.

               This value will be placed in the Padding Length
               field of the Request-TW-Session message.";
            reference
              "RFC 4656: A One-way Active Measurement Protocol
               (OWAMP), Section 3.5";
          }
          leaf test-packet-dscp {
            type inet:dscp;
            default "0";
            description
              "The DSCP value to be placed in the IP header
               of TWAMP-Test packets generated by the
               Session-Sender and in the UDP header of the
               TWAMP-Test response packets generated by the
               Session-Reflector for this test session.

               This value will be placed in the Type-P Descriptor
               field of the Request-TW-Session message.";
            reference
              "RFC 5357: A Two-Way Active Measurement Protocol
               (TWAMP)";
          }
          leaf start-time {
            type uint64;
            default "0";
            description
              "Time when the session is to be started
               (but not before the TWAMP Start-Sessions command
               is issued; see Section 3.4 of RFC 5357).

               The start-time value is placed in the Start Time
               field of the Request-TW-Session message.

               The timestamp format follows RFC 5905 as per
               Section 3.5 of RFC 4656.

               The default value of 0 indicates that the session
               will be started as soon as the Start-Sessions
               message is received.";
          }
          leaf repeat {
            type uint32 {
              range "0..4294967295";
            }
            default "0";
            description
              "This value determines if the TWAMP-Test session must
               be repeated.  When a test session has completed, the
               repeat parameter is checked.

               The default value of 0 indicates that the session
               MUST NOT be repeated.

               If the repeat value is 1 through 4,294,967,294,
               then the test session SHALL be repeated using the
               information in the repeat-interval parameter, and the
               parent TWAMP-Control connection for this test
               session is restarted to negotiate a new instance
               of this TWAMP-Test session.

               A value of 4,294,967,295 indicates that the test
               session SHALL be repeated *forever* using the
               information in the repeat-interval parameter and
               SHALL NOT decrement the value.";
          }
          leaf repeat-interval {
            when "../repeat!='0'" {
              description
                "This parameter determines the timing of repeated
                 TWAMP-Test sessions when repeat is more than 0.

                 When the value of repeat-interval is 0, the
                 negotiation of a new test session SHALL begin
                 immediately after the previous test session
                 completes.  Otherwise, the Control-Client will
                 wait for the number of seconds specified in the
                 repeat-interval parameter before negotiating the
                 new instance of this TWAMP-Test session.";
            }
            type uint32;
            units "seconds";
            default "0";
            description
              "Repeat interval (in seconds).";
          }
          list pm-reg-list {
            key "pm-index";
            leaf pm-index {
              type uint16;
              description
                "Numerical index value of a Registered Metric in
                 the Performance Metrics Registry (see RFC 8911).
                 Output statistics are specified in the
                 corresponding Registry Entry.";
            }
            description
              "A list of one or more Performance Metrics Registry
               Index values, which communicate packet stream
               characteristics along with one or more metrics
               to be measured.

               All members of the pm-reg-list MUST have the same
               stream characteristics, such that they combine
               to specify all metrics that shall be measured on
               a single stream.";
            reference
              "RFC 8911: Registry for Performance Metrics";
          }
          leaf state {
            type test-session-state;
            config false;
            description
              "Indicates the TWAMP-Test session state -- an accepted
               request or an indication of an error.";
            reference
              "RFC 5357: A Two-Way Active Measurement Protocol
               (TWAMP), Section 3.5";
          }
          leaf sid {
            type string;
            config false;
            description
              "The Session Identifier (SID) allocated by the Server
               for this TWAMP-Test session and communicated back to
               the Control-Client in the SID field of the
               Accept-Session message.";
            reference
              "RFC 6038: Two-Way Active Measurement Protocol (TWAMP)
               Reflect Octets and Symmetrical Size
               Features, Section 4.3";
          }
        }
      }
    }
    container server {
      if-feature "server";
      description
        "Configuration of the TWAMP Server logical entity.";
      leaf admin-state {
        type boolean;
        default "true";
        description
          "Indicates whether the device is allowed to operate
           as a TWAMP Server.";
      }
      leaf server-tcp-port {
        type inet:port-number;
        default "862";
        description
          "This parameter defines the well-known TCP port number
           that is used by TWAMP-Control.  The Server will listen
           on this port number for incoming TWAMP-Control
           connections.  Although this is defined as a fixed value
           (862) in RFC 5357, there are several realizations of
           TWAMP in the field that were implemented before this
           well-known port number was allocated.  These early
           implementations allowed the port number to be
           configured.  This parameter is therefore provided for
           backward-compatibility reasons.";
      }
      leaf servwait {
        type uint32 {
          range "1..604800";
        }
        units "seconds";
        default "900";
        description
          "TWAMP-Control (TCP) session timeout, in seconds.
           According to Section 3.1 of RFC 5357:

           'The Server MAY discontinue any established control
           connection when no packet associated with that
           connection has been received within SERVWAIT seconds.'";
      }
      leaf control-packet-dscp {
        type inet:dscp;
        description
          "The DSCP value to be placed in the IP header of
           TWAMP-Control (TCP) packets generated by the Server.

           Section 3.1 of RFC 5357 specifies that the Server
           SHOULD use the DSCP value from the Control-Client's
           TCP SYN.  However, for practical purposes, TWAMP will
           typically be implemented using a general-purpose TCP
           stack provided by the underlying operating system,
           and such a stack may not provide this information to the
           user.  Consequently, it is not always possible to
           implement the behavior described in RFC 5357 in an
           OS-portable version of TWAMP.

           The default behavior if this item is not set is to use
           the DSCP value from the Control-Client's TCP SYN.";
        reference
          "RFC 5357: A Two-Way Active Measurement Protocol (TWAMP),
           Section 3.1";
      }
      uses count;
      uses max-count-exponent;
      leaf modes {
        type twamp-modes;
        description
          "The bit mask of TWAMP-Modes this Server instance is
           willing to support; see the IANA 'TWAMP-Modes' Registry.";
      }
      uses key-management;
      list ctrl-connection {
        key "client-ip client-tcp-port server-ip server-tcp-port";
        config false;
        description
          "List of all incoming TWAMP-Control (TCP) connections.";
        leaf client-ip {
          type inet:ip-address;
          description
            "The IP address on the remote Control-Client device,
             which is the source IP address used in the
             TWAMP-Control (TCP) packets belonging to this control
             connection.";
        }
        leaf client-tcp-port {
          type inet:port-number;
          description
            "The source TCP port number used in the TWAMP-Control
             (TCP) packets belonging to this control connection.";
        }
        leaf server-ip {
          type inet:ip-address;
          description
            "The IP address of the local Server device, which is
             the destination IP address used in the
             TWAMP-Control (TCP) packets belonging to this control
             connection.";
        }
        leaf server-tcp-port {
          type inet:port-number;
          description
            "The destination TCP port number used in the
             TWAMP-Control (TCP) packets belonging to this
             control connection.  This will usually be the
             same value as the server-tcp-port configured
             under twamp/server.  However, in the event that
             the user reconfigured server/server-tcp-port
             after this control connection was initiated, this
             value will indicate the server-tcp-port that is
             actually in use for this control connection.";
        }
        leaf state {
          type server-ctrl-connection-state;
          description
            "Indicates the Server TWAMP-Control connection state.";
        }
        leaf control-packet-dscp {
          type inet:dscp;
          description
            "The DSCP value used in the IP header of the
             TWAMP-Control (TCP) packets sent by the Server
             for this control connection.  This will usually
             be the same value as is configured in the
             control-packet-dscp parameter under the twamp/server
             container.  However, in the event that the user
             reconfigures server/dscp after this control
             connection is already in progress, this read-only
             value will show the actual DSCP value in use by this
             TWAMP-Control connection.";
        }
        leaf selected-mode {
          type twamp-modes;
          description
            "The mode that was chosen for this TWAMP-Control
             connection as set in the Mode field of the
             Set-Up-Response message.";
        }
        leaf key-id {
          type string {
            length "1..80";
          }
          description
            "The KeyID value that is in use by this TWAMP-Control
             connection as selected by the Control-Client.";
        }
        uses count {
          description
            "The Count value that is in use by this TWAMP-Control
             connection.  This will usually be the same value
             as is configured under twamp/server.  However, in the
             event that the user reconfigures server/count
             after this control connection is already in progress,
             this read-only value will show the actual count that
             is in use for this TWAMP-Control connection.";
        }
        uses max-count-exponent {
          description
            "This read-only value indicates the actual max-count in
             use for this control connection.  Usually, this would be
             the same value as is configured under twamp/server.";
        }
        leaf salt {
          type binary {
            length "16";
          }
          description
            "A parameter used in deriving a key from a
             shared secret, as described in Section 3.1 of RFC 4656.
             It is communicated to the Control-Client as part of
             the Server Greeting message.";
        }
        leaf server-iv {
          type binary {
            length "16";
          }
          description
            "The Server Initialization Vector (Server-IV)
             generated randomly by the Server.";
        }
        leaf challenge {
          type binary {
            length "16";
          }
          description
            "A random sequence of octets generated by the Server.
             As described in client/token, a Challenge is used
             by the Control-Client to prove possession of a
             shared secret.";
        }
      }
    }
    container session-sender {
      if-feature "session-sender";
      description
        "Configuration of the TWAMP Session-Sender logical entity.";
      leaf admin-state {
        type boolean;
        default "true";
        description
          "Indicates whether the device is allowed to operate
           as a TWAMP Session-Sender.";
      }
      list test-session {
        key "name";
        description
          "List of TWAMP Session-Sender test sessions.";
        leaf name {
          type string;
          description
            "A unique name for this TWAMP-Test session to be used
             for identifying this test session by the
             Session-Sender logical entity.";
        }
        leaf ctrl-connection-name {
          type string;
          config false;
          description
            "The name of the parent TWAMP-Control connection that
             is responsible for negotiating this TWAMP-Test
             session.";
        }
        leaf fill-mode {
          type padding-fill-mode;
          default "zero";
          description
            "Indicates whether the padding added to the
             TWAMP-Test (UDP) packets (1) will contain pseudorandom
             numbers or (2) should consist of all zeros, as per
             Section 4.2.1 of RFC 5357.";
        }
        leaf number-of-packets {
          type uint32;
          mandatory true;
          description
            "The overall number of TWAMP-Test (UDP) packets to be
             transmitted by the Session-Sender for this test
             session.";
        }
        choice packet-distribution {
          description
            "Indicates the distribution to be used for transmitting
             the TWAMP-Test (UDP) packets.";
          case periodic {
            leaf periodic-interval {
              type decimal64 {
                fraction-digits 5;
              }
              units "seconds";
              mandatory true;
              description
                "Indicates the time to wait (in seconds) between
                 the first bits of TWAMP-Test (UDP) packet
                 transmissions for this test session.";
              reference
                "RFC 3432: Network performance measurement with
                 periodic streams";
            }
          }
          case poisson {
            leaf lambda {
              type decimal64 {
                fraction-digits 5;
              }
              units "seconds";
              mandatory true;
              description
                "Indicates the average time interval (in seconds)
                 between packets in the Poisson distribution.
                 The packet is calculated using the reciprocal of
                 lambda and the TWAMP-Test packet size (which
                 depends on the selected mode and the packet
                 padding).";
              reference
                "RFC 2330: Framework for IP Performance Metrics";
            }
            leaf max-interval {
              type decimal64 {
                fraction-digits 5;
              }
              units "seconds";
              description
                "Indicates the maximum time (in seconds)
                 between packet transmissions.";
              reference
                "RFC 7312: Advanced Stream and Sampling Framework
                 for IP Performance Metrics (IPPM)";
            }
          }
        }
        leaf state {
          type sender-session-state;
          config false;
          description
            "Indicates the Session-Sender test session state.";
        }
        uses maintenance-statistics;
      }
    }
    container session-reflector {
      if-feature "session-reflector";
      description
        "Configuration of the TWAMP Session-Reflector logical
         entity.";
      leaf admin-state {
        type boolean;
        default "true";
        description
          "Indicates whether the device is allowed to operate
           as a TWAMP Session-Reflector.";
      }
      leaf refwait {
        type uint32 {
          range "1..604800";
        }
        units "seconds";
        default "900";
        description
          "The Session-Reflector MAY discontinue any session that
           has been started when no packet associated with that
           session has been received for REFWAIT seconds.  As per
           Section 3.1 of RFC 5357, this timeout allows a
           Session-Reflector to free up resources in case of
           failure.";
      }
      list test-session {
        key "sender-ip sender-udp-port
             reflector-ip reflector-udp-port";
        config false;
        description
          "TWAMP Session-Reflector test sessions.";
        leaf sid {
          type string;
          description
            "An auto-allocated identifier for this TWAMP-Test
             session that is unique within the context of this
             Server/Session-Reflector device only.  This value
             is communicated to the Control-Client that
             requested the test session in the SID field of the
             Accept-Session message.";
        }
        leaf sender-ip {
          type inet:ip-address;
          description
            "The IP address on the remote device, which is the
             source IP address used in the TWAMP-Test (UDP) packets
             belonging to this test session.";
        }
        leaf sender-udp-port {
          type dynamic-port-number;
          description
            "The source UDP port used in the TWAMP-Test packets
             belonging to this test session.";
        }
        leaf reflector-ip {
          type inet:ip-address;
          description
            "The IP address of the local Session-Reflector
             device, which is the destination IP address used
             in the TWAMP-Test (UDP) packets belonging to this test
             session.";
        }
        leaf reflector-udp-port {
          type inet:port-number {
            range "862 | 49152..65535";
          }
          description
            "The destination UDP port number used in the
             TWAMP-Test (UDP) test packets belonging to this
             test session.";
        }
        leaf parent-connection-client-ip {
          type inet:ip-address;
          description
            "The IP address on the Control-Client device, which
             is the source IP address used in the TWAMP-Control
             (TCP) packets belonging to the parent control
             connection that negotiated this test session.";
        }
        leaf parent-connection-client-tcp-port {
          type inet:port-number;
          description
            "The source TCP port number used in the TWAMP-Control
             (TCP) packets belonging to the parent control
             connection that negotiated this test session.";
        }
        leaf parent-connection-server-ip {
          type inet:ip-address;
          description
            "The IP address of the Server device, which is the
             destination IP address used in the TWAMP-Control
             (TCP) packets belonging to the parent control
             connection that negotiated this test session.";
        }
        leaf parent-connection-server-tcp-port {
          type inet:port-number;
          description
            "The destination TCP port number used in the
             TWAMP-Control (TCP) packets belonging to the parent
             control connection that negotiated this test
             session.";
        }
        leaf test-packet-dscp {
          type inet:dscp;
          description
            "The DSCP value present in the IP header of
             TWAMP-Test (UDP) packets belonging to this session.";
        }
        uses maintenance-statistics;
      }
    }
  }
}</sourcecode>
      </section>
    </section>
    <section anchor="examples" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-data-model-examples">Data Model Examples</name>
      <t indent="0" pn="section-6-1">This section presents simple but complete examples of configuring
      all four entities in <xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/>, based on the YANG
      module specified in <xref target="module" format="default" sectionFormat="of" derivedContent="Section 5"/>. The
      examples are illustrative
      in nature but aim to be self-contained, i.e., were they to be executed in
      a real TWAMP implementation, they would lead to correctly configured test
      sessions. For completeness, examples are provided for both IPv4 and
      IPv6.  The examples are shown using XML
      <xref target="W3C.REC-xml-20081126" format="default" sectionFormat="of" derivedContent="W3C.REC-xml-20081126"/>.</t>
      <t indent="0" pn="section-6-2">More elaborate examples, which also include authentication
      parameters, are provided in <xref target="AuthExample" format="default" sectionFormat="of" derivedContent="Appendix A"/>.</t>
      <section anchor="ExampleCC" numbered="true" toc="include" removeInRFC="false" pn="section-6.1">
        <name slugifiedName="name-control-client-3">Control-Client</name>
        <t indent="0" pn="section-6.1-1"><xref target="fig_ExampleCC" format="default" sectionFormat="of" derivedContent="Figure 8"/> shows a configuration example for a
        Control-Client with client/admin-state enabled. In a real
        implementation following <xref target="fig_scope2" format="default" sectionFormat="of" derivedContent="Figure 2"/>, this would permit
        the initiation of TWAMP-Control connections and TWAMP-Test
        sessions.</t>
        <figure anchor="fig_ExampleCC" align="left" suppress-title="false" pn="figure-8">
          <name slugifiedName="name-xml-instance-enabling-contr">XML Instance Enabling Control-Client Operation</name>
          <sourcecode type="xml" markers="false" pn="section-6.1-2.1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;client&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
    &lt;/client&gt;
  &lt;/twamp&gt;
&lt;/config&gt;</sourcecode>
        </figure>
        <t indent="0" pn="section-6.1-3">The following example shows a Control-Client with two instances of
        client/ctrl-connection -- one called "RouterA" and another called
        "RouterB". Each TWAMP-Control connection is to a different Server. The
        control connection named "RouterA" has two test session requests. The
        TWAMP-Control connection named "RouterB" has no TWAMP-Test session
        requests.</t>
        <sourcecode type="xml" markers="false" pn="section-6.1-4">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;client&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;ctrl-connection&gt;
        &lt;name&gt;RouterA&lt;/name&gt;
        &lt;client-ip&gt;203.0.113.1&lt;/client-ip&gt;
        &lt;server-ip&gt;203.0.113.2&lt;/server-ip&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test1&lt;/name&gt;
          &lt;sender-ip&gt;203.0.113.3&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;203.0.113.4&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;50001&lt;/reflector-udp-port&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test2&lt;/name&gt;
          &lt;sender-ip&gt;203.0.113.1&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;203.0.113.2&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;50001&lt;/reflector-udp-port&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
      &lt;/ctrl-connection&gt;
      &lt;ctrl-connection&gt;
        &lt;name&gt;RouterB&lt;/name&gt;
        &lt;client-ip&gt;203.0.113.1&lt;/client-ip&gt;
        &lt;server-ip&gt;203.0.113.3&lt;/server-ip&gt;
      &lt;/ctrl-connection&gt;
    &lt;/client&gt;
  &lt;/twamp&gt;
&lt;/config&gt;</sourcecode>
        <sourcecode type="xml" markers="false" pn="section-6.1-5">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;client&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;ctrl-connection&gt;
        &lt;name&gt;RouterA&lt;/name&gt;
        &lt;client-ip&gt;2001:db8:203:0:113::1&lt;/client-ip&gt;
        &lt;server-ip&gt;2001:db8:203:0:113::2&lt;/server-ip&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test1&lt;/name&gt;
          &lt;sender-ip&gt;2001:db8:203:1:113::3&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;2001:db8:203:1:113::4&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;55000&lt;/reflector-udp-port&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test2&lt;/name&gt;
          &lt;sender-ip&gt;2001:db8:203:0:113::1&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;2001:db8:203:0:113::2&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;55001&lt;/reflector-udp-port&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
      &lt;/ctrl-connection&gt;
      &lt;ctrl-connection&gt;
        &lt;name&gt;RouterB&lt;/name&gt;
        &lt;client-ip&gt;2001:db8:203:0:113::1&lt;/client-ip&gt;
        &lt;server-ip&gt;2001:db8:203:0:113::3&lt;/server-ip&gt;
      &lt;/ctrl-connection&gt;
    &lt;/client&gt;
  &lt;/twamp&gt;
&lt;/config&gt;</sourcecode>
      </section>
      <section anchor="ExampleS" numbered="true" toc="include" removeInRFC="false" pn="section-6.2">
        <name slugifiedName="name-server-3">Server</name>
        <t indent="0" pn="section-6.2-1"><xref target="fig_ExampleS" format="default" sectionFormat="of" derivedContent="Figure 9"/> shows a configuration example for a
        Server with server⁠/admin-state enabled, which permits a device
        following <xref target="fig_scope2" format="default" sectionFormat="of" derivedContent="Figure 2"/> to respond to TWAMP-Control
        connections and TWAMP-Test sessions.</t>
        <figure anchor="fig_ExampleS" align="left" suppress-title="false" pn="figure-9">
          <name slugifiedName="name-xml-instance-enabling-serve">XML Instance Enabling Server Operation</name>
          <sourcecode type="xml" markers="false" pn="section-6.2-2.1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;server&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
    &lt;/server&gt;
  &lt;/twamp&gt;
&lt;/config&gt;</sourcecode>
        </figure>
        <t indent="0" pn="section-6.2-3">The following example presents a Server with the TWAMP-Control
        connection corresponding to the control connection name
        (client⁠/ctrl‑connection/name) "RouterA" presented in <xref target="ExampleCC" format="default" sectionFormat="of" derivedContent="Section 6.1"/>.</t>
        <sourcecode type="xml" markers="false" pn="section-6.2-4">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;server&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;ctrl-connection&gt;
        &lt;client-ip&gt;203.0.113.1&lt;/client-ip&gt;
        &lt;client-tcp-port&gt;16341&lt;/client-tcp-port&gt;
        &lt;server-ip&gt;203.0.113.2&lt;/server-ip&gt;
        &lt;server-tcp-port&gt;862&lt;/server-tcp-port&gt;
        &lt;state&gt;active&lt;/state&gt;
      &lt;/ctrl-connection&gt;
    &lt;/server&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
        <sourcecode type="xml" markers="false" pn="section-6.2-5">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;server&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;ctrl-connection&gt;
        &lt;client-ip&gt;2001:db8:203:0:113::1&lt;/client-ip&gt;
        &lt;client-tcp-port&gt;16341&lt;/client-tcp-port&gt;
        &lt;server-ip&gt;2001:db8:203:0:113::2&lt;/server-ip&gt;
        &lt;server-tcp-port&gt;862&lt;/server-tcp-port&gt;
        &lt;state&gt;active&lt;/state&gt;
      &lt;/ctrl-connection&gt;
    &lt;/server&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
      <section anchor="ExampleSS" numbered="true" toc="include" removeInRFC="false" pn="section-6.3">
        <name slugifiedName="name-session-sender-3">Session-Sender</name>
        <t indent="0" pn="section-6.3-1"><xref target="fig_ExampleSS" format="default" sectionFormat="of" derivedContent="Figure 10"/> shows a configuration example for a
        Session-Sender with session-sender/admin-state enabled, which permits
        a device following <xref target="fig_scope2" format="default" sectionFormat="of" derivedContent="Figure 2"/> to initiate TWAMP-Test
        sessions.</t>
        <figure anchor="fig_ExampleSS" align="left" suppress-title="false" pn="figure-10">
          <name slugifiedName="name-xml-instance-enabling-sessi">XML Instance Enabling Session-Sender Operation</name>
          <sourcecode type="xml" markers="false" pn="section-6.3-2.1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-sender&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
    &lt;/session-sender&gt;
  &lt;/twamp&gt;
&lt;/config&gt;</sourcecode>
        </figure>
        <t indent="0" pn="section-6.3-3">The following configuration example shows a Session-Sender with the
        two TWAMP-Test sessions presented in <xref target="ExampleCC" format="default" sectionFormat="of" derivedContent="Section 6.1"/>.</t>
        <sourcecode type="xml" markers="false" pn="section-6.3-4">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-sender&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;test-session&gt;
        &lt;name&gt;Test1&lt;/name&gt;
        &lt;ctrl-connection-name&gt;RouterA&lt;/ctrl-connection-name&gt;
        &lt;number-of-packets&gt;900&lt;/number-of-packets&gt;
        &lt;periodic-interval&gt;1&lt;/periodic-interval&gt;
      &lt;/test-session&gt;
      &lt;test-session&gt;
        &lt;name&gt;Test2&lt;/name&gt;
        &lt;ctrl-connection-name&gt;RouterA&lt;/ctrl-connection-name&gt;
        &lt;number-of-packets&gt;900&lt;/number-of-packets&gt;
        &lt;lambda&gt;1&lt;/lambda&gt;
        &lt;max-interval&gt;2&lt;/max-interval&gt;
      &lt;/test-session&gt;
    &lt;/session-sender&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
      <section anchor="ExampleSR" numbered="true" toc="include" removeInRFC="false" pn="section-6.4">
        <name slugifiedName="name-session-reflector-3">Session-Reflector</name>
        <t indent="0" pn="section-6.4-1">This configuration example shows a Session-Reflector with
        session‑reflector/admin-state enabled, which permits a device
        following <xref target="fig_scope2" format="default" sectionFormat="of" derivedContent="Figure 2"/> to respond to TWAMP-Test
        sessions.</t>
        <figure anchor="fig_ExampleSR" align="left" suppress-title="false" pn="figure-11">
          <name slugifiedName="name-xml-instance-enabling-sessio">XML Instance Enabling Session-Reflector Operation</name>
          <sourcecode type="xml" markers="false" pn="section-6.4-2.1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-reflector&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
    &lt;/session-reflector&gt;
  &lt;/twamp&gt;
&lt;/config&gt;</sourcecode>
        </figure>
        <t indent="0" pn="section-6.4-3">The following example shows the two Session-Reflector TWAMP-Test
        sessions corresponding to the test sessions presented in <xref target="ExampleSS" format="default" sectionFormat="of" derivedContent="Section 6.3"/>.</t>
        <aside pn="section-6.4-4">
          <t indent="0" pn="section-6.4-4.1">Note: '\' line wrapping is for formatting only.</t>
        </aside>
        <sourcecode type="xml" markers="false" pn="section-6.4-5">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-reflector&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;203.0.113.3&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;203.0.113.4&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;50001&lt;/reflector-udp-port&gt;
        &lt;sid&gt;1232&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;203.0.113.1&lt;/parent-connection-\
client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;203.0.113.2&lt;/parent-connection-\
server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;sent-packets&gt;2&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;2&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;1&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;1&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;203.0.113.1&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;192.0.2.2&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;50001&lt;/reflector-udp-port&gt;
        &lt;sid&gt;178943&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;203.0.113.1&lt;/parent-connection-\
client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;203.0.113.2&lt;/parent-connection-\
server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;sent-packets&gt;21&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;21&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;20&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;20&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
    &lt;/session-reflector&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
        <aside pn="section-6.4-6">
          <t indent="0" pn="section-6.4-6.1">Note: '\' line wrapping is for formatting only.</t>
        </aside>
        <sourcecode type="xml" markers="false" pn="section-6.4-7">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-reflector&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;203.0.113.3&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;203.0.113.4&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;54001&lt;/reflector-udp-port&gt;
        &lt;sid&gt;1232&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;203.0.113.1&lt;/parent-connection-\
client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;203.0.113.2&lt;/parent-connection-\
server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;sent-packets&gt;2&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;2&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;1&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;1&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;203.0.113.1&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;192.0.2.2&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;55001&lt;/reflector-udp-port&gt;
        &lt;sid&gt;178943&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;203.0.113.1&lt;/parent-connection-\
client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;203.0.113.2&lt;/parent-connection-\
server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;sent-packets&gt;21&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;21&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;20&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;20&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
    &lt;/session-reflector&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
    </section>
    <section anchor="security" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">Virtually all existing measurement systems using <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357">TWAMP</xref> are administered by the same network
      operator. For example, attacks on the measurement infrastructure could be launched by
      third parties to commandeer the packet generation capability, corrupt
      the measurements, or perform other nefarious acts.</t>
      <t indent="0" pn="section-7-2">The YANG module specified in this document
      defines a schema for data that is designed to be accessed via network
      management protocols such as <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241">NETCONF</xref> or
      <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040">RESTCONF</xref>. The lowest
NETCONF layer is the secure transport layer, and
      the mandatory-to-implement secure transport is <xref target="RFC6242" format="default" sectionFormat="of" derivedContent="RFC6242">Secure Shell (SSH)</xref>. The lowest RESTCONF layer is
      HTTPS, and the mandatory-to-implement secure transport is <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446">TLS</xref>.</t>
      <t indent="0" pn="section-7-3">The <xref target="RFC8341" format="default" sectionFormat="of" derivedContent="RFC8341">Network Configuration
      Access Control Model (NACM)</xref> provides the means to restrict access for particular
      NETCONF or RESTCONF users to a preconfigured subset of all available
      NETCONF or RESTCONF protocol operations and content.</t>
      <t indent="0" pn="section-7-4">There are a number of data nodes defined in this YANG module that are
     writable/creatable/deletable (i.e., config true, which is the default).
     These data nodes may be considered sensitive or vulnerable in some network
     environments. Write operations (e.g., edit-config) to these data nodes
     without proper protection can have a negative effect on network 
     operations. These are the subtrees and data nodes and their
     sensitivity/vulnerability:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-7-5">
        <li pn="section-7-5.1">If written, the 'admin-state' node can cause unintended test sessions
     to be created.</li>
        <li pn="section-7-5.2">If the node 'number-of-packets', which dictates how many packets are
     sent in any particular test session, is written with a large value, it
     can cause a test session to run longer than expected.</li>
        <li pn="section-7-5.3">Nodes that are particularly vulnerable include several timeout values
     put in the protocol to protect against sessions that are not active but
     are consuming resources. These are the REFWAIT timeout parameter, which
     determines whether to discontinue the session if no packets are received;
     and the nodes 'count' and 'max-count-exponent', which can cause a long
     time to be spent on Password-Based Key Derivation Function 2 (PBKDF2)
     iterations.</li>
        <li pn="section-7-5.4">In addition, a 'dscp' node marked with different DSCP markings can
     cause the test traffic on the network to be skewed and the result
     manipulated.</li>
        <li pn="section-7-5.5">Finally, nodes within 'mode-preference-chain', which specifies the
     'mode' and 'priority' values and indicates the preferred order of use by
     an operator, can be manipulated to send unauthenticated or non-encrypted
     traffic, enabling an on-path attack.</li>
        <li pn="section-7-5.6">Limiting access to these nodes will limit the ability to launch an
     attack in network environments.</li>
      </ul>
      <t indent="0" pn="section-7-6">Some of the readable data nodes in this YANG module may be considered
    sensitive or vulnerable in some network environments. It is thus
    important to control read access (e.g., via get, get-config, or
    notification) to these data nodes. This is the subtree and data node
    and its sensitivity/vulnerability:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-7-7">
        <li pn="section-7-7.1">The 'token' node defined in the model, containing a concatenation of a
    Challenge, an AES Session-key used for encryption, and an HMAC-SHA1
    Session-key used for authentication, is sensitive from a privacy
    perspective and can be used to disrupt a test session. The ability to read
    the field should be limited to the administrator of the test network.</li>
      </ul>
      <t indent="0" pn="section-7-8">The TWAMP YANG data model does not define RPC operations, as detailed in
   <xref target="OperationalCommands" format="default" sectionFormat="of" derivedContent="Appendix B"/>, and defers the definition of NETCONF
   RPC operations to each implementation. These RPC operations, when defined,
   may be considered sensitive or vulnerable in some network environments.
   It is thus important to control access to these operations.</t>
    </section>
    <section anchor="iana" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-8-1">IANA has registered the following URI in the <xref target="RFC3688" format="default" sectionFormat="of" derivedContent="RFC3688">"IETF XML
      Registry"</xref>.</t>
      <dl newline="false" spacing="compact" indent="3" pn="section-8-2">
        <dt pn="section-8-2.1">URI:</dt>
        <dd pn="section-8-2.2">urn:ietf:params:xml:ns:yang:ietf-twamp</dd>
        <dt pn="section-8-2.3">Registrant Contact:</dt>
        <dd pn="section-8-2.4">The IESG.</dd>
        <dt pn="section-8-2.5">XML:</dt>
        <dd pn="section-8-2.6">N/A; the requested URI is an XML namespace.</dd>
      </dl>
      <t indent="0" pn="section-8-3">IANA has registered the following YANG module in the
      <xref target="RFC6020" format="default" sectionFormat="of" derivedContent="RFC6020">"YANG Module Names" registry</xref>.</t>
      <dl newline="false" spacing="compact" indent="3" pn="section-8-4">
        <dt pn="section-8-4.1">Name:</dt>
        <dd pn="section-8-4.2">ietf-twamp</dd>
        <dt pn="section-8-4.3">Namespace:</dt>
        <dd pn="section-8-4.4">urn:ietf:params:xml:ns:yang:ietf-twamp</dd>
        <dt pn="section-8-4.5">Prefix:</dt>
        <dd pn="section-8-4.6">twamp</dd>
        <dt pn="section-8-4.7">Reference:</dt>
        <dd pn="section-8-4.8">RFC 8913</dd>
      </dl>
    </section>
  </middle>
  <back>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3432" target="https://www.rfc-editor.org/info/rfc3432" quoteTitle="true" derivedAnchor="RFC3432">
          <front>
            <title>Network performance measurement with periodic streams</title>
            <author initials="V." surname="Raisanen" fullname="V. Raisanen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Grotefeld" fullname="G. Grotefeld">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2002" month="November"/>
            <abstract>
              <t indent="0">This memo describes a periodic sampling method and relevant metrics for assessing the performance of IP networks.  First, the memo motivates periodic sampling and addresses the question of its value as an alternative to the Poisson sampling described in RFC 2330.  The benefits include applicability to active and passive measurements, simulation of constant bit rate (CBR) traffic (typical of multimedia communication, or nearly CBR, as found with voice activity detection), and several instances in which analysis can be simplified.  The sampling method avoids predictability by mandating random start times and finite length tests.  Following descriptions of the sampling method and sample metric parameters, measurement methods and errors are discussed.  Finally, we give additional information on periodic measurements, including security considerations.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3432"/>
          <seriesInfo name="DOI" value="10.17487/RFC3432"/>
        </reference>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688" quoteTitle="true" derivedAnchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author initials="M." surname="Mealling" fullname="M. Mealling">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="January"/>
            <abstract>
              <t indent="0">This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC4086" target="https://www.rfc-editor.org/info/rfc4086" quoteTitle="true" derivedAnchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schiller" fullname="J. Schiller">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Crocker" fullname="S. Crocker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="June"/>
            <abstract>
              <t indent="0">Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t indent="0">Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC4656" target="https://www.rfc-editor.org/info/rfc4656" quoteTitle="true" derivedAnchor="RFC4656">
          <front>
            <title>A One-way Active Measurement Protocol (OWAMP)</title>
            <author initials="S." surname="Shalunov" fullname="S. Shalunov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Teitelbaum" fullname="B. Teitelbaum">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Karp" fullname="A. Karp">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Boote" fullname="J. Boote">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Zekauskas" fullname="M. Zekauskas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="September"/>
            <abstract>
              <t indent="0">The One-Way Active Measurement Protocol (OWAMP) measures unidirectional characteristics such as one-way delay and one-way loss.  High-precision measurement of these one-way IP performance metrics became possible with wider availability of good time sources (such as GPS and CDMA).  OWAMP enables the interoperability of these measurements.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4656"/>
          <seriesInfo name="DOI" value="10.17487/RFC4656"/>
        </reference>
        <reference anchor="RFC5357" target="https://www.rfc-editor.org/info/rfc5357" quoteTitle="true" derivedAnchor="RFC5357">
          <front>
            <title>A Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="K." surname="Hedayat" fullname="K. Hedayat">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Krzanowski" fullname="R. Krzanowski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Yum" fullname="K. Yum">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Babiarz" fullname="J. Babiarz">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="October"/>
            <abstract>
              <t indent="0">The One-way Active Measurement Protocol (OWAMP), specified in RFC 4656, provides a common protocol for measuring one-way metrics between network devices.  OWAMP can be used bi-directionally to measure one-way metrics in both directions between two network elements.  However, it does not accommodate round-trip or two-way measurements.  This memo specifies a Two-Way Active Measurement Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip measurement capabilities.  The TWAMP measurement architecture is usually comprised of two hosts with specific roles, and this allows for some protocol simplifications, making it an attractive alternative in some circumstances.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5357"/>
          <seriesInfo name="DOI" value="10.17487/RFC5357"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" quoteTitle="true" derivedAnchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author initials="D." surname="Mills" fullname="D. Mills">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Martin" fullname="J. Martin" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Burbank" fullname="J. Burbank">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Kasch" fullname="W. Kasch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t indent="0">The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020" quoteTitle="true" derivedAnchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="October"/>
            <abstract>
              <t indent="0">YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6038" target="https://www.rfc-editor.org/info/rfc6038" quoteTitle="true" derivedAnchor="RFC6038">
          <front>
            <title>Two-Way Active Measurement Protocol (TWAMP) Reflect Octets and Symmetrical Size Features</title>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Ciavattone" fullname="L. Ciavattone">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="October"/>
            <abstract>
              <t indent="0">This memo describes two closely related features for the core specification of the Two-Way Active Measurement Protocol (TWAMP): an optional capability where the responding host returns some of the command octets or padding octets to the sender, and an optional sender packet format that ensures equal test packet sizes are used in both directions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6038"/>
          <seriesInfo name="DOI" value="10.17487/RFC6038"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" quoteTitle="true" derivedAnchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author initials="R." surname="Enns" fullname="R. Enns" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schoenwaelder" fullname="J. Schoenwaelder" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Bierman" fullname="A. Bierman" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6242" target="https://www.rfc-editor.org/info/rfc6242" quoteTitle="true" derivedAnchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author initials="M." surname="Wasserman" fullname="M. Wasserman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC6991" target="https://www.rfc-editor.org/info/rfc6991" quoteTitle="true" derivedAnchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author initials="J." surname="Schoenwaelder" fullname="J. Schoenwaelder" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="July"/>
            <abstract>
              <t indent="0">This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC7717" target="https://www.rfc-editor.org/info/rfc7717" quoteTitle="true" derivedAnchor="RFC7717">
          <front>
            <title>IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="K." surname="Pentikousis" fullname="K. Pentikousis" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Zhang" fullname="E. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Cui" fullname="Y. Cui">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="December"/>
            <abstract>
              <t indent="0">The One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP) security mechanisms require that both the client and server endpoints possess a shared secret.  This document describes the use of keys derived from an IKEv2 security association (SA) as the shared key in OWAMP or TWAMP.  If the shared key can be derived from the IKEv2 SA, OWAMP or TWAMP can support certificate-based key exchange; this would allow for more operational flexibility and efficiency.  The key derivation presented in this document can also facilitate automatic key management.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7717"/>
          <seriesInfo name="DOI" value="10.17487/RFC7717"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" quoteTitle="true" derivedAnchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="August"/>
            <abstract>
              <t indent="0">YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" quoteTitle="true" derivedAnchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author initials="A." surname="Bierman" fullname="A. Bierman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t indent="0">This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8341" target="https://www.rfc-editor.org/info/rfc8341" quoteTitle="true" derivedAnchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author initials="A." surname="Bierman" fullname="A. Bierman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="March"/>
            <abstract>
              <t indent="0">The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t>
              <t indent="0">This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8545" target="https://www.rfc-editor.org/info/rfc8545" quoteTitle="true" derivedAnchor="RFC8545">
          <front>
            <title>Well-Known Port Assignments for the One-Way Active Measurement Protocol (OWAMP) and the Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="A." surname="Morton" fullname="A. Morton" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Mirsky" fullname="G. Mirsky" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t indent="0">This memo explains the motivation and describes the reassignment of well-known ports for the One-Way Active Measurement Protocol (OWAMP) and the Two-Way Active Measurement Protocol (TWAMP) for control and measurement.  It also clarifies the meaning and composition of these Standards Track protocol names for the industry.</t>
              <t indent="0">This memo updates RFCs 4656 and 5357, in terms of the UDP well-known port assignments, and it clarifies the complete OWAMP and TWAMP protocol composition for the industry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8545"/>
          <seriesInfo name="DOI" value="10.17487/RFC8545"/>
        </reference>
        <reference anchor="RFC8911" target="https://www.rfc-editor.org/info/rfc8911" quoteTitle="true" derivedAnchor="RFC8911">
          <front>
            <title>Registry for Performance Metrics</title>
            <author fullname="Marcelo Bagnulo" initials="M." surname="Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Benoit Claise" initials="B." surname="Claise">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Phil Eardley" initials="P." surname="Eardley">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Al Morton" initials="A." surname="Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Aamer Akhter" initials="A." surname="Akhter">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" year="2021"/>
          </front>
          <seriesInfo name="RFC" value="8911"/>
          <seriesInfo name="DOI" value="10.17487/RFC8911"/>
        </reference>
        <reference anchor="UML" quoteTitle="true" derivedAnchor="UML">
          <front>
            <title>Information technology - Open Distributed Processing - Unified Modeling Language (UML) Version 1.4.2</title>
            <author>
              <organization showOnFrontPage="true">ISO/IEC</organization>
            </author>
            <date month="April" year="2005"/>
          </front>
          <seriesInfo name="ISO/IEC" value="19501:2005"/>
          <seriesInfo name="OMG-UML" value="VER 1.3"/>
        </reference>
        <reference anchor="W3C.REC-xml-20081126" target="https://www.w3.org/TR/2008/REC-xml-20081126" quoteTitle="true" derivedAnchor="W3C.REC-xml-20081126">
          <front>
            <title>Extensible Markup Language (XML) 1.0 (Fifth Edition)</title>
            <author initials="T." surname="Bray" fullname="Tim Bray">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Paoli" fullname="Jean Paoli">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Sperberg-McQueen" fullname="Michael Sperberg-McQueen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Maler" fullname="Eve Maler">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Yergeau" fullname="Francois Yergeau">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" year="2008"/>
          </front>
          <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-xml-20081126"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="NSC" quoteTitle="true" target="https://doi.org/10.1109/SDN4FNS.2013.6702549" derivedAnchor="NSC">
          <front>
            <title>Research directions in network service chaining</title>
            <author fullname="Wolfgang John" initials="W." surname="John">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Konstantinos Pentikousis" initials="K." surname="Pentikousis">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="George Agapiou" initials="G." surname="Agapiou">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Eduardo Jacob" initials="E." surname="Jacob">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Mario Kind" initials="M." surname="Kind">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Antonio Manzalini" initials="A." surname="Manzalini">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Fulvio Risso" initials="F." surname="Risso">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Dimitri Staessens" initials="D." surname="Staessens">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Rebecca Steinert" initials="R." surname="Steinert">
              <organization showOnFrontPage="true"/>
            </author>
            <author fullname="Catalin Meirosu" initials="C." surname="Meirosu">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" year="2013"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/SDN4FNS.2013.6702549"/>
          <refcontent>2013 IEEE SDN for Future Networks and Services
          (SDN4FNS), Trento, Italy</refcontent>
        </reference>
        <reference anchor="PERF-METRICS" target="https://www.iana.org/assignments/performance-metrics" quoteTitle="true" derivedAnchor="PERF-METRICS">
          <front>
            <title>Performance Metrics</title>
            <author>
              <organization showOnFrontPage="true">IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2330" target="https://www.rfc-editor.org/info/rfc2330" quoteTitle="true" derivedAnchor="RFC2330">
          <front>
            <title>Framework for IP Performance Metrics</title>
            <author initials="V." surname="Paxson" fullname="V. Paxson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Almes" fullname="G. Almes">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mahdavi" fullname="J. Mahdavi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Mathis" fullname="M. Mathis">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1998" month="May"/>
            <abstract>
              <t indent="0">The purpose of this memo is to define a general framework for particular metrics to be developed by the IETF's IP Performance Metrics effort. This memo provides information for the Internet community.  It does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2330"/>
          <seriesInfo name="DOI" value="10.17487/RFC2330"/>
        </reference>
        <reference anchor="RFC5618" target="https://www.rfc-editor.org/info/rfc5618" quoteTitle="true" derivedAnchor="RFC5618">
          <front>
            <title>Mixed Security Mode for the Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Hedayat" fullname="K. Hedayat">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="August"/>
            <abstract>
              <t indent="0">This memo describes a simple extension to TWAMP (the Two-Way Active Measurement Protocol).  The extension adds the option to use different security modes in the TWAMP-Control and TWAMP-Test protocols simultaneously.  The memo also describes a new IANA registry for additional features, called the TWAMP Modes registry.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5618"/>
          <seriesInfo name="DOI" value="10.17487/RFC5618"/>
        </reference>
        <reference anchor="RFC5938" target="https://www.rfc-editor.org/info/rfc5938" quoteTitle="true" derivedAnchor="RFC5938">
          <front>
            <title>Individual Session Control Feature for the Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Chiba" fullname="M. Chiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="August"/>
            <abstract>
              <t indent="0">The IETF has completed its work on the core specification of TWAMP -- the Two-Way Active Measurement Protocol.  This memo describes an OPTIONAL feature for TWAMP, that gives the controlling host the ability to start and stop one or more individual test sessions using Session Identifiers.  The base capability of the TWAMP protocol requires all test sessions that were previously requested and accepted to start and stop at the same time.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5938"/>
          <seriesInfo name="DOI" value="10.17487/RFC5938"/>
        </reference>
        <reference anchor="RFC7312" target="https://www.rfc-editor.org/info/rfc7312" quoteTitle="true" derivedAnchor="RFC7312">
          <front>
            <title>Advanced Stream and Sampling Framework for IP Performance Metrics (IPPM)</title>
            <author initials="J." surname="Fabini" fullname="J. Fabini">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="August"/>
            <abstract>
              <t indent="0">To obtain repeatable results in modern networks, test descriptions need an expanded stream parameter framework that also augments aspects specified as Type-P for test packets.  This memo updates the IP Performance Metrics (IPPM) Framework, RFC 2330, with advanced considerations for measurement methodology and testing.  The existing framework mostly assumes deterministic connectivity, and that a single test stream will represent the characteristics of the path when it is aggregated with other flows.  Networks have evolved and test stream descriptions must evolve with them; otherwise, unexpected network features may dominate the measured performance.  This memo describes new stream parameters for both network characterization and support of application design using IPPM metrics.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7312"/>
          <seriesInfo name="DOI" value="10.17487/RFC7312"/>
        </reference>
        <reference anchor="RFC7426" target="https://www.rfc-editor.org/info/rfc7426" quoteTitle="true" derivedAnchor="RFC7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author initials="E." surname="Haleplidis" fullname="E. Haleplidis" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Pentikousis" fullname="K. Pentikousis" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Denazis" fullname="S. Denazis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Hadi Salim" fullname="J. Hadi Salim">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Meyer" fullname="D. Meyer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="O." surname="Koufopavlou" fullname="O. Koufopavlou">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="January"/>
            <abstract>
              <t indent="0">Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces.  SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane.  This separation allows faster innovation cycles at both planes as experience has already shown.  However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other.  This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC8018" target="https://www.rfc-editor.org/info/rfc8018" quoteTitle="true" derivedAnchor="RFC8018">
          <front>
            <title>PKCS #5: Password-Based Cryptography Specification Version 2.1</title>
            <author initials="K." surname="Moriarty" fullname="K. Moriarty" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Kaliski" fullname="B. Kaliski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Rusch" fullname="A. Rusch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t indent="0">This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message authentication schemes, and ASN.1 syntax identifying the techniques.</t>
              <t indent="0">This document represents a republication of PKCS #5 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t indent="0">This document also obsoletes RFC 2898.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8018"/>
          <seriesInfo name="DOI" value="10.17487/RFC8018"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340" quoteTitle="true" derivedAnchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Berger" fullname="L. Berger" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="March"/>
            <abstract>
              <t indent="0">This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8342" target="https://www.rfc-editor.org/info/rfc8342" quoteTitle="true" derivedAnchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schoenwaelder" fullname="J. Schoenwaelder">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Shafer" fullname="P. Shafer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Wilton" fullname="R. Wilton">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="March"/>
            <abstract>
              <t indent="0">Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model.  This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
      </references>
    </references>
    <section anchor="AuthExample" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-detailed-data-model-example">Detailed Data Model Examples</name>
      <t indent="0" pn="section-appendix.a-1">This appendix extends the examples presented in <xref target="examples" format="default" sectionFormat="of" derivedContent="Section 6"/> by configuring more fields, such as authentication
      parameters, DSCP values, and so on.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a.1">
        <name slugifiedName="name-control-client-4">Control-Client</name>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.1-1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;client&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;mode-preference-chain&gt;
        &lt;priority&gt;0&lt;/priority&gt;
        &lt;mode&gt;authenticated&lt;/mode&gt;
      &lt;/mode-preference-chain&gt;
      &lt;mode-preference-chain&gt;
        &lt;priority&gt;1&lt;/priority&gt;
        &lt;mode&gt;unauthenticated&lt;/mode&gt;
      &lt;/mode-preference-chain&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0MQ==&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyForRouterB&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0Mg0K&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;ctrl-connection&gt;
        &lt;name&gt;RouterA&lt;/name&gt;
        &lt;client-ip&gt;203.0.113.1&lt;/client-ip&gt;
        &lt;server-ip&gt;203.0.113.2&lt;/server-ip&gt;
        &lt;control-packet-dscp&gt;32&lt;/control-packet-dscp&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test1&lt;/name&gt;
          &lt;sender-ip&gt;203.0.113.3&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;203.0.113.4&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;55000&lt;/reflector-udp-port&gt;
          &lt;padding-length&gt;64&lt;/padding-length&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test2&lt;/name&gt;
          &lt;sender-ip&gt;203.0.113.1&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;203.0.113.2&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;55001&lt;/reflector-udp-port&gt;
          &lt;padding-length&gt;128&lt;/padding-length&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
      &lt;/ctrl-connection&gt;
    &lt;/client&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.1-2">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;client&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;mode-preference-chain&gt;
        &lt;priority&gt;0&lt;/priority&gt;
        &lt;mode&gt;authenticated&lt;/mode&gt;
      &lt;/mode-preference-chain&gt;
      &lt;mode-preference-chain&gt;
        &lt;priority&gt;1&lt;/priority&gt;
        &lt;mode&gt;unauthenticated&lt;/mode&gt;
      &lt;/mode-preference-chain&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0MQ==&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyForRouterB&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0Mg0K&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;ctrl-connection&gt;
        &lt;name&gt;RouterA&lt;/name&gt;
        &lt;client-ip&gt;2001:db8:203:0:113::1&lt;/client-ip&gt;
        &lt;server-ip&gt;2001:db8:203:0:113::2&lt;/server-ip&gt;
        &lt;control-packet-dscp&gt;32&lt;/control-packet-dscp&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test1&lt;/name&gt;
          &lt;sender-ip&gt;2001:db8:10:1:1::1&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;2001:db8:10:1:1::2&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;55000&lt;/reflector-udp-port&gt;
          &lt;padding-length&gt;64&lt;/padding-length&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
        &lt;test-session-request&gt;
          &lt;name&gt;Test2&lt;/name&gt;
          &lt;sender-ip&gt;2001:db8:203:0:113::1&lt;/sender-ip&gt;
          &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
          &lt;reflector-ip&gt;2001:db8:203:0:113::2&lt;/reflector-ip&gt;
          &lt;reflector-udp-port&gt;55001&lt;/reflector-udp-port&gt;
          &lt;padding-length&gt;128&lt;/padding-length&gt;
          &lt;start-time&gt;0&lt;/start-time&gt;
        &lt;/test-session-request&gt;
      &lt;/ctrl-connection&gt;
    &lt;/client&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a.2">
        <name slugifiedName="name-server-4">Server</name>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.2-1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;server&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;servwait&gt;1800&lt;/servwait&gt;
      &lt;control-packet-dscp&gt;32&lt;/control-packet-dscp&gt;
      &lt;modes&gt;authenticated unauthenticated&lt;/modes&gt;
      &lt;count&gt;15&lt;/count&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0MQ==&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyClient10ToRouterA&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0MTANCg==&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;ctrl-connection&gt;
        &lt;client-ip&gt;203.0.113.1&lt;/client-ip&gt;
        &lt;client-tcp-port&gt;16341&lt;/client-tcp-port&gt;
        &lt;server-ip&gt;203.0.113.2&lt;/server-ip&gt;
        &lt;server-tcp-port&gt;862&lt;/server-tcp-port&gt;
        &lt;control-packet-dscp&gt;32&lt;/control-packet-dscp&gt;
        &lt;selected-mode&gt;unauthenticated&lt;/selected-mode&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;count&gt;15&lt;/count&gt;
      &lt;/ctrl-connection&gt;
    &lt;/server&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.2-2">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;server&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;servwait&gt;1800&lt;/servwait&gt;
      &lt;control-packet-dscp&gt;32&lt;/control-packet-dscp&gt;
      &lt;modes&gt;authenticated unauthenticated&lt;/modes&gt;
      &lt;count&gt;15&lt;/count&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0MQ==&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;key-chain&gt;
        &lt;key-id&gt;KeyClient10ToRouterA&lt;/key-id&gt;
        &lt;secret-key&gt;c2VjcmV0MTANCg==&lt;/secret-key&gt;
      &lt;/key-chain&gt;
      &lt;ctrl-connection&gt;
        &lt;client-ip&gt;2001:db8:203:0:113::1&lt;/client-ip&gt;
        &lt;client-tcp-port&gt;16341&lt;/client-tcp-port&gt;
        &lt;server-ip&gt;2001:db8:203:0:113::2&lt;/server-ip&gt;
        &lt;server-tcp-port&gt;862&lt;/server-tcp-port&gt;
        &lt;control-packet-dscp&gt;32&lt;/control-packet-dscp&gt;
        &lt;selected-mode&gt;unauthenticated&lt;/selected-mode&gt;
        &lt;key-id&gt;KeyClient1ToRouterA&lt;/key-id&gt;
        &lt;count&gt;15&lt;/count&gt;
      &lt;/ctrl-connection&gt;
    &lt;/server&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a.3">
        <name slugifiedName="name-session-sender-4">Session-Sender</name>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.3-1">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-sender&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;test-session&gt;
        &lt;name&gt;Test1&lt;/name&gt;
        &lt;ctrl-connection-name&gt;RouterA&lt;/ctrl-connection-name&gt;
        &lt;fill-mode&gt;zero&lt;/fill-mode&gt;
        &lt;number-of-packets&gt;900&lt;/number-of-packets&gt;
        &lt;periodic-interval&gt;1&lt;/periodic-interval&gt;
        &lt;sent-packets&gt;2&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;2&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;1&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;1&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
      &lt;test-session&gt;
        &lt;name&gt;Test2&lt;/name&gt;
        &lt;ctrl-connection-name&gt;RouterA&lt;/ctrl-connection-name&gt;
        &lt;fill-mode&gt;random&lt;/fill-mode&gt;
        &lt;number-of-packets&gt;900&lt;/number-of-packets&gt;
        &lt;lambda&gt;1&lt;/lambda&gt;
        &lt;max-interval&gt;2&lt;/max-interval&gt;
        &lt;sent-packets&gt;21&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;21&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;20&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;20&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
    &lt;/session-sender&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a.4">
        <name slugifiedName="name-session-reflector-4">Session-Reflector</name>
        <aside pn="section-appendix.a.4-1">
          <t indent="0" pn="section-appendix.a.4-1.1">Note: '\' line wrapping is for formatting only.</t>
        </aside>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.4-2">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-reflector&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;203.0.113.3&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;203.0.113.4&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;55000&lt;/reflector-udp-port&gt;
        &lt;sid&gt;1232&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;203.0.113.1&lt;/parent-connection-\
client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;203.0.113.2&lt;/parent-connection-\
server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;test-packet-dscp&gt;32&lt;/test-packet-dscp&gt;
        &lt;sent-packets&gt;2&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;2&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;1&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;1&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;203.0.113.1&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;192.0.2.2&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;55001&lt;/reflector-udp-port&gt;
        &lt;sid&gt;178943&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;203.0.113.1&lt;/parent-connection-\
client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;203.0.113.2&lt;/parent-connection-\
server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;test-packet-dscp&gt;32&lt;/test-packet-dscp&gt;
        &lt;sent-packets&gt;21&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;21&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;20&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;20&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
    &lt;/session-reflector&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
        <aside pn="section-appendix.a.4-3">
          <t indent="0" pn="section-appendix.a.4-3.1">Note: '\' line wrapping is for formatting only.</t>
        </aside>
        <sourcecode type="xml" markers="false" pn="section-appendix.a.4-4">
&lt;?xml version="1.0" encoding="utf-8"?&gt;
&lt;data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;
  &lt;twamp xmlns="urn:ietf:params:xml:ns:yang:ietf-twamp"&gt;
    &lt;session-reflector&gt;
      &lt;admin-state&gt;true&lt;/admin-state&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;2001:db8:10:1:1::1&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54000&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;2001:db8:10:1:1::2&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;55000&lt;/reflector-udp-port&gt;
        &lt;sid&gt;1232&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;2001:db8:203:0:113::1&lt;/parent-c\
onnection-client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;2001:db8:203:0:113::2&lt;/parent-c\
onnection-server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;test-packet-dscp&gt;32&lt;/test-packet-dscp&gt;
        &lt;sent-packets&gt;2&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;2&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;1&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;1&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
      &lt;test-session&gt;
        &lt;sender-ip&gt;2001:db8:203:0:113::1&lt;/sender-ip&gt;
        &lt;sender-udp-port&gt;54001&lt;/sender-udp-port&gt;
        &lt;reflector-ip&gt;2001:db8:192:68::2&lt;/reflector-ip&gt;
        &lt;reflector-udp-port&gt;55001&lt;/reflector-udp-port&gt;
        &lt;sid&gt;178943&lt;/sid&gt;
        &lt;parent-connection-client-ip&gt;2001:db8:203:0:113::1&lt;/parent-c\
onnection-client-ip&gt;
        &lt;parent-connection-client-tcp-port&gt;16341&lt;/parent-connection-\
client-tcp-port&gt;
        &lt;parent-connection-server-ip&gt;2001:db8:203:0:113::2&lt;/parent-c\
onnection-server-ip&gt;
        &lt;parent-connection-server-tcp-port&gt;862&lt;/parent-connection-se\
rver-tcp-port&gt;
        &lt;test-packet-dscp&gt;32&lt;/test-packet-dscp&gt;
        &lt;sent-packets&gt;21&lt;/sent-packets&gt;
        &lt;rcv-packets&gt;21&lt;/rcv-packets&gt;
        &lt;last-sent-seq&gt;20&lt;/last-sent-seq&gt;
        &lt;last-rcv-seq&gt;20&lt;/last-rcv-seq&gt;
      &lt;/test-session&gt;
    &lt;/session-reflector&gt;
  &lt;/twamp&gt;
&lt;/data&gt;</sourcecode>
      </section>
    </section>
    <section anchor="OperationalCommands" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-twamp-operational-commands">TWAMP Operational Commands</name>
      <t keepWithNext="true" indent="0" pn="section-appendix.b-1">TWAMP operational commands could be performed programmatically or
      manually, e.g., using a command-line interface (CLI).</t>
      <t indent="0" pn="section-appendix.b-2">With respect to programmability, YANG can be used to define NETCONF
      Remote Procedure Calls (RPCs); therefore, it would be, in principle,
      possible to define TWAMP RPC operations for actions such as starting or
      stopping control connections, test sessions, or groups of sessions;
      retrieving results; clearing stored results; and so on.</t>
      <t indent="0" pn="section-appendix.b-3">However, <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357">TWAMP </xref> does not attempt to
      describe such operational actions. Refer also to <xref target="scope" format="default" sectionFormat="of" derivedContent="Section 2"/>
      and the unlabeled links in <xref target="fig_scope" format="default" sectionFormat="of" derivedContent="Figure 1"/>. In actual
      deployments, different TWAMP implementations may support different sets
      of operational commands, with different restrictions. Therefore, this
      document considers it the responsibility of the individual
      implementation to define its corresponding data model for TWAMP operational commands.</t>
    </section>
    <section anchor="acks" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.c">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.c-1">We thank <contact fullname="Fred Baker"/>, <contact fullname="Kevin D'Souza"/>, <contact fullname="Gregory Mirsky"/>, <contact fullname="Brian Trammell"/>,
      <contact fullname="Robert Sherman"/>, and <contact fullname="Marius Georgescu"/> for their thorough and constructive
      reviews, comments, and text suggestions.</t>
      <t indent="0" pn="section-appendix.c-2"><contact fullname="Haoxing Shen"/> contributed to the definition of the YANG module in
      <xref target="module" format="default" sectionFormat="of" derivedContent="Section 5"/>.</t>
      <t indent="0" pn="section-appendix.c-3"><contact fullname="Jan Lindblad"/> and <contact fullname="Ladislav Lhotka"/> did thorough reviews of the YANG
      module and the examples in <xref target="AuthExample" format="default" sectionFormat="of" derivedContent="Appendix A"/>.</t>
      <t indent="0" pn="section-appendix.c-4"><contact fullname="Kostas Pentikousis"/> was partially supported by FP7 UNIFY, a research project partially funded by the
      European Community under the Seventh Framework Program (grant agreement
      no. 619609). The views expressed here are those of the authors only. The
      European Commission is not liable for any use that may be made of the
      information in this document.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.d">
      <name slugifiedName="name-contributors">Contributors</name>
      <t indent="0" pn="section-appendix.d-1"><contact fullname="Lianshu Zheng"/></t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.e">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Ruth Civil" initials="R." surname="Civil">
        <organization showOnFrontPage="true">Ciena Corporation</organization>
        <address>
          <postal>
            <street>307 Legget Drive</street>
            <city>Kanata</city>
            <region>ON</region>
            <code>K2K 3C8</code>
            <country>Canada</country>
          </postal>
          <email>ruthcivil@gmail.com</email>
          <uri>www.ciena.com</uri>
        </address>
      </author>
      <author fullname="Al Morton" initials="A." surname="Morton">
        <organization showOnFrontPage="true">AT&amp;T Labs</organization>
        <address>
          <postal>
            <street>200 Laurel Avenue South</street>
            <city>Middletown</city>
            <region>NJ</region>
            <code>07748</code>
            <country>United States of America</country>
          </postal>
          <phone>+1 732 420 1571</phone>
          <email>acmorton@att.com</email>
          <uri/>
        </address>
      </author>
      <author fullname="Reshad Rahman" initials="R." surname="Rahman">
        <organization showOnFrontPage="true"/>
        <address>
          <postal>
            <street/>
            <city/>
            <region/>
            <code/>
            <country>Canada</country>
          </postal>
          <email>reshad@yahoo.com</email>
        </address>
      </author>
      <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
        <organization showOnFrontPage="true">Xoriant Corporation</organization>
        <address>
          <postal>
            <street>1248 Reamwood Avenue</street>
            <city>Sunnyvale</city>
            <region>CA</region>
            <code>94089</code>
            <country>United States of America</country>
          </postal>
          <email>mjethanandani@gmail.com</email>
        </address>
      </author>
      <author fullname="Kostas Pentikousis" initials="K." surname="Pentikousis" role="editor">
        <organization showOnFrontPage="true">Detecon</organization>
        <address>
          <postal>
            <street>Winterfeldtstrasse 21</street>
            <code>10781</code>
            <city>Berlin</city>
            <country>Germany</country>
          </postal>
          <email>kostas.pentikousis@detecon.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
