<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-nemops-workshop-report-04" category="info" consensus="true" submissionType="IAB" xml:lang="en" number="9968" tocInclude="true" sortRefs="true" symRefs="true" version="3">

  <front>
    <title abbrev="NEMOPS Workshop Report">Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
    <seriesInfo name="RFC" value="9968"/>
    <author fullname="Wes Hardaker">
      <organization/>
      <address>
        <email>hardaker@isi.edu</email>
      </address>
    </author>
    <author fullname="Dhruv Dhody">
      <organization/>
      <address>
        <email>dd@dhruvdhody.com</email>
      </address>
    </author>
    <date year="2026" month="May"/>
    <keyword>YANG</keyword>
    <keyword>NETCONF</keyword>
    <keyword>RESTCONF</keyword>
    <keyword>NMOPS</keyword>
    <keyword>RFC3535</keyword>
    <abstract>
<t>The "Next Era of Network Management Operations (NEMOPS)" workshop was convened by the Internet Architecture Board (IAB) from December 3-5, 2024 as a three-day online meeting. It builds on a previous 2002 workshop, the outcome of which was documented in RFC 3535, identifying 14 operator requirements for consideration in future network management protocol design and related data models, along with some recommendations for the IETF. Much has changed in the Internet's operation and technological foundations since then. The NEMOPS workshop reviewed the past outcomes and discussed any operational barriers that prevented these technologies from being widely implemented. With the industry, network operators and protocol engineers working in collaboration, the workshop developed a suggested plan of action and network management recommendations for the IETF and IRTF. Building on RFC 3535, this document provides the report of the follow-up IAB workshop on network management.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t>
    </abstract>
  </front>
  <middle>

<section anchor="introduction">
      <name>Introduction</name>

<t>The Internet Architecture Board (IAB) holds occasional workshops designed to consider long-term issues and strategies for the Internet, and to suggest future directions for the Internet architecture.  This long-term planning function of the IAB is complementary to the ongoing engineering efforts performed by working groups of the Internet Engineering Task Force (IETF).</t>
      <t>The IAB organized a workshop in 2002 to establish a dialog between network operators and protocol developers and to guide the IETF's work on network management protocols. The outcome of that workshop was documented in the "Overview of the 2002 IAB Network Management Workshop" <xref target="RFC3535"/>, which identified 14 operator requirements and 11 recommendations for consideration in future network management protocol design and related data models within the IETF.</t>
      <t>Those requirements were instrumental in developing the Network Configuration Protocol (NETCONF) (in the NETCONF Working Group) <xref target="RFC6241"/>, the associated YANG data modeling language (in the NETMOD Working Group) <xref target="RFC7950"/>, RESTCONF <xref target="RFC8040"/>, and most recently the CoAP Management Interface (CORECONF) <xref target="I-D.ietf-core-comi"/>.</t>
      <t>The recent NEMOPS IAB workshop focused on the following key tasks:</t>
      <ul spacing="normal">
        <li>
          <t>Review the outcomes and results of the 2002 workshop (current deployments and state of the art) and identify any operational barriers that prevent these technologies from being widely implemented (limitations and hurdles).</t>
        </li>
        <li>
          <t>Sketch new requirements for future network management operations in a collaborative manner with the industry, network operators, and protocol engineers.</t>
        </li>
        <li>
          <t>Develop a plan of action and recommendations for the IETF.</t>
        </li>
      </ul>
      <t>This document builds on RFC 3535 with new information gathered from the second IAB workshop on the future of network management. The goal of the second workshop was not to invalidate or replace the first but to extend the discussion with lessons learned since then. Together, both documents capture a snapshot of the evolving needs of network management over time.</t>
      <section anchor="about-the-content-of-this-workshop-report">
        <name>About the Content of This Workshop Report</name>
        <t>This document is a report on the proceedings of the workshop. The views and positions documented in this report are expressed during the workshop by participants and do not necessarily reflect the IAB's views and positions.</t>
        <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interpretation or validation.  Thus, the content of this report follows the flow and dialogue of the workshop but does not necessarily attempt to capture a consensus, unless stated otherwise.</t>
      </section>
    </section>
    <section anchor="outreach">
      <name>Outreach and Survey</name>
      <t>The IAB workshop's Program Committee (PC) planned outreach initiatives to foster discussions and gather interest by engaging with operators at various operational venues (Réseaux IP Européens (RIPE), North American Network Operators Group (NANOG), 
Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT), Latin American and Caribbean Internet Addresses Registry (LACNIC), AutoConn, etc.) and conducting information-/requirement-gathering sessions. Participants were encouraged to submit "position papers" or "expressions of interest" to join the workshop. Additionally, a <xref target="SURVEY"/> was conducted to collect valuable insights to inform the workshop.</t>
      <t>After the workshop, some PC members continued to engage with network operators at operational venues to facilitate information sharing and gather their feedback on the workshop, thereby helping to shape the next steps and outcomes.</t>
    </section>
    <section anchor="workshop-scope-and-discussion">
      <name>Workshop Scope and Discussion</name>
      <t>The workshop was organized across three days, with all participants contributing to one discussion per day. The workshop was organized around three topic areas: "Session I: Past - Lookback and Analysis" (<xref target="past"/>), "Session II: Present - Identified Problems and Requirements" (<xref target="present"/>), and "Session III: Future - Possible Solutions, Recommendations, and Next Steps" (<xref target="future"/>). The program committee organized the paper submissions to fit these three main themes in order to drive discussion during each of the slots. During each discussion, the papers were presented sequentially, and an open discussion was held afterwards. On the last day, an additional discussion took place on the key takeaways from the workshop and possible next steps (<xref target="key"/>).</t>
      <t>The workshop agenda for each day can be viewed at <eref brackets="angle" target="https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws-01-sessa/">"Past (Session 1)"</eref>, <eref brackets="angle" target="https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws-02-sessa/">"Present (Session II)"</eref>, and <eref brackets="angle" target="https://datatracker.ietf.org/doc/agenda-interim-2024-nemopsws-03-sessa/">"Future (Session III)"</eref>. All workshop papers and slides can be viewed at <eref brackets="angle" target="https://datatracker.ietf.org/group/nemopsws/materials/">"materials"</eref>.</t>
      <section anchor="past">
        <name>Session I: Past - Lookback and Analysis</name>
        <t>The first day of the workshop focused on reflecting on the past by reviewing the evolution of network management since the 2002 workshop, analyzing both the successes and the challenges encountered along the way. The presentations covered a range of topics, including reflections on the history of network management, lessons learned from widely used tools, practices in constrained networks, and the need to reconsider how network management models and protocols are standardized within the IETF.</t>
        <section anchor="reflections">
          <name>Reflections</name>
          <t>The workshop began by reflecting on the IAB's role in shaping the evolution of network management away from Command-Line Interface (CLI), SNMP, and MIB technologies, focusing on the context and key outcomes of the previous workshop, an assessment of the current state of network management as a whole, and an acknowledgement of some regrets in how network management technologies developed in the last two decades (such as XML as the data representation format). <xref target="SCHONWALDER"/> emphasized the need to shift the focus from device-level configuration to network and service-level configuration. Key properties highlighted for effective network and service configurations included being Composable (assembled out of modular configurations), Declarative (define state while systems themselves determine how to implement those goals), Reproducible (reliably and consistently recreated), and Verifiable (asserting that the correct changes have been applied).</t>
          <t>An operator's perspective highlighted that the recommendations of <xref target="RFC3535"/> (which led to the development of YANG and NETCONF) have been successful in addressing device configuration in many, but not all, environments. In certain areas, the advancements in semantics and protocols for streaming telemetry have even surpassed the original scope of <xref target="RFC3535"/>. <xref target="FARRER"/> cautioned against making changes that could disrupt the ecosystem. The presentation emphasized the need to prioritize service modeling in the IETF and addressed the challenges of mapping to the Business Support Systems (BSS) domain. It also stressed the importance of including the operational state in service models to enable closed-loop automation for end-to-end (E2E) services. Revisiting <xref target="RFC8309"/>, which asserts that the operational state of a service is not part of a customer service model but can be achieved through extensions, was suggested. Additionally, the lack of open-source Network Management System (NMS) implementations, tools, and device model implementations was identified as a significant barrier to advancing standardization efforts. The IETF could play a key role in fostering and enabling collaborations to address these challenges. While the IETF does not itself build tools, it was suggested that having a translation tool that runs outside the network device to map IETF device models to vendor-specific ones would be beneficial.</t>
        </section>
        <section anchor="lessons-to-be-learned">
          <name>Lessons to be Learned</name>
          <t><xref target="HARDAKER"/> emphasized that the success of Net-SNMP <xref target="NET-SNMP"/> was driven by empowering users through simplicity, stressing that the focus should remain on ensuring ease of use and adaptability of the protocols. Emphasis was placed on the two distinct audiences for standardized network management protocols: toolkit vendors and system operators. Their requirements for protocol simplicity differ, and it is essential to address the needs of both to ensure success. <xref target="BORMANN"/> presented an overview of the CORECONF architecture, showcasing how model-driven network management techniques can be applied to manage Internet of Things (IoT) devices (which is different from other network management scenarios), with a focus on the unique characteristics of constrained nodes. Some participants noted that the binary encoding of Concise Binary Object Representation (CBOR) has applications that extend beyond the IoT networks.</t>
          <t>Drawing from the experience of OpenConfig <xref target="OPENCONFIG"/>, <xref target="SHAKIR"/> emphasized that protocol definition and data models cannot be done in isolation; instead, they must integrate lessons learned from implementation and large-scale deployment. Thus, highlighting the importance of enabling quick iterations, shipping rapidly, embracing open source, readily available tools, adopting systems thinking driven by business outcomes, and reusing existing technologies rather than developing solutions exclusively for operator network management. A call was made for the IETF to rethink the approach to standardize data models and the associated network management protocols under this guidance.</t>
        </section>
        <section anchor="discussion">
          <name>Discussion</name>
          <t>The Session I open discussion highlighted the divergence between vendor implementations of YANG models and what is accessible via the models, particularly when compared to CLI. Questions were raised about how to incorporate fast iteration and rapid changes within the established IETF process and culture, especially in contrast to the approach used by OpenConfig. Common challenges identified included a lack of tooling, performance issues at scale, the steep learning curve for network management protocols/models/tools, initial difficulty in moving away from CLI, and the backward compatibility of models (versioning). Some participants suggested that the IETF should focus on system-level APIs that address specific problems. Additionally, the lack of simple tools for smaller networks operating under tight timelines and budgets was emphasized. A key question raised was whether the proliferation of protocols and languages complicates adoption and if converging on a single approach would improve adoption. The existence of multiple schemas and protocols beyond NETCONF, such as the BGP Monitoring Protocol (BMP) and IP Flow Information Export (IPFIX), to address network management challenges beyond configuration is an established reality. One conclusion was that a mechanism was needed to interconnect and harmonize these schemas to provide a cohesive and comprehensive understanding of the data.</t>
        </section>
      </section>
      <section anchor="present">
        <name>Session II: Present - Identified Problems and Requirements</name>
        <t>The second day of the workshop concentrated on challenges and emerging requirements for future network management operations. The presentation emphasized the importance of validation, observability, automation, and the need for agile, incremental development of both network models and management protocols. A compilation of new requirements from operators was presented; they are being maintained in <xref target="I-D.ietf-nmop-rfc3535-20years-later"/>. The final presentation of the day provided a summary of the survey results and operator feedback gathered from outreach events.</t>
        <section anchor="operator-feedback">
          <name>Operator Feedback</name>
          <t><xref target="KELLER"/> shared Deutsche Telekom's perspective, emphasizing that while YANG models perform well for provisioning, they currently fall short in providing the operational stability required for validation. In their experience, the IETF service models (where available) were considered stable and in good condition, whereas the OpenConfig device models were noted as lacking feature richness and stability. In contrast, vendor YANG models are often more flexible and available in a more timely manner. Achieving fully closed-loop automated and autonomous networking will require a greater focus on observability, particularly through advancements in streaming telemetry with the "on-change" feature <xref target="RFC9196"/>.</t>
          <t><xref target="JIMENEZ"/> discussed the challenges associated with the Software Defined Networking (SDN) Transport Automation Platform, including observability and analytics requirements, issues with data streaming, scalability, diverse models in heterogeneous multi-vendor environments, and mechanisms to secure the network management protocols. The presentation also emphasized how advancements in AI and machine learning, along with the potential adaptation of protocols designed for constrained environments, could drive the next evolution in network management.</t>
          <t>Using YANG-Push as an example, <xref target="GRAF"/> highlighted how standards development often fails to align with the needs of network operators, the constraints of network vendors, and integration requirements. Most critically, it lacks an agile, incremental development process. The presentation advocated for adopting an iterative approach to standards development, focusing on delivering minimal viable products as part of the process.</t>
          <t><xref target="CONTRERAS"/> emphasized reassessing deployment assumptions and incorporating updated operator requirements. The authors are addressing these aspects through <xref target="I-D.ietf-nmop-rfc3535-20years-later"/>, leveraging feedback and discussions from the workshop. Some key requirements, suggestions, and observations that were highlighted in the workshop:</t>
          <ul spacing="normal">
            <li>
              <t>Network software implementations can only happen with a strong, committed standardization effort, complemented by active involvement in open-source projects that facilitate access to code.</t>
            </li>
            <li>
              <t>Need to rationalize the device model space and avoid redundant efforts. Unlike service and network models, IETF-defined device models are not widely implemented.</t>
            </li>
            <li>
              <t>Define a reference approach/process for service exposure discovery (API discovery).</t>
            </li>
            <li>
              <t>Outline a set of recommendations for core/key features, along with appropriate justifications, that will help foster more implementations that meet operators' needs.</t>
            </li>
            <li>
              <t>Reassess the value of some IETF proposals, including comparison to competing or emerging solutions (e.g., gRPC Network Management Interface (gNMI) vs. YANG-Push)</t>
            </li>
            <li>
              <t>Need for a more agile process for the development and maintenance of YANG modules in the IETF. RFCs might not be suited for documenting YANG modules.</t>
            </li>
            <li>
              <t>Consider approaches to ease integration by design (e.g., protocols and data models).</t>
            </li>
            <li>
              <t>Need for a reference specification to translate YANG-based data into the knowledge graph (KG).</t>
            </li>
            <li>
              <t>Consider approaches to help YANG models scale.</t>
            </li>
            <li>
              <t>Consider programmatic approaches to ensure lossless mappings between service/network/device data models.</t>
            </li>
            <li>
              <t>Consider approaches to ensure reuse of / consistent data structure across various network management segments.</t>
            </li>
            <li>
              <t>Some networks have specific network management requirements, such as the need for asynchronous operations or constraints on data compactness.</t>
            </li>
            <li>
              <t>Necessity to handle the heterogeneity of data, configuration, and network management/requirements. Resolving such issues could draw on insights from parallel technical fields such as knowledge engineering practices and concepts associated with Linked Data in the Semantic Web, areas where it is common to manage problems of heterogeneity and data reconciliation across various application domains.</t>
            </li>
            <li>
              <t>Consider having YANG as part of the protocol specification/change where possible, or have the YANG document progress in parallel.</t>
            </li>
            <li>
              <t>Need to ease the integration of low-level/network-oriented solutions with common "IT tooling".</t>
            </li>
            <li>
              <t>Ease exposure of libraries and host tools (e.g., yangkit) to ease integration.</t>
            </li>
            <li>
              <t>Focus on tooling is needed, especially on the client side.</t>
            </li>
            <li>
              <t>Create an ecosystem where data and networking engineers can collaborate.</t>
            </li>
            <li>
              <t>Distinct approaches are followed in both the compute and the network environments to define suitable mechanisms for enabling an efficient interplay, while highly automating the overall service delivery procedure.</t>
            </li>
            <li>
              <t>The target application/applicability of a network management approach should be documented.</t>
            </li>
            <li>
              <t>Readily available API specifications could be generalized from YANG modules for fast development, prototyping, and validation.</t>
            </li>
          </ul>
        </section>
        <section anchor="survey">
          <name>Survey</name>
          <t>As outlined in <xref target="outreach"/>, the workshop program committee organized outreach initiatives to gather direct feedback and conducted a survey. <xref target="SURVEY-INSIGHTS"/> provided an overview of the respondents' backgrounds, as well as insights into the most widely used tools, protocols, and APIs for configuration, monitoring, and other network operations. Notably, the survey revealed that Ansible and CLI are the most popular configuration tools, NETCONF is the preferred configuration protocol, and Prometheus and SNMP are widely used for monitoring. The survey also captured feedback on network automation and streaming telemetry. Issues and future requirements such as scalability, performance, the need for easier mapping of various models, tooling, management of legacy devices, collaboration with open source, and vendor-specific issues were highlighted. Additionally, valuable insights from direct operator feedback were presented (see <xref target="insights"/>).</t>
        </section>
        <section anchor="discussion-1">
          <name>Discussion</name>
          <t>The Session II open discussion featured feedback from implementers, highlighting the difficulty in moving to YANG and mapping to vendor implementations and how divergence in implementations creates complexity and necessitates workarounds. Implementations need to support standard models alongside vendor-specific models, which adds complexity and leads to confusion. Challenges were highlighted in mapping standard models to internal device models and legacy devices, with some cases where mapping is not feasible at all (device-specific knobs). The conversation also emphasized the importance of developing open-source reference implementations, compliance and interoperability testing for vendors with real data, and better quality of vendor implementation and documentation. The implementation and support of multiple models (IETF, OpenConfig, and vendor-specific models) is an unavoidable reality in network management. Additionally, since the services offered by operators vary significantly, reaching a consensus on a common service model within the IETF can be a challenging task. It was also noted that the IETF should expedite the publication of standards as well as consider gating them with multiple interoperable implementations.</t>
        </section>
      </section>
      <section anchor="future">
        <name>Session III: Future - Possible Solutions, Recommendations, and Next Steps</name>
        <t>The final day of the workshop centered on exploring potential future solutions and identifying key takeaways, recommendations, and next steps. At the end of day three, to conclude the workshop, the chairs worked to summarize the key takeaways (see <xref target="key"/>) that garnered consensus among the participants.</t>
        <section anchor="suggestions-on-future-directions">
          <name>Suggestions on Future Directions</name>
          <t><xref target="CLAISE"/> highlighted the challenges of integrating data models across different silos, protocols, and data structures, emphasizing the need for a machine-readable approach to expose semantics. Additionally, the related tools being developed and showcased in the IETF Hackathons, along with the various challenges in mapping across protocols and models, were discussed. A potential solution was proposed that uses a knowledge graph based on the Semantic Web Stack, along with the need to define a basic ontology for the networking domain in an iterative manner (outside of RFCs).</t>
          <t><xref target="WATSEN"/> recommended prioritizing the following into four areas: (1) using RESTCONF+JSON (including YANG-Push Lite) as a single protocol beyond network management, (2) utilizing Network Management Datastore Architecture (NMDA) model, (3) creating data model adapters (off-box so that common standard models can be developed in parallel to the required device vendor-specific models), and (4) defining device protocol adapters (with RESTCONF-like Northbound Interface (NBI) for a common shared-by-all repository).</t>
          <t><xref target="WILTON"/> recommended reducing unnecessary complexity, delivering timely solutions, fostering open collaboration between vendors and operators, prioritizing simplicity, and converging to a single model/protocol (though this was discussed as difficult to accomplish). Practical suggestions include focusing on YANG-Push Lite, introducing YANG 2.0 through incremental updates, developing NETCONFv2, and managing IETF YANG models as code or APIs rather than embedding them within RFCs.</t>
        </section>
        <section anchor="discussion-2">
          <name>Discussion</name>
          <t>The open discussion in Session III explored a range of topics. These included the absence of NMDA in OpenConfig and debate over whether its complexity is justified; the historical context of gNMI's introduction in the IETF and whether RESTCONF offers advantages over it; and the broader challenges of building consensus, with participants noting that while the process takes time, it should not be short-circuited. The discussion also addressed the practicality of converging on a single protocol and concluded that such convergence is, in fact, feasible.</t>
          <t>The discussion emphasized off-box adapters, which allow vendors to continue innovating and developing vendor-specific models rapidly. One suggestion that attracted a lot of discussion centered on developing a standard model mapping to vendor-specific models that could be maintained in a common repository, enabling the community to assess coverage and alignment.</t>
          <t>Further, the discussion explored alternative approaches to YANG models within the IETF but outside of RFCs, such as leveraging GitHub to accelerate the process (along with the challenges associated with it), living documents within the WG charter, and supporting academia to take up the open source efforts, such as device adapters. The discussion emphasized the need for process experimentation, particularly at the working group or area level, where we could have consensus among the YANG/OPS community on how we iterate in WGs without IETF-/RFC-wide changes, but making sure the operators are involved in the process.</t>
          <t>Conversations ensued around questions asked, such as "Is YANG applicable beyond network management?" and "Can applications adopt YANG as a modeling language to define their services?"</t>
          <t>Some key recommendations made by operators during outreach (<xref target="outreach"/>) are listed in <xref target="recommendations"/>.</t>
        </section>
      </section>
      <section anchor="key">
        <name>Key Takeaways</name>
        <t>At the end of the third day, the discussion turned to key takeaways that have a high-level consensus.  These were edited live during the last discussion of the workshop, and anything that did not reach a wide consensus was moved into a "future considerations" list (<xref target="workneeded"/>).</t>
        <section anchor="ecosystem-conclusions">
          <name>Ecosystem Conclusions</name>
          <t>The following takeaways try to document the general thinking of the participants with respect to the entire network management ecosystem as it exists today.</t>
          <ol spacing="normal" type="1"><li>
              <t>The current network management protocols, models, and tools still
fail the 'ease of use' requirement.  Participants noted that the
tools almost matter more than the protocols.</t>
            </li>
            <li>
              <t>The overall ecosystem is still fragmented for both protocols and
data models.  SNMP is still used extensively for monitoring, and
the CLI is still heavily relied on for configuration in many
networks.  Popular protocols include SNMP, NETCONF, RESTCONF,
and gNMI.</t>
            </li>
            <li>
              <t>Documentation about the architecture and usage of the network
management ecosystem is lacking.  More work is needed to create
general architecture documentation, deployment guides, tutorials,
training material, and getting-started guides.</t>
            </li>
            <li>
              <t>Transitioning between network management frameworks is challenging,
just like it is for transitioning between other protocols like IPv4
to IPv6.</t>
            </li>
            <li>
              <t>Model-driven network management is generally a success where it has been
implemented and is possible to use.</t>
            </li>
            <li>
              <t>More easily usable network management tools for the operators are
needed.  The lack of open-source tools is seen as a barrier to
adoption.  Tools need good use cases, example flows, and better
analysis of when and how they work and have been successful.</t>
            </li>
          </ol>
        </section>
        <section anchor="protocol-conclusions">
          <name>Protocol Conclusions</name>
          <t>The following conclusions were reached while discussing network management protocols, more specifically.</t>
          <ol spacing="normal" type="1"><li>
              <t>NETCONF and YANG are not used much for monitoring tasks.</t>
            </li>
            <li>
              <t>NETCONF and YANG do not have full coverage on many devices.</t>
            </li>
            <li>
              <t>Polling-based solutions are still frequently deployed.  Push-based solutions are often desired but are not yet widely available.</t>
            </li>
          </ol>
        </section>
        <section anchor="modeling-conclusions">
          <name>Modeling Conclusions</name>
          <t>The following conclusions were reached while discussing network management modeling, more specifically.</t>
          <ol spacing="normal" type="1"><li>
              <t>Some YANG models can become complex due to the underlying features they represent, not due to the language itself.</t>
            </li>
            <li>
              <t>Multi-vendor compatibility support is required.</t>
            </li>
            <li>
              <t>Even vendor-specific features, not just standardized protocol
features, need to be exposed through network management models and protocols
for a network management ecosystem to be viable.</t>
            </li>
            <li>
              <t>Greater support for service-level modeling is needed.  Device-level
modeling can be a building block to achieve a sufficient
service-level model, but it is not a complete solution by itself.</t>
            </li>
            <li>
              <t>Network configuration needs to be verifiable to ensure any
potential changes can be accepted by devices.  Model translation
adapters (likely performed on the management station, not the end
device) may be the best path forward to simultaneously achieve this
and the goal of supporting one configuration set across a diversity
of devices with different internal models.</t>
            </li>
          </ol>
        </section>
        <section anchor="standardization-conclusions">
          <name>Standardization Conclusions</name>
          <t>The following conclusions were reached while discussing the best ways to standardize network management protocols and associated models.</t>
          <ol spacing="normal" type="1"><li>
              <t>A methodology of rapid model development procedures is needed to
ensure model deployment can keep pace with new feature deployment.
We need a solution that significantly increases the speed and
predictable timeline for developing and publishing models within
the IETF.  New approaches and methods to make models live outside
of published RFCs should be explored.  An experiment should be
started to test a new rapid development approach.</t>
            </li>
            <li>
              <t>Protocol and model complexity should be reduced to keep additions
and changes to a minimal set of agreed-upon core features.</t>
            </li>
            <li>
              <t>More standardization focus is needed on the scalability of the
different roles of network management: monitoring, configuration,
and notifications.</t>
            </li>
            <li>
              <t>Enhancements to network management protocols and models need to be
backed by real-world operator use cases and expected adoption by
vendors.  Vendors and operators will need to work together to
ensure these goals are appropriately met.</t>
            </li>
          </ol>
        </section>
        <section anchor="workneeded">
          <name>Conclusions That Did Not Reach Consensus During the Takeaways Discussion</name>
          <t>Here, we list the things that the group realized needed significantly more attention in order to come to a conclusion, while updating the key takeaways in real time.</t>
          <ol spacing="normal" type="1"><li>
              <t>Some, but not all, saw NETCONF for configuration as being successful in some larger-scale deployments.  Although this statement is true in some contexts, many operators indicated their need to rely on other forms of access to manage their networks, such as CLIs, Expect scripts, and other protocols.</t>
            </li>
            <li>
              <t>Many hope that NETCONF, and RESTCONF more specifically, will continue to move to a long-term configuration management solution.  However, some participants doubted whether the protocol and its data models can ever be truly ubiquitous and keep pace with the device deployment pace.</t>
            </li>
          </ol>
          <t>While many other items also need further discussion, this list specifically includes those that were actively discussed during the live editing session in the workshop.</t>
        </section>
      </section>
    </section>
    <section anchor="not-covered-in-the-workshop">
      <name>Not Covered in the Workshop</name>
      <t>Some topics absent from the workshop discussions included tooling (what is currently missing) and strategies to support tool development (who pays, who develops, and who maintains). The primary focus of the discussion was on YANG and NETCONF/RESTCONF, while several other network management protocols and techniques currently used received less attention. During the workshop, the discussion on possible future directions prioritized improving existing solutions rather than introducing entirely new ones (such as enabling intelligence in network management).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document is a workshop report and does not impact the security of the Internet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-core-comi" to="CORECONF"/>
    <displayreference target="I-D.ietf-nmop-rfc3535-20years-later" to="OP-REQ-NM"/>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3535.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8040.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8309.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9196.xml"/>


<!--I-D.ietf-core-comi
draft-ietf-core-comi-21
IESG State: I-D exists as of 5/4/26
Note: Added the long way to get editor roles.
-->
<reference anchor="I-D.ietf-core-comi" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-comi-21">
  <front>
    <title>CoAP Management Interface (CORECONF)</title>
    <author fullname="Michel Veillette" initials="M." surname="Veillette" role="editor">
      <organization>Trilliant Networks Inc.</organization>
    </author>
    <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok" role="editor">
      <organization>consultant</organization>
    </author>
    <author fullname="Alexander Pelov" initials="A." surname="Pelov" role="editor">
      <organization>IMT Atlantique</organization>
    </author>
    <author fullname="Andy Bierman" initials="A." surname="Bierman">
      <organization>YumaWorks</organization>
    </author>
    <author fullname="Carsten Bormann" initials="C." surname="Bormann" role="editor">
      <organization>Universität Bremen TZI</organization>
    </author>
    <date day="2" month="March" year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-21"/>
</reference>

<!--[I-D.boucadair-nmop-rfc3535-20years-later]
draft-ietf-nmop-rfc3535-20years-later-01
IESG State: Expired as of 5/4/26
Note: Added long way to get "LM." for Contreras
--> 
<reference anchor="I-D.ietf-nmop-rfc3535-20years-later" target="https://datatracker.ietf.org/doc/html/draft-ietf-nmop-rfc3535-20years-later-03">
  <front>
    <title>An Update of Operators Requirements on Network Management Protocols and Modelling</title>
    <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
      <organization>Orange</organization>
    </author>
    <author fullname="Luis M. Contreras" initials="LM." surname="Contreras">
      <organization>Telefonica</organization>
    </author>
    <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
      <organization>Telefonica</organization>
    </author>
    <author fullname="Thomas Graf" initials="T." surname="Graf">
      <organization>Swisscom</organization>
    </author>
    <author fullname="Reshad Rahman" initials="R." surname="Rahman">
      <organization>Equinix</organization>
    </author>
    <date day="20" month="March" year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-rfc3535-20years-later-03"/>
</reference>


      <reference anchor="SURVEY" target="https://ietf.iad1.qualtrics.com/jfe/form/SV_9vQxBRiZqDntarc">
        <front>
          <title>Next Era of Network Management Operations (NEMOPS) workshop survey</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="October"/>
        </front>
      </reference>
      <reference anchor="SURVEY-INSIGHTS" target="https://datatracker.ietf.org/meeting/interim-2024-nemopsws-02/materials/slides-interim-2024-nemopsws-02-sessa-6-insights-from-operator-outreach-survey-03.pdf">
        <front>
          <title>Insights from Operator Survey &amp; Outreach</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="December"/>
        </front>
      </reference>
      <reference anchor="SCHONWALDER" target="https://www.ietf.org/slides/slides-nemopsws-paper-composable-declarative-reproducible-verifiable-network-and-service-configurations-00.pdf">
        <front>
          <title>Composable, Declarative, Reproducible, Verifiable Network and Service Configurations</title>
          <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="FARRER" target="https://www.ietf.org/slides/slides-nemopsws-paper-rfc3535-years-later-from-an-operators-perspective-deutsche-telekom-00.pdf">
        <front>
          <title>RFC3535, 20 Years Later from an Operator's Perspective (Deutsche Telekom)</title>
          <author initials="K." surname="Larsson" fullname="Kristian Larsson">
            <organization/>
          </author>
          <author initials="K." surname="Lambrechts" fullname="Kris Lambrechts">
            <organization/>
          </author>
          <author initials="I." surname="Farrer" fullname="Ian Farrer">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="HARDAKER" target="https://www.ietf.org/slides/slides-nemopsws-paper-lessons-learned-from-30-years-of-net-snmp-00.pdf">
        <front>
          <title>Lessons Learned from 30 Years of Net-SNMP</title>
          <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="NET-SNMP" target="http://www.net-snmp.org/">
        <front>
          <title>Net-SNMP</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="BORMANN" target="https://www.ietf.org/slides/slides-nemopsws-paper-coreconf-managing-iot-devices-with-yang-models-00.pdf">
        <front>
          <title>CORECONF: Managing IoT Devices with YANG Models</title>
          <author initials="C." surname="Bormann" fullname="Carsten Bormann">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="SHAKIR" target="https://www.ietf.org/slides/slides-nemopsws-paper-rethinking-standardisation-of-network-management-00.pdf">
        <front>
          <title>Rethinking Standardisation of Network Management</title>
          <author initials="R." surname="Shakir" fullname="Rob Shakir">
            <organization/>
          </author>
          <date year="2024" month="September"/>
        </front>
      </reference>
      <reference anchor="OPENCONFIG" target="https://www.openconfig.net/">
        <front>
          <title>OpenConfig</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="KELLER" target="https://www.ietf.org/slides/slides-nemopsws-nemops-rfc3535-and-the-forgotten-word-00.pdf">
        <front>
          <title>NEMOPS: RFC3535 and the forgotten word - Or Provisioning is only a subset of Network Management</title>
          <author initials="N." surname="Warnke" fullname="Nils Warnke">
            <organization/>
          </author>
          <author initials="R." surname="Geib" fullname="Rüdiger Geib">
            <organization/>
          </author>
          <author initials="M." surname="Horneffer" fullname="Martin Horneffer">
            <organization/>
          </author>
          <author initials="H." surname="Keller" fullname="Holger Keller">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="JIMENEZ" target="https://www.ietf.org/slides/slides-nemopsws-paper-evolving-challenges-and-solutions-in-network-management-00.pdf">
        <front>
          <title>Evolving Challenges and Solutions in Network Management</title>
          <author initials="J." surname="Jiménez" fullname="Jaime Jiménez">
            <organization/>
          </author>
          <author initials="S." surname="Mansfield" fullname="Scott Mansfield">
            <organization/>
          </author>
          <author initials="R." surname="Rodriguez A" fullname="Raquel Rodriguez A">
            <organization/>
          </author>
          <author initials="M." surname="Pesonen" fullname="Mikko Pesonen">
            <organization/>
          </author>
          <author initials="V." surname="Torvinen" fullname="Vesa Torvinen">
            <organization/>
          </author>
          <author initials="J." surname="Karvonen" fullname="Janne Karvonen">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>      
      <reference anchor="CONTRERAS" target="https://www.ietf.org/slides/slides-nemopsws-paper-rfc3535-years-later-an-update-of-operators-requirements-on-network-management-protocols-and-modelling-00.pdf">
        <front>
          <title>RFC 3535, 20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling</title>
          <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
            <organization/>
          </author>
          <author initials="LM." surname="Contreras" fullname="Luis Miguel Contreras Murillo">
            <organization/>
          </author>
          <author initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
            <organization/>
          </author>
          <author initials="T." surname="Graf" fullname="Thomas Graf">
            <organization/>
          </author>
          <author initials="R." surname="Rahman" fullname="Reshad Rahman">
            <organization/>
          </author>
          <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
            <organization/>
          </author>
          <date year="2024" month="October"/>
        </front>
      </reference>
      <reference anchor="GRAF" target="https://www.ietf.org/slides/slides-nemopsws-paper-agile-incremental-driven-development-for-network-management-01.pdf">
        <front>
          <title>Agile Incremental Driven Development for Network Management</title>
          <author initials="T." surname="Graf" fullname="Thomas Graf">
            <organization/>
          </author>
          <author initials="H." surname="Keller" fullname="Holger Keller">
            <organization/>
          </author>
          <author initials="D." surname="Voyer" fullname="Dan Voyer">
            <organization/>
          </author>
          <author initials="P." surname="Lucente" fullname="Paolo Lucente">
            <organization/>
          </author>
          <author initials="B." surname="Claise" fullname="Benoit Claise">
            <organization/>
          </author>
          <author initials="R." surname="Wilton" fullname="Rob Wilton">
            <organization/>
          </author>
          <author initials="A." surname="Huang-Feng" fullname="Alex Huang-Feng">
            <organization/>
          </author>
          <author initials="P." surname="Francois" fullname="Pierre Francois">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="CLAISE" target="https://www.ietf.org/slides/slides-nemopsws-paper-knowledge-graph-framework-for-network-operations-00.pdf">
        <front>
          <title>Knowledge Graph Framework for Network Operations</title>
          <author initials="B." surname="Claise" fullname="Benoit Claise">
            <organization/>
          </author>
          <author initials="T." surname="Graf" fullname="Thomas Graf">
            <organization/>
          </author>
          <author initials="H." surname="Keller" fullname="Holger Keller">
            <organization/>
          </author>
          <author initials="D." surname="Voyer" fullname="Dan Voyer">
            <organization/>
          </author>
          <author initials="P." surname="Lucente" fullname="Paolo Lucente">
            <organization/>
          </author>
          <author initials="D." surname="Lopez" fullname="Diego Lopez">
            <organization/>
          </author>
          <author initials="I. D." surname="Martinez-Casanueva" fullname="Ignacio Dominguez Martinez-Casanueva">
            <organization/>
          </author>
          <author initials="B." surname="Peters" fullname="Brad Peters">
            <organization/>
          </author>
          <author initials="P." surname="Fasano" fullname="Paolo Fasano">
            <organization/>
          </author>
          <author initials="P." surname="Ran" fullname="Pang Ran">
            <organization/>
          </author>
          <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
            <organization/>
          </author>
          <author initials="M." surname="Mackey" fullname="Michael Mackey">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="WATSEN" target="https://www.ietf.org/slides/slides-nemopsws-nemops-position-paper-kent-watsen-00.pdf">
        <front>
          <title>Four Thoughts for How to Improve Network Management for Operators</title>
          <author initials="K." surname="Watsen" fullname="Kent Watsen">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="WILTON" target="https://datatracker.ietf.org/doc/slides-nemopsws-paper-device-network-management-current-status-and-future-direction/">
        <front>
          <title>Device Network Management - Current Status, and Future Direction</title>
          <author initials="R." surname="Wilton" fullname="Rob Wilton">
            <organization/>
          </author>
          <author initials="N." surname="Corran" fullname="Nick Corran">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="GUDI" target="https://www.ietf.org/slides/slides-nemopsws-paper-evolving-network-management-architecture-integrating-coreconf-with-netconf-for-efficient-telemetry-and-management-00.pdf">
        <front>
          <title>Evolving Network Management Architecture: Integrating CORECONF with NETCONF for Efficient Telemetry and Management</title>
          <author initials="M." surname="Gudi" fullname="Manoj Gudi">
            <organization/>
          </author>
          <author initials="A." surname="Pelov" fullname="Alexander Pelov">
            <organization/>
          </author>
          <author initials="L." surname="Toutain" fullname="Laurent Toutain">
            <organization/>
          </author>
          <author initials="J. M." surname="Bonnin" fullname="Jean-Marie Bonnin">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="FOROUGHI" target="https://www.ietf.org/slides/slides-nemopsws-paper-projecting-data-mesh-to-model-driven-telemetry-a-path-to-data-ecosystems-management-operations-00.pdf">
        <front>
          <title>Projecting Data Mesh to Model-driven Telemetry: A Path to Data Ecosystem's Management Operations</title>
          <author initials="P." surname="Foroughi" fullname="Parisa Foroughi">
            <organization/>
          </author>
          <author initials="L." surname="Ciavaglia" fullname="Laurent Ciavaglia">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="MARTINEZ" target="https://www.ietf.org/slides/slides-nemopsws-paper-iab-nemops-position-paper-telefonica-00.pdf">
        <front>
          <title>IAB NEMOPS Position Paper - Telefonica</title>
          <author initials="I. D." surname="Martinez-Casanueva" fullname="Ignacio Dominguez Martinez-Casanueva">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="JIMENEZ-2" target="https://www.ietf.org/slides/slides-nemopsws-paper-managing-iot-devices-with-lwmm-00.pdf">
        <front>
          <title>Managing IoT Devices with LwM2M</title>
          <author initials="J." surname="Jiménez" fullname="Jaime Jiménez">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="GIRALT" target="https://www.ietf.org/slides/slides-nemopsws-paper-towards-a-unified-compute-and-communication-infrastructure-for-application-and-network-management-00.pdf">
        <front>
          <title>Towards a Unified Compute and Communication Infrastructure for Application and Network Management</title>
          <author initials="LM." surname="Contreras" fullname="Luis Miguel Contreras Murillo">
            <organization/>
          </author>
          <author initials="R." surname="Schott" fullname="Roland Schott">
            <organization/>
          </author>
          <author initials="S." surname="Randriamasy" fullname="Sabine Randriamasy">
            <organization/>
          </author>
          <author initials="R." surname="Yang" fullname="Richard Yang">
            <organization/>
          </author>
          <author initials="J." surname="Ros-Giralt" fullname="Jordi Ros-Giralt">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="ECKERT" target="https://www.ietf.org/slides/slides-nemopsws-paper-resilient-remote-managability-of-wide-area-network-infrastructures-00.pdf">
        <front>
          <title>Resilient Remote Manageability of Wide-Area Network Infrastructures</title>
          <author initials="T." surname="Eckert" fullname="Toerless Eckert">
            <organization/>
          </author>
          <author initials="M." surname="Richardson" fullname="Michael Richardson">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="BLESS" target="https://www.ietf.org/slides/slides-nemopsws-paper-an-invariant-for-future-resilient-network-management-operations-00.pdf">
        <front>
          <title>An Invariant for Future Resilient Network Management Operations</title>
          <author initials="R." surname="Bless" fullname="Roland Bless">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
      <reference anchor="SCHARF" target="https://www.ietf.org/slides/slides-nemopsws-paper-network-management-challenges-for-ip-based-cyber-physical-networks-00.pdf">
        <front>
          <title>Network Management Challenges for IP-based Cyber-Physical Networks</title>
          <author initials="M." surname="Scharf" fullname="Michael Scharf">
            <organization/>
          </author>
          <date year="2024" month="November"/>
        </front>
      </reference>
    </references>
    <?line 608?>

<section anchor="insights">
      <name>Operator Feedback</name>
      <t>This section compiles the operator feedback gathered through outreach and information gathering at various operational venues (RIPE, NANOG, APRICOT, LACNIC, AutoConn, etc.). The PC synthesized this input and presented it during the workshop (see <xref target="survey"/>).</t>
      <section anchor="general">
        <name>General</name>
        <ol spacing="normal" type="1"><li>
            <t>In network deployments, operations are typically at the bottom of the ladder. It's the most squeezed for time and resources. Network engineers are not typically seasoned developers. The development of needed in-house tools often takes years to develop. There is a need for tools that are easy to use and just work.</t>
          </li>
          <li>
            <t>The vast majority of smaller operators use CLI and open source to manage their networks.</t>
          </li>
          <li>
            <t>There is debate fatigue. The protocol/model debate is a recurring conversation. The problem isn't going away.</t>
          </li>
          <li>
            <t>It was suggested that other domains (e.g., Kubernetes (K8s) / automation) are years ahead of the current network engineering stack.</t>
          </li>
          <li>
            <t>Support for multiple friendly, stable, and feature-rich libraries for programming languages is needed. Many DevOps routines use shell scripts, while others use a high-level programming language. In any case, on the client side, multiple programming languages are used.</t>
          </li>
          <li>
            <t>Screen scraping is unfortunately necessary and painful. This most often occurs when interacting with a device that only has a CLI.</t>
          </li>
          <li>
            <t>It was noted that there could be an outreach to Academia to establish programs to teach lessons using modern management stacks, and then a new generation of engineers could help to improve tooling and automation, with university (and/or IETF) hackathons.</t>
          </li>
        </ol>
      </section>
      <section anchor="data-models">
        <name>Data Models</name>
        <ol spacing="normal" type="1"><li>
            <t>In some network deployments, the focus is solely on service-level models, such that device-level protocols and device-level models are unimportant. This assumes the existence of a device adaptation layer to transcode service-level models to device-level models and conform to the device-specific protocol.</t>
          </li>
          <li>
            <t>There is a need for solutions to not hide vendor-specific parameters. Currently, vendors compete by differentiating their offerings in unique ways. The reason why an operator may choose a particular vendor is because of its differentiating features. Whilst standard models enable conformance, they must not hide the vendor-specific parameters. YANG deviations are a partial solution to not hiding vendor knobs.</t>
          </li>
          <li>
            <t>It was emphasized that streaming telemetry requires picking a model and sticking with it. It is quite a commitment, and the current environment makes the decision harder.</t>
          </li>
          <li>
            <t>It was noted that IETF's focus should be on defining abstract/service-level data models since it is the only thing the community may ever agree on.</t>
          </li>
          <li>
            <t>It was noted that navigating standard models can be difficult. A network engineer knows the vendor CLI commands but has trouble locating the corresponding leaves in the standard YANG models defined by Standards Development Organizations (SDOs).</t>
          </li>
          <li>
            <t>There was a wish that the IETF and OpenConfig models would merge.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="recommendations">
      <name>Key Recommendations from Operator Feedback</name>
      <t>Various recommendations were made by the operators during the outreach events. The key ones presented during the workshop were (note that there were a lot more collected):</t>
      <ul spacing="normal">
        <li>
          <t>Everyone: Continue to focus on model-driven management as a means to achieve automation.</t>
        </li>
        <li>
          <t>SDOs: Re-introduce "running code" as part of the specification verification process.</t>
        </li>
        <li>
          <t>Operators: Be actively involved with the "running code" efforts.</t>
        </li>
        <li>
          <t>IETF: Recommend a solution stack for common use cases.</t>
        </li>
        <li>
          <t>Technology Ambassadors: Evangelize the recommended solution stack for common cases.</t>
        </li>
        <li>
          <t>Vendors: Support the recommended approach to the solution stack for common cases.</t>
        </li>
      </ul>
    </section>
    <section anchor="position-papers">
      <name>Position Papers</name>
      <t>20 position papers were submitted to the workshop call for papers. All papers are available at <eref brackets="angle" target="https://datatracker.ietf.org/group/nemopsws/materials/"/>.</t>
      <t>This is the list of all papers:</t>
      <ul spacing="normal">
        <li>
          <t>J.&nbsp;Schönwälder: Composable, Declarative, Reproducible, Verifiable Network and Service Configurations <xref target="SCHONWALDER"/></t>
        </li>
        <li>
          <t>K.&nbsp;Larsson, K.&nbsp;Lambrechts, and I.&nbsp;Farrer: RFC3535, 20 Years Later from an Operator's Perspective (Deutsche Telekom) <xref target="FARRER"/></t>
        </li>
        <li>
          <t>W.&nbsp;Hardaker: Lessons Learned from 30 Years of Net-SNMP <xref target="HARDAKER"/></t>
        </li>
        <li>
          <t>C.&nbsp;Bormann: CORECONF: Managing IoT Devices with YANG Models <xref target="BORMANN"/></t>
        </li>
        <li>
          <t>R.&nbsp;Shakir: Rethinking Standardisation of Network Management <xref target="SHAKIR"/></t>
        </li>
        <li>
          <t>N.&nbsp;Warnke, R.&nbsp;Geib, M.&nbsp;Horneffer, and H.&nbsp;Keller: NEMOPS: RFC3535 and the forgotten word - Or Provisioning is only a subset of Network Management <xref target="KELLER"/></t>
        </li>
        <li>
          <t>J.&nbsp;Jiménez, S.&nbsp;Mansfield, R.&nbsp;Rodriguez A., M.&nbsp;Pesonen, V.&nbsp;Torvinen, and J.&nbsp;Karvonen: Evolving Challenges and Solutions in Network Management <xref target="JIMENEZ"/></t>
        </li>
        <li>
          <t>M.&nbsp;Boucadair, LM.&nbsp;Contreras, O.&nbsp;Gonzalez de Dios, T.&nbsp;Graf, R.&nbsp;Rahman, and L.&nbsp;Tailhardat: RFC 3535, 20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling <xref target="CONTRERAS"/></t>
        </li>
        <li>
          <t>T.&nbsp;Graf, H.&nbsp;Keller, D.&nbsp;Voyer, P.&nbsp;Lucente, B.&nbsp;Claise, R.&nbsp;Wilton, A.&nbsp;Huang-Feng, and P.&nbsp;Francois: Agile Incremental Driven Development for Network Management <xref target="GRAF"/></t>
        </li>
        <li>
          <t>B.&nbsp;Claise, T.&nbsp;Graf, H.&nbsp;Keller, D.&nbsp;Voyer, P.&nbsp;Lucente, D.&nbsp;Lopez, I.&nbsp;D.&nbsp;Martinez-Casanueva, B.&nbsp;Peters, P.&nbsp;Fasano, P.&nbsp;Ran, W.&nbsp;Cheng, and M.&nbsp;Mackey: Knowledge Graph Framework for Network Operations <xref target="CLAISE"/></t>
        </li>
        <li>
          <t>K.&nbsp;Watsen: Four Thoughts for How to Improve Network Management for Operators <xref target="WATSEN"/></t>
        </li>
        <li>
          <t>R.&nbsp;Wilton and N.&nbsp;Corran: Device Network Management: Current Status and Future Direction <xref target="WILTON"/></t>
        </li>
        <li>
          <t>M.&nbsp;Gudi, A.&nbsp;Pelov, L.&nbsp;Toutain, and J.&nbsp;M.&nbsp;Bonnin: Evolving Network Management Architecture: Integrating CORECONF with NETCONF for Efficient Telemetry and Management <xref target="GUDI"/></t>
        </li>
        <li>
          <t>P.&nbsp;Foroughi and L.&nbsp;Ciavaglia: Projecting Data Mesh to Model-driven Telemetry: A Path to Data Ecosystem's Management Operations <xref target="FOROUGHI"/></t>
        </li>
        <li>
          <t>I.&nbsp;D.&nbsp;Martinez-Casanueva: IAB NEMOPS Position Paper - Telefonica <xref target="MARTINEZ"/></t>
        </li>
        <li>
          <t>J.&nbsp;Jiménez: Managing IoT Devices with LwM2M <xref target="JIMENEZ-2"/></t>
        </li>
        <li>
          <t>LM.&nbsp;Contreras, R.&nbsp;Schott, S.&nbsp;Randriamasy, R.&nbsp;Yang, and J.&nbsp;Ros-Giralt: Towards a Unified Compute and Communication Infrastructure for Application and Network Management <xref target="GIRALT"/></t>
        </li>
        <li>
          <t>T.&nbsp;Eckert and M.&nbsp;Richardson: Resilient Remote Manageability of Wide-Area Network Infrastructures <xref target="ECKERT"/></t>
        </li>
        <li>
          <t>R.&nbsp;Bless: An Invariant for Future Resilient Network Management Operations <xref target="BLESS"/></t>
        </li>
        <li>
          <t>M.&nbsp;Scharf: Network Management Challenges for IP-based Cyber-Physical Networks <xref target="SCHARF"/></t>
        </li>
      </ul>
    </section>
    <section anchor="workshop-participants">
      <name>Workshop Participants</name>
      <t>The workshop participants were <contact fullname="Alex Huang"/>, <contact fullname="Alexander Clemm"/>, <contact fullname="Alexander Pelov"/>, <contact fullname="Benoît Claise"/>, <contact fullname="Boris Khasanov"/>, <contact fullname="Brad Peters"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="Chongfeng Xie"/>, <contact fullname="Cindy Morgan"/>, <contact fullname="Dan Voyer"/>, <contact fullname="Darren Loher"/>, <contact fullname="Dean Bogdanovic"/>, <contact fullname="Dean Bogdanović"/>, <contact fullname="Dhruv Dhody"/>, <contact fullname="Diego Lopez"/>, <contact fullname="Ebben Aries"/>, <contact fullname="Frank (Chong Feng)"/>, <contact fullname="Holger Keller"/>, <contact fullname="Ian Farrer"/>, <contact fullname="Jaime Jimenez"/>, <contact fullname="James Cumming"/>, <contact fullname="Janne Karvonen"/>, <contact fullname="Jason Sterne"/>, <contact fullname="Jiaming Ye"/>, <contact fullname="Jinming Li"/>, <contact fullname="John Carson"/>, <contact fullname="Julien Maisonneuve"/>, <contact fullname="Jürgen Schönwälder"/>, <contact fullname="Kent Watsen"/>, <contact fullname="Kris Lambrechts"/>, <contact fullname="Kristian Larsson"/>, <contact fullname="Laurent Ciavaglia"/>, <contact fullname="Laurent Toutain"/>, <contact fullname="Liz Flynn"/>, <contact fullname="Luis M. Contreras"/>, <contact fullname="Mahesh Jethanandani"/>, <contact fullname="Manoj Gudi"/>, <contact fullname="Martin Horneffer"/>, <contact fullname="Matthew Bocci"/>, <contact fullname="Med Boucadair"/>, <contact fullname="Michael Mackey"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Michael Scharf"/>, <contact fullname="Mikko Pesonen"/>, <contact fullname="Nacho Dominguez"/>, <contact fullname="Naveen Achyuta"/>, <contact fullname="Nick Corran"/>, <contact fullname="Nils Warnke"/>, <contact fullname="Oscar Gonzalez de Dios"/>, <contact fullname="Paolo Lucente"/>, <contact fullname="Parisa Foroughi"/>, <contact fullname="Per Andersson"/>, <contact fullname="Phil Shafer"/>, <contact fullname="Qin Wu"/>, <contact fullname="Qiufang Ma"/>, <contact fullname="Raquel Rodriguez"/>, <contact fullname="Reshad Rahman"/>, <contact fullname="Rob Shakir"/>, <contact fullname="Rob Wilton"/>, <contact fullname="Roland Bless"/>, <contact fullname="Roland Schott"/>, <contact fullname="Rüdiger Geib"/>, <contact fullname="Rui Zhuang"/>, <contact fullname="Ruibo Han"/>, <contact fullname="Sabine Randriamasy"/>, <contact fullname="Scott Mansfield"/>, <contact fullname="Scott Robohn"/>, <contact fullname="Shengnan Yue"/>, <contact fullname="Suresh Krishnan"/>, <contact fullname="Thomas Graf"/>, <contact fullname="Toerless Eckert"/>, <contact fullname="Wangbo"/>, <contact fullname="Warren Kumari"/>, <contact fullname="Wes Hardaker"/>, <contact fullname="Wim Henderickx"/>, <contact fullname="Xue Yang"/>, <contact fullname="Y. Richard Yang"/>, <contact fullname="Yangbo"/>, <contact fullname="Yisong Liu"/>, and <contact fullname="Zhenqiang Li"/>.</t>
    </section>
    <section anchor="workshop-program-committee">
      <name>Workshop Program Committee</name>
      <t>The workshop program committee members were <contact fullname="Wes Hardaker"/> (co-chair), <contact fullname="Dhruv Dhody"/> (co-chair), <contact fullname="Qin Wu"/>, <contact fullname="Suresh Krishnan"/>, <contact fullname="Benoît Claise"/>, <contact fullname="Mohamed Boucadair"/>, <contact fullname="Mahesh Jethanandani"/>, <contact fullname="Kent Watsen"/>, and <contact fullname="Warren Kumari"/>.</t>
    </section>
    <section numbered="false" anchor="iab-members-at-the-time-of-approval">
      <name>IAB Members at the Time of Approval</name>
      <t>Internet Architecture Board members at the time this document was approved for publication were:</t>
      <ul spacing="normal">
        <li>
          <t><contact fullname="Matthew Bocci"/></t>
        </li>
        <li>
          <t><contact fullname="Roman Danyliw"/></t>
        </li>
        <li>
          <t><contact fullname="Dhruv Dhody"/></t>
        </li>
        <li>
          <t><contact fullname="Jana Iyengar"/></t>
        </li>
        <li>
          <t><contact fullname="Cullen Jennings"/></t>
        </li>
        <li>
          <t><contact fullname="Suresh Krishnan"/></t>
        </li>
        <li>
          <t><contact fullname="Mirja Kühlewind"/></t>
        </li>
        <li>
          <t><contact fullname="Warren Kumari"/></t>
        </li>
        <li>
          <t><contact fullname="Jason Livingood"/></t>
        </li>
        <li>
          <t><contact fullname="Mark Nottingham"/></t>
        </li>
        <li>
          <t><contact fullname="Tommy Pauly"/></t>
        </li>
        <li>
          <t><contact fullname="Alvaro Retana"/></t>
        </li>
        <li>
          <t><contact fullname="Qin Wu"/></t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to <contact fullname="Benoît Claise"/>, <contact fullname="Jürgen Schönwälder"/>, <contact fullname="Kristian Larsson"/>, <contact fullname="Jaime Jiménez"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Phil Shafer"/>, <contact fullname="Mirja Kühlewind"/>, and <contact fullname="Roman Danyliw"/> for helpful suggestions to improve this report.</t>
      <t>Thanks to <contact fullname="Alvaro Retana"/> for shepherding this document.</t>
    </section>
  </back>
 

</rfc>
