<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of RFC XXXX Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-02"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2023" month="November" day="30"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 162?>

<t>5G slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks. This feature covers slicing
   requirements for all mobile domains, including the Radio Access
   Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a basic RFC XXXX Network Slice realization model
   in IP/MPLS networks with a focus on the Transport Network fulfilling
   5G slicing connectivity requirements. This realization model reuses many building blocks currently commonly used
   in service provider networks.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please update "RFC XXXX Network Slice"  with the RFC number assigned to I-D.ietf-teas-ietf-network-slices.</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> defines a framework for
   network slicing in the context of networks built using IETF
   technologies.  The RFC XXXX network slicing framework introduces the
   concept of a Network Resource Partition (NRP), which is simply a
   collection of resources identified in the underlay network.  There
   could be multiple realizations of RFC XXXX Network Slice and
   NRP concepts, where each realization might be optimized for the
   different network slicing use cases.</t>
      <t>This document describes an RFC XXXX Network Slice realization model
   in IP/MPLS networks, using a single NRP and with a focus on
   fulfilling 5G slicing connectivity requirements.
   This realization model leverages many building blocks currently
   commonly used in service provider networks.</t>
      <t>This document focuses on the technical realization of RFC XXXX Network Slices. The realization is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Network Slice Service mapping considerations (e.g., mapping between 3GPP to IETF service parameters) are discussed in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>Note that 5G slicing can be implemented with or without Transport Network (TN) slicing. However, implementing TN slicing as part of 5G slicing allows operators to better control Service Level Agreements (SLAs). See <xref target="sec-5g"/>.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-intro"/> for readers' convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more
   details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-intro"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a Network Function (NF) instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a Wide Area Network (WAN) (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the RFC XXXX Network Slices apply.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─       
 ┌─────      5G RAN or CORE Network      ├────┐ 
 │    └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─     │ 
 │                                            │ 
 │                                            │ 
 ▼                                            ▼ 
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─   ┌──┐
│NF├──         Transport Network         ├──┤NF│
└──┘  └ ─ ┬ ─ ─ ─ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─ ┬   └──┘
          │                 │           │       
          │                 │           │       
          ▼                 ▼           ▼       
  ┌ ─ Data Center ─   ┌ MPLS VPN─   ┌ Public─   
                   │    Backbone │    Cloud  │  
  │   ┌───┐┌───┐     ┌┴─┐      ┌──┐┌┴─┐         
      └───┘└───┘   │ └──┘      └─┬┘└──┘      │  
  │┌──┐┌──┐┌──┐┌──┐  ┌┴─┐      ┌──┐ │           
   └──┘└──┘└──┘└──┘│ └──┘      └─┬┘          │  
  └ ─ ─ ─ ─ ─ ─ ─ ─   └ ─ ─ ─ ─ ─   └ ─ ─ ─ ─   
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. End-to-End 5G Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN Slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different options to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: Customer Sites and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site 1           │                     │       │      Site 2     
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the End-to-End 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt>Customer Sites:</dt>
          <dd>
            <t>A customer manages and deploys 5G Network Functions (RAN and CN) in Customer Sites. On top of 5G Network Functions (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, switches, or VPC Gateways) within a Customer Site. A Customer Site can be either a physical or a virtual location. Examples of Customer Sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within provider or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Orchestration of the TN within Customer Sites involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). The detail of these controllers is out of the scope of this document.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting Customer Sites. The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect Customer Sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G Network Functions (i.e., an element of 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)). This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a definition of CE/AC/PE that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of such a distribution is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed. An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters (e.g., the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies)). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although we may consider that the AC stitching logic happens internally within the CE device itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs), a CE may also connect to the provider network using MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8754"/>. The CE has awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). An example of such an AC is depicted in <xref target="_figure-51"/>. This is a source of confusion since these configurations are typically enforced on PEs. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │              
│                                     │               │
               │ ◀──────MP-BGP─────▶        
│          ┌────┐                  ┌──┴─┐             │
           │    │   MPLS-based AC  │    │              
│          │ CE ├ ─ ─ ─ ─ ─ ─ ─ ─ ─│ PE │             │
        ┏━━┻━━━━┻━━┓               │    │ 
│       ┃  VRF foo ┃               └──┬─┘             │
 ─ ─ ─ ─┗━ ━━━━━━━━┛                   ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>End-to-End 5G Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of an end-to-end 5G Slice with a zoom on TN parts. This framework helps to delimit the realization scope of RFC XXXX Network Slices and identify interactions that are required for the realization of such slices.</t>
          <ul empty="true">
            <li>
              <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
            </li>
          </ul>
          <t>In reference to <xref target="_figure-orch"/>, an end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating end-to-end 5G Slices. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G Slice spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <ul spacing="normal">
            <li>
              <t>Provider Network Orchestration domain: as defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>, the provider relies on an RFC XXXX Network Slice Controller (NSC) to manage and orchestrate RFC XXXX Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </li>
            <li>
              <t>Customer Site Orchestration domain: the Orchestration of TN elements of the Customer Sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this segment does not involve the Transport Network Orchestration.</t>
            </li>
          </ul>
          <t>A TN Slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <figure anchor="_figure-orch">
            <name>End-to-end 5G Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         │  5G NSO   │                          
                         +-----------+                          
                            │   │                               
                            │   │                               
                            v   │                               
              +---------------+ │                               
              │ 3GPP domains  │ │                               
  +-----------+ Orchestration +----------------------------+    
  │           │ (RAN and CN)  │ │                          │    
  │           +---------------+ │                          │    
  │                             │                          │    
  │    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━│━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   │    
  │      TN Orchestration       │                          │    
  │    ┃        ┌───────────────┼──────────────┐       ┃   │    
  │             v               v              v           │    
  │    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   │    
  │     │ Customer Site ││RFCXXXX NSC││ Customer Site │    │    
  │    ┃│ Orchestration ││           ││ Orchestration │┃   │    
  │     └──┬────────────┘└─────┬─────┘└──────────────┬┘    │    
  │    ┗ ━ │ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        v                   v                     v     │    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─│─ ─ 
  │                          Provider                      │   │
│ v           │       ┌─┴──┐ Network   ┌──┴─┐      ┌┴───┐  │    
 ┌──┐     ┌────┐  AC  │    │           │    │  AC  │ NF <──┘   │
││NF● ─ ─ ┤ CE ├ ─ ─ ─■ PE │           │ PE ■ ─ ─ ─●(CE)│       
 └──┘     └────┘      │    │           │    │      └────┘      │
│             │       └─┬──┘           └──┬─┘       │           
    Customer                                          Customer │
│     Site    │         │                 │         │   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC XXXX                          
                      ■────Network Slice───■                   
                                                                
     ●──────────────────TN Slice────────────────────●           
                                                                
]]></artwork>
          </figure>
          <ul empty="true">
            <li>
              <t>The various orchestration depicted in the figure encompass the 3GPP's Network Slice Subnet Management Function (NSSMF).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main types of segments that are shown in <xref target="fig-end-to-end"/>:</t>
          <ul spacing="normal">
            <li>
              <t>Customer Site: Either connects two NFs located in the same Customer Site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE. The realization of this segment is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration. The realization of this segment does not involve the Transport Network Orchestration.</t>
            </li>
            <li>
              <t>Provider Network: Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC XXXX NSC.</t>
            </li>
            <li>
              <t>Attachment Circuit: Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC XXXX NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </li>
          </ul>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an RFC XXXX Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new Network Slice may rely on a partial or full pre-provisioned segment (e.g., a new Network Slice may rely on an existing AC). The Customer Site segment is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the Customer Site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the Network Slice between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
      ├───────────────────────TN Slice─────────────┤            
                                                                
                        ○─────RFC XXXX ─────○                   
                        │   Network Slice   │                   
                        │                   │                   
                        │                   │                   
                        ▼                   ▼                   
      ○──CS───□ □───AC──○ □──────PN───────□ ○──AC──○            
  ┌ ─ ─ ─ ─ ─ ─           ┌ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ 
     Customer  │               Provider               Customer │
  │   Site 1              │    Network    │         │  Site 2   
               │        ┌────┐          ┌────┐                 │
  │┌───┐    ┌────┐  AC  │    │          │    │ AC ┌─┴─┐         
CS │NF1├────┤ CE ├──────┤ PE │          │ PE ├────┤NF3│        │
□ │└─┬─┘    └────┘      │    │          │    │    └─┬─┘         
│    │         │        └────┘          └────┘                 │
│ │  │                    │               │         │           
□  ┌─┴─┐       │                                               │
  ││NF2│                  │               │         │           
   └───┘       │                                               │
  └ ─ ─ ─ ─ ─ ─           └ ─ ─ ─ ─ ─ ─ ─ ┘         └ ─ ─ ─ ─ ─ 
                                                                
              □──────□  TN segments:                            
                          CS = Customer Segment                 
                          AC = Attachment Circuit               
                          PN = Provider Network
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC XXXX NSC).  More precisely, a PE and a CE connected via an AC must be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the RFC XXXX Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
    ┌ ─ ─ ─ ─ ─ ─ ─ ┐                ┌ ─ ─ ─ ─ ─ ─ ─ ─    
                                        RFCXXXX NSC   │   
    │ Customer Site │                │                    
      Orchestration    IETF APIs/DM    (Provider Network│   
    │               │ ◀────────────▶ │ Orchestration)     
     ─ ─ ─ ─ ─ ─ ─ ─                  ─ ─ ─ ─ ─ ─ ─ ─ ┘   
                │                        │                
                │                        │                
┌ ─ ─ ─ ─ ─ ─ ─ ┼ ┐                    ┌ ┼ ─ ─ ─ ─ ─ ─ ─ ┐
                ▼                        ▼                
│ ┌──┐      ┌──┐.1│    192.0.2.0/31    │.0┌──┐           │
  │NF├──────┤CE├──────────────────────────┤PE│            
│ └──┘      └──┘  │      VLAN 100      │  └──┘           │
     Customer                                Provider     
│      Site       │                    │     Network     │
 ─ ─ ─ ─ ─ ─ ─ ─ ─                      ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                          
               └─────────── AC ──────────┘                          
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Realization Schemes for RFC XXXX Network Slices</name>
        <t>There are multiple options for mapping a 5G Network Slice to RFC XXXX Network Slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
 A single 5G Network Slice can map to multiple RFC XXXX Network
 Slices (1 to N).  One example of such a case is the separation of
 the 5G Control Plane and User Plane: this use case is represented
 in <xref target="_figure-5"/> where a slice (eMBB) is deployed with a separation of
 User Plane and Control Plane at the TN.</t>
          </li>
          <li>
            <t>N to 1:
 Multiple 5G Network Slices may rely upon the same RFC XXXX Network
 Slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>N to M:
 The 5G to RFC XXXX Network Slice mapping combines both
 approaches with a mix of shared and dedicated associations.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC XXXX Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
. ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ .
|                                                               |
│                        5G Slice eMBB                          │
|                                                               |
│            . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ .            │
| .─────. N3 | . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ . | N3 .─────. |
│ │CU-UP├─────── RFC XXXX Network Slice UP_eMBB  ───────┤ UPF │ |
| '─────'    | ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ' |    '─────' |
│            |                                     |            |
| .─────. N2 | . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ . | N2 .─────. |
│ │CU-CP├───────   RFC XXXX Network Slice CP     ───────┤ AMF │ |
| '─────'    | ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ' |    '─────' |
' ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ '
             │                                     │
             │                                     │
             |         Transport Network           |
             │                                     │
             │                                     │
             ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ '
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC XXXX Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  .-------------.
                  |  Edge Cloud |
                  |             |
                  | .---------. |
                  | │UPF_URLLC│ |
                  | '-----+---' |
                  '-------│-----'
.---------------. .-------|----------------------.
|               | | .-----+--------------------. │ .--------------.
|   Cell Site   │ | |                          │ | |              |
|               | | │                          | │ │   Regional   |
| .-----------. │ │ |                          | | |     Cloud    |
| │CU-UP_URLLC+-----+                          | │ │ .----------. |
| '-----------' │ │ |    RFC XXXX Network      +-----+  5GC CP  │ |
|               | | │        Slice ALL         | │ │ '----------' |
| .-----------. | │                            | | | |            |
| │CU-UP_eMBB +-----+                          | | | .----------. |
│ '-----------' | | |                          +-----+ UPF_eMBB │ |
'---------------' | |                          | | | '----------' |
                  | '--------------------------' | |              |
                  |                              | '--------------'
                  |      Transport Network       |
                  '------------------------------'
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate few Network Slices and accommodate the need of few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize Network Slices (including the adjustment of slice services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="first-5g-slice-versus-subsequent-slices">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G Control Plane and User Plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and CU-CP must be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic compared with the subsequent slices. Referring to the example in <xref target="_figure-7"/>, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for Control and User Planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a User Plane Function (NF-UP2) together with a dedicated User Plane TN slice (INS-UP2). The Control Plane of the first 5G slice is also updated to integrate the second slice: the TN Slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2023), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="520" viewBox="0 0 520 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,176" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,416" fill="none" stroke="black"/>
                <path d="M 8,544 L 8,560" fill="none" stroke="black"/>
                <path d="M 72,64 L 72,96" fill="none" stroke="black"/>
                <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
                <path d="M 120,128 L 120,160" fill="none" stroke="black"/>
                <path d="M 120,400 L 120,432" fill="none" stroke="black"/>
                <path d="M 120,464 L 120,496" fill="none" stroke="black"/>
                <path d="M 128,576 L 128,608" fill="none" stroke="black"/>
                <path d="M 160,48 L 160,72" fill="none" stroke="black"/>
                <path d="M 160,88 L 160,136" fill="none" stroke="black"/>
                <path d="M 160,184 L 160,240" fill="none" stroke="black"/>
                <path d="M 160,384 L 160,408" fill="none" stroke="black"/>
                <path d="M 160,424 L 160,472" fill="none" stroke="black"/>
                <path d="M 160,488 L 160,560" fill="none" stroke="black"/>
                <path d="M 160,664 L 160,720" fill="none" stroke="black"/>
                <path d="M 176,64 L 176,96" fill="none" stroke="black"/>
                <path d="M 176,128 L 176,160" fill="none" stroke="black"/>
                <path d="M 176,400 L 176,432" fill="none" stroke="black"/>
                <path d="M 176,464 L 176,496" fill="none" stroke="black"/>
                <path d="M 176,576 L 176,608" fill="none" stroke="black"/>
                <path d="M 392,64 L 392,96" fill="none" stroke="black"/>
                <path d="M 392,128 L 392,160" fill="none" stroke="black"/>
                <path d="M 392,576 L 392,608" fill="none" stroke="black"/>
                <path d="M 408,184 L 408,240" fill="none" stroke="black"/>
                <path d="M 408,432 L 408,448" fill="none" stroke="black"/>
                <path d="M 408,664 L 408,720" fill="none" stroke="black"/>
                <path d="M 440,576 L 440,608" fill="none" stroke="black"/>
                <path d="M 448,64 L 448,96" fill="none" stroke="black"/>
                <path d="M 448,128 L 448,160" fill="none" stroke="black"/>
                <path d="M 496,128 L 496,160" fill="none" stroke="black"/>
                <path d="M 512,32 L 512,48" fill="none" stroke="black"/>
                <path d="M 512,368 L 512,384" fill="none" stroke="black"/>
                <path d="M 512,544 L 512,656" fill="none" stroke="black"/>
                <path d="M 8,32 L 512,32" fill="none" stroke="black"/>
                <path d="M 72,64 L 120,64" fill="none" stroke="black"/>
                <path d="M 176,64 L 392,64" fill="none" stroke="black"/>
                <path d="M 448,64 L 496,64" fill="none" stroke="black"/>
                <path d="M 120,80 L 176,80" fill="none" stroke="black"/>
                <path d="M 392,80 L 448,80" fill="none" stroke="black"/>
                <path d="M 72,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 176,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 448,96 L 496,96" fill="none" stroke="black"/>
                <path d="M 72,128 L 120,128" fill="none" stroke="black"/>
                <path d="M 176,128 L 392,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 496,128" fill="none" stroke="black"/>
                <path d="M 120,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 392,144 L 448,144" fill="none" stroke="black"/>
                <path d="M 72,160 L 120,160" fill="none" stroke="black"/>
                <path d="M 176,160 L 392,160" fill="none" stroke="black"/>
                <path d="M 448,160 L 496,160" fill="none" stroke="black"/>
                <path d="M 8,176 L 512,176" fill="none" stroke="black"/>
                <path d="M 8,368 L 512,368" fill="none" stroke="black"/>
                <path d="M 72,400 L 120,400" fill="none" stroke="black"/>
                <path d="M 176,400 L 392,400" fill="none" stroke="black"/>
                <path d="M 448,400 L 496,400" fill="none" stroke="black"/>
                <path d="M 120,416 L 176,416" fill="none" stroke="black"/>
                <path d="M 72,432 L 120,432" fill="none" stroke="black"/>
                <path d="M 176,432 L 392,432" fill="none" stroke="black"/>
                <path d="M 448,432 L 496,432" fill="none" stroke="black"/>
                <path d="M 72,464 L 120,464" fill="none" stroke="black"/>
                <path d="M 176,464 L 392,464" fill="none" stroke="black"/>
                <path d="M 448,464 L 496,464" fill="none" stroke="black"/>
                <path d="M 120,480 L 176,480" fill="none" stroke="black"/>
                <path d="M 72,496 L 120,496" fill="none" stroke="black"/>
                <path d="M 176,496 L 392,496" fill="none" stroke="black"/>
                <path d="M 448,496 L 496,496" fill="none" stroke="black"/>
                <path d="M 8,512 L 152,512" fill="none" stroke="black"/>
                <path d="M 168,512 L 512,512" fill="none" stroke="black"/>
                <path d="M 8,544 L 152,544" fill="none" stroke="black"/>
                <path d="M 168,544 L 512,544" fill="none" stroke="black"/>
                <path d="M 72,576 L 128,576" fill="none" stroke="black"/>
                <path d="M 176,576 L 392,576" fill="none" stroke="black"/>
                <path d="M 440,576 L 496,576" fill="none" stroke="black"/>
                <path d="M 128,592 L 176,592" fill="none" stroke="black"/>
                <path d="M 392,592 L 440,592" fill="none" stroke="black"/>
                <path d="M 72,608 L 128,608" fill="none" stroke="black"/>
                <path d="M 176,608 L 392,608" fill="none" stroke="black"/>
                <path d="M 440,608 L 496,608" fill="none" stroke="black"/>
                <path d="M 8,656 L 512,656" fill="none" stroke="black"/>
                <path d="M 268,312 L 276,328" fill="none" stroke="black"/>
                <path d="M 276,328 L 284,344" fill="none" stroke="black"/>
                <path d="M 292,344 L 300,328" fill="none" stroke="black"/>
                <path d="M 300,328 L 308,312" fill="none" stroke="black"/>
                <g class="text">
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="404" y="52">─.</text>
                  <text x="32" y="68">1</text>
                  <text x="408" y="68">│</text>
                  <text x="512" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="96" y="84">NF-CP</text>
                  <text x="204" y="84">CP</text>
                  <text x="228" y="84">TN</text>
                  <text x="264" y="84">Slice</text>
                  <text x="324" y="84">(INS-CP)</text>
                  <text x="476" y="84">NF-CP│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="408" y="100">│</text>
                  <text x="512" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="408" y="116">|</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="408" y="132">│</text>
                  <text x="512" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="92" y="148">│NF-UP</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(INS-UP1)</text>
                  <text x="472" y="148">NF-UP</text>
                  <text x="512" y="148">|</text>
                  <text x="160" y="164">|</text>
                  <text x="408" y="164">|</text>
                  <text x="512" y="164">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="276" y="308">─┘</text>
                  <text x="300" y="308">└─</text>
                  <text x="288" y="356">V</text>
                  <text x="176" y="388">─</text>
                  <text x="192" y="388">─</text>
                  <text x="208" y="388">─</text>
                  <text x="224" y="388">─</text>
                  <text x="240" y="388">─</text>
                  <text x="256" y="388">─</text>
                  <text x="272" y="388">─</text>
                  <text x="288" y="388">─</text>
                  <text x="304" y="388">─</text>
                  <text x="320" y="388">─</text>
                  <text x="336" y="388">─</text>
                  <text x="352" y="388">─</text>
                  <text x="368" y="388">─</text>
                  <text x="384" y="388">─</text>
                  <text x="404" y="388">─.</text>
                  <text x="32" y="404">1</text>
                  <text x="408" y="404">│</text>
                  <text x="512" y="404">│</text>
                  <text x="32" y="420">s</text>
                  <text x="48" y="420">S</text>
                  <text x="92" y="420">│NF-CP</text>
                  <text x="204" y="420">CP</text>
                  <text x="228" y="420">TN</text>
                  <text x="264" y="420">Slice</text>
                  <text x="324" y="420">(INS-CP)</text>
                  <text x="444" y="420">├──────┤NF-CP│</text>
                  <text x="512" y="420">|</text>
                  <text x="8" y="436">│</text>
                  <text x="32" y="436">t</text>
                  <text x="48" y="436">l</text>
                  <text x="512" y="436">│</text>
                  <text x="8" y="452">|</text>
                  <text x="48" y="452">i</text>
                  <text x="512" y="452">|</text>
                  <text x="8" y="468">│</text>
                  <text x="32" y="468">5</text>
                  <text x="48" y="468">c</text>
                  <text x="408" y="468">│</text>
                  <text x="512" y="468">│</text>
                  <text x="8" y="484">|</text>
                  <text x="32" y="484">G</text>
                  <text x="48" y="484">e</text>
                  <text x="92" y="484">│NF-UP</text>
                  <text x="204" y="484">UP</text>
                  <text x="228" y="484">TN</text>
                  <text x="264" y="484">Slice</text>
                  <text x="328" y="484">(INS-UP1)</text>
                  <text x="444" y="484">├──────┤NF-UP│</text>
                  <text x="512" y="484">|</text>
                  <text x="8" y="500">│</text>
                  <text x="408" y="500">│</text>
                  <text x="512" y="500">│</text>
                  <text x="408" y="532">|</text>
                  <text x="32" y="564">2</text>
                  <text x="408" y="564">│</text>
                  <text x="8" y="580">│</text>
                  <text x="32" y="580">n</text>
                  <text x="48" y="580">S</text>
                  <text x="160" y="580">│</text>
                  <text x="408" y="580">|</text>
                  <text x="8" y="596">|</text>
                  <text x="32" y="596">d</text>
                  <text x="48" y="596">l</text>
                  <text x="96" y="596">│NF-UP2</text>
                  <text x="204" y="596">UP</text>
                  <text x="228" y="596">TN</text>
                  <text x="264" y="596">Slice</text>
                  <text x="328" y="596">(INS-UP2)</text>
                  <text x="472" y="596">NF-UP2│</text>
                  <text x="8" y="612">│</text>
                  <text x="48" y="612">i</text>
                  <text x="160" y="612">│</text>
                  <text x="408" y="612">|</text>
                  <text x="8" y="628">|</text>
                  <text x="32" y="628">5</text>
                  <text x="48" y="628">c</text>
                  <text x="160" y="628">|</text>
                  <text x="408" y="628">│</text>
                  <text x="8" y="644">│</text>
                  <text x="32" y="644">G</text>
                  <text x="48" y="644">e</text>
                  <text x="160" y="644">│</text>
                  <text x="408" y="644">|</text>
                  <text x="248" y="692">Transport</text>
                  <text x="320" y="692">Network</text>
                  <text x="176" y="724">─</text>
                  <text x="192" y="724">─</text>
                  <text x="208" y="724">─</text>
                  <text x="224" y="724">─</text>
                  <text x="240" y="724">─</text>
                  <text x="256" y="724">─</text>
                  <text x="272" y="724">─</text>
                  <text x="288" y="724">─</text>
                  <text x="304" y="724">─</text>
                  <text x="320" y="724">─</text>
                  <text x="336" y="724">─</text>
                  <text x="352" y="724">─</text>
                  <text x="368" y="724">─</text>
                  <text x="384" y="724">─</text>
                  <text x="400" y="724">─</text>
                  <text x="76" y="740">Deployment</text>
                  <text x="132" y="740">of</text>
                  <text x="188" y="740">subsequent</text>
                  <text x="244" y="740">5G</text>
                  <text x="280" y="740">slice</text>
                  <text x="324" y="740">with</text>
                  <text x="372" y="740">shared</text>
                  <text x="432" y="740">Control</text>
                  <text x="488" y="740">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   .--------------------------------------------------------------.
   |                  . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─.            |
   |  1    .-----.    | .--------------------------. │    .-----. │
   |  s S  |NF-CP+------+  CP TN Slice (INS-CP)    +------+NF-CP│
   |  t l  '-----'    | '--------------------------' │    '-----' │
   |    i             |                              |
   |  5 c  .-----.    | .--------------------------. │    .-----. │
   |  G e  │NF-UP+------+  UP TN Slice (INS-UP1)   +------+NF-UP| |
   |       '-----'    | '--------------------------' |    '-----' │
   '--------------------------------------------------------------'
                      |                              |
                      |      Transport Network       |
                      |                              |
                      ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─'
                         Deployment of first 5G slice
                                     │ │
                                     │ │
                                    ─┘ └─
                                    ╲   ╱
                                     ╲ ╱
                                      V
   .--------------------------------------------------------------.
   |                  . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─.            |
   |  1    .-----.    | .--------------------------. │    .-----. │
   |  s S  │NF-CP+------+  CP TN Slice (INS-CP)    ├──────┤NF-CP│ |
   │  t l  '-----'    | '--------------------------' |    '-----' │
   |    i             |                              |            |
   │  5 c  .-----.    | .--------------------------. │    .-----. │
   |  G e  │NF-UP+------+  UP TN Slice (INS-UP1)   ├──────┤NF-UP│ |
   │       '-----'    | '--------------------------' │    '-----' │
   '------------------|-------------------------------------------'
                      |                              |
   .------------------|-------------------------------------------.
   |  2               |                              │            |
   │  n S  .------.   │ .--------------------------. |   .------. |
   |  d l  │NF-UP2+-----+  UP TN Slice (INS-UP2)   +-----+NF-UP2│ |
   │    i  '------'   │ '--------------------------' |   '------' |
   |  5 c             |                              │            |
   │  G e             │                              |            |
   '--------------------------------------------------------------'
                      |                              |
                      |      Transport Network       |
                      |                              |
                      ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─'
       Deployment of subsequent 5G slice with shared Control Plane
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
    </section>
    <section anchor="sec-over-rea-model">
      <name>Overview of the Realization Model</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> introduces the concept of the
   Network Resource Partition (NRP), which is defined as a collection of
   resources identified in the underlay network.  In the basic
   realization model described in this document, depicted in <xref target="_figure-high-level-qos"/>, a single NRP is used
   with the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation:  </t>
          <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
        </li>
        <li>
          <t>Fine-grained resource control at the PE:  </t>
          <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
          <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
          <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
        </li>
        <li>
          <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
        </li>
        <li>
          <t>Capacity planning/management for efficient usage of provider network resources:  </t>
          <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
        </li>
      </ul>
      <figure anchor="_figure-high-level-qos">
        <name>Resource Allocation Slicing Model with a Single NRP</name>
        <artwork align="center"><![CDATA[
        ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐        
  ┌──────────┐               base NRP               ┌──────────┐   
  │    PE    │                                      │    PE    │   
┌ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─  
  ■◀───┐│    │       RFC XXXX Network Slice 1       │    ┌┼───▶■ │ 
│ │    │     │        ┌─────┐        ┌─────┐        │    │     │   
  ■◀───┤│    │        │  P  │        │  P  │        │    ├┼───▶■ │ 
├ ┼ ─ ─├────▶□◀──────▶□◀───▶□◀──────▶□────▶□◀──────▶□◀───┤─ ─ ─│─  
  ■◀───┤│    │        │     │        │     │        │    ├┼───▶■ │ 
│ │    │     │        └─────┘        └─────┘        │    │     │   
  ■◀───┘│    │       RFC XXXX Network Slice 2       │    └┼───▶■ │ 
└ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─  
  │     │    │                                      │     │    │   
  └──────────┘                                      └──────────┘   
        └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘        
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices         
]]></artwork>
      </figure>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification.  The S-NSSAI is not visible to the transport domain.
   So instead, 5G functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). More details about the mapping
   between 3GPP and RFC XXXX Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC XXXX Network Slice, fulfilling connectivity
   requirements between NFs of some 5G slice, is represented at the Service Demarcation Point (SDP)
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.  Each VLAN
   represents a distinct logical interface on the attachment circuits,
   hence it provides the possibility to place these logical interfaces
   in distinct L2 or L3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP
   based interfaces (the only exception could be the F2 fronthaul-
   interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to RFC XXXX Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple from
   the NF point of view, it adds complexity due to the requirement of maintaining
   mapping tables for each SDP and requires a configuration task of new VLAN and
   IP subnet for every slice on every attachment circuit.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           │     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      │             │           
           │                        │     │             │           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
│      ●───────●■    │          │    ■●───────●     ●───────●      │
│ NF   ●───────●■ PE │          │ PE ■●───────●L2/L3●───────●   NF │
│      ●───────●■    │          │    ■●───────●     ●───────●      │
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    │                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="ip-hand-off">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAI to IP addresses makes IP addresses an identifier for eventual
   policy decisions in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (for example, IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case, there is no logical interface representing
   a slice on the PE, hence all slices are handled within single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAI, a mapping table similar to
   the VLAN Hand-off solution must be utilized <xref target="sec-vlan-handoff"/>.</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary. Alternatively,
   instead of using 2 full octets from the 8 octets in an IPv6 address, a provider
   could build a mapping table that uses only one octet or parts of an octet to
   represent utilized S-NSSAI. This mapping is a local allocation method to
   allocate IPv6 addresses to NF in order to be representative of the S-NSSAI without
   redefining IPv6 semantics. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Different IPv6 address allocation
   schemes following this approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
        <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary
   TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>One benefit of embedding the S-NSSAI in the IPv6 address is that specific S-NSSAI
   can be identified as interesting at any place in the TN domain. This might be used,
   for example, to selectively enable per S-NSSAI monitoring, traffic engineering or any
   other per S-NSSAI handling, if required.</t>
        <t>However, operators using such mapping method should be aware of the implications
   of any change of S-NSSAI on the addressing plans. It is out of scope of this document
   to elaborate on these implications.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI Embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information, while the least
   significant 32 bits are used to embed the S-NSSAI information. The 96-bit part of the
   address may then be engineered/architected by the provider, for example, on the
   geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. NF-A has a set of tunnel termination points, with unique per-slice IP addresses
   allocated from the 2001:db8:a:0::/96 prefix, while NF-B uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: customer A eMBB (SST=01, SD=00001) and customer B MIoT (SST=03, SD=00003).
   Therefore, for customer A eMBB the tunnel IP addresses are auto-derived (without the need
   for an explicit mapping table) as the IP's {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} are used as the last two octets, and for customer B MIoT (SST=3,
   SD=00003) tunnel uses the IP's {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in IPv6 addresses as per <xref target="RFC5952"/>.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
          <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘ MIoT (SST=3)            │     
     │                                                        │     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Option A (<xref target="sec-10a"/>):</dt>
              <dd>
                <t>VRF-to-VRF connections.</t>
              </dd>
            </dl>
          </li>
          <li>
            <t>Option B (<xref target="sec-10b"/>):
     : redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </li>
          <li>
            <dl>
              <dt>Option C (<xref target="sec-10c"/>):</dt>
              <dd>
                <t>redistribution of labeled VPN routes without next-hop
change and redistribution of labeled transport routes with next-hop
change at domain boundaries.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE must be able to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node must carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off: Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast must be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the attachment circuit there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the attachment circuit with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs must program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE must be able to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC XXXX Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC XXXX Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to a NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC XXXX Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC XXXX
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC XXXX Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC XXXX Network Slice)       RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN CoS
   marking, per-hop behavior for all RFC XXXX Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 <xref target="RFC8754"/> provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC XXXX Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to RFC XXXX NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, which meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, must not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   must be rejected by the RFC XXXX NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
X ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
X ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
X ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
X ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
X ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
X ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
X ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
X ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC XXXX Network Slice)        RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC XXXX Network Slices is executed on provider network transit links.  Provider network
   transit routers do not evaluate original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In 5QI-aware model, compared to 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC XXXX Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each RFC XXXX
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, must not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   must not exceed the physical capacity of the attachment circuit.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-planes-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator might define various tunnel groups, where each
   tunnel group is created with specific optimization criteria and
   constraints.  This document refers to such tunnel groups as
   'transport planes'.  For example, a transport plane "A" might represent
   tunnels optimized for latency, and transport plane "B" might represent tunnels optimized for high capacity.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes.  These transport planes might be realized via various IP/MPLS
   techniques, for example Flex-Algo or RSVP/SR traffic engineering
   tunnels with or without PCE, and with or without bandwidth
   reservations.</t>
      <t><xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there could be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   X ┃│  └──────────┘ │┃   │
   X ┃   ┌──────────┐  ┃   │                     │
   X ┃│  │ 5G QoS B ├──────┤
   X ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   X ┃   └──────────┘  ┃   │    │    │         │
   X ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   X ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   X ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   transport controller with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The transport controller has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC XXXX NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G Slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G Slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G Slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC XXXX NSC.  The RFC XXXX
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC XXXX NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC XXXX NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo, a particular set of TE LSPs, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="I-D.ietf-teas-rfc3272bis"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="RFC9350"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE or SR-TE LSPs with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the transport controller, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The transport controller needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the transport controller to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   transport controller may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   transport controller can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  </t>
          <t>
SFC OAM <xref target="RFC9451"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="RFC9516"/>.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
must be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>RFC XXXX Network Slices considerations are discussed in <xref section="6" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slices"/>.</t>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
      <t>Adequate admission control policies should be configured in the edge of the provider network to control access to specific slice resources. Likewise, access to classification and mapping tables must be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices must check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-teas-ietf-network-slices">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma" initials="S." surname="Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="14" month="September" year="2023"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" to describe this type of network slice, and establishes the
   general principles of network slicing in the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-25"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="27" month="November" year="2023"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="November" year="2023"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-02"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the IETF Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-08"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="I-D.henry-tsvwg-diffserv-to-qci">
          <front>
            <title>Diffserv to QCI Mapping</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Szigeti" initials="T." surname="Szigeti">
              <organization>Cisco</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="April" year="2020"/>
            <abstract>
              <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-henry-tsvwg-diffserv-to-qci-04"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc3272bis">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <date day="12" month="August" year="2023"/>
            <abstract>
              <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-27"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9451">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document clarifies an ambiguity in the Network Service Header (NSH) specification related to the handling of O bit. In particular, this document clarifies the meaning of "OAM packet".</t>
              <t>This document updates RFC 8300.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9451"/>
          <seriesInfo name="DOI" value="10.17487/RFC9451"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC9516">
          <front>
            <title>Active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC)</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="W. Meng" initials="W." surname="Meng"/>
            <author fullname="T. Ao" initials="T." surname="Ao"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <author fullname="K. Leung" initials="K." surname="Leung"/>
            <author fullname="G. Mishra" initials="G." surname="Mishra"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>A set of requirements for active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC) in a network is presented in this document. Based on these requirements, an encapsulation of active OAM messages in SFC and a mechanism to detect and localize defects are described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9516"/>
          <seriesInfo name="DOI" value="10.17487/RFC9516"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2350?>

<section anchor="open-issues-resolution">
      <name>Open Issues &amp; Resolution</name>
      <t>The following issues should be resolved prior to the WGLC:</t>
      <ol spacing="normal" type="1"><li>
          <t>Assess which/whether some of the material in the "5G Slice to RFC XXXX Network Slice Mapping" Section should be maintained in this draft or moved to <xref target="I-D.ietf-teas-5g-network-slice-application"/> (Adrian)
          </t>
          <ul spacing="normal">
            <li>
              <t>This issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/40.</t>
            </li>
            <li>
              <t>Update: The outcome of the discussion with the authors of the application I-D can be seen at: https://mailarchive.ietf.org/arch/msg/teas/4QifnnGAcnQcCTXRLSJtQ1SArLA/.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Assess whether we need to maintain the "First 5G Slice vs Subsequent Slices" Section:
          </t>
          <ul spacing="normal">
            <li>
              <t>Unless we explain how this ss important for realization, this section should be deleted (Med)</t>
            </li>
            <li>
              <t>The motivation of this section is not clear (from Reza)</t>
            </li>
            <li>
              <t>Need to describe the implications to the realization of RFC XXXX Network Slices (Jie)</t>
            </li>
            <li>
              <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/19</t>
            </li>
            <li>
              <t>Update: The fix can be seen at https://mailarchive.ietf.org/arch/msg/teas/wADS6r8syhPsYl9rgZYjVE4Ii9U/</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Clarify the use of inter-AS option B/C to model the AC between CE and PE (Jie)
          </t>
          <ul spacing="normal">
            <li>
              <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/52</t>
            </li>
            <li>
              <t>Update: The fix can be seen at https://mailarchive.ietf.org/arch/msg/teas/bBSAY7-GBJsECCrkgfrrrvoKGgM/.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Further discuss whether the TN slice in the customer site is covered or is out of the scope of RFC XXXX Network Slice (Jie)
          </t>
          <ul spacing="normal">
            <li>
              <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/53</t>
            </li>
            <li>
              <t>Update: The fix can be seen at https://mailarchive.ietf.org/arch/msg/teas/WtZF8AFnubcVUYBxcn7i8COozC0/.</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>Active issues can be tracked at: https://github.com/boucadair/5g-slice-realization/issues</t>
    </section>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-intro">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Jie Dong, Greg Mirsky, Rüdiger Geib, and Nicklous D. Morris for
   their review of this document and for providing valuable comments.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>jdrake@juniper.net</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amit.dhamija@rakuten.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
