<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-04"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="March" day="20"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 169?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN).  The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control Service Level Agreements (SLAs) offered for 5G slices.</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies.</t>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Network Slice Service mapping considerations (e.g., mapping between 3GPP to IETF service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a NF instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the RFC 9543 Network Slices apply.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─       
 ┌─────      5G RAN or CORE Network      ├────┐ 
 │    └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─     │ 
 │                                            │ 
 │                                            │ 
 ▼                                            ▼ 
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─   ┌──┐
│NF├──         Transport Network         ├──┤NF│
└──┘  └ ─ ┬ ─ ─ ─ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─ ┬   └──┘
          │                 │           │       
          │                 │           │       
          ▼                 ▼           ▼       
  ┌ ─ Data Center ─   ┌ MPLS VPN─   ┌ Public─   
                   │    Backbone │    Cloud  │  
  │   ┌───┐┌───┐     ┌┴─┐      ┌──┐┌┴─┐         
      └───┘└───┘   │ └──┘      └─┬┘└──┘      │  
  │┌──┐┌──┐┌──┐┌──┐  ┌┴─┐      ┌──┐ │           
   └──┘└──┘└──┘└──┘│ └──┘      └─┬┘          │  
  └ ─ ─ ─ ─ ─ ─ ─ ─   └ ─ ─ ─ ─ ─   └ ─ ─ ─ ─   
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. End-to-End 5G Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created (called, 5G Network Slices), with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different options to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: customer site and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site 1           │                     │       │      Site 2     
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt>customer site:</dt>
          <dd>
            <t>A customer manages and deploys 5G NFs (RAN and CN) in customer sites. On top of 5G NFs (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, or switches) within a customer site. A customer site can be either a physical or a virtual location. Examples of customer sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within the provider network or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of the scope of this document to document how these controllers are implemented.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting customer sites.</t>
          </dd>
          <dt/>
          <dd>
            <t>The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a CE/AC/PE definition that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. For example, the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs), a CE may also connect to the provider network using MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). An example of such an AC is depicted in <xref target="_figure-51"/>. This is a source of confusion since these configurations are typically enforced on PEs. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                                       
│                                     │               │
               │  ◀─────MP-BGP─────▶                   
│           ┌────┐                  ┌─┴──┐            │
            │    │   MPLS-based AC  │    │             
│           │ CE ├──────────────────│ PE │            │
         ┏━━┻━━━━┻━━┓               │    │             
│        ┃ VRF foo  ┃               └─┬──┘            │
 ─ ─ ─ ─ ┻━━━━━━━━━━┛                  ─ ─ ─ ─ ─ ─ ─ ─ 
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>End-to-End 5G Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of an end-to-end 5G slice with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <ul empty="true">
            <li>
              <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
            </li>
          </ul>
          <t>In reference to <xref target="_figure-orch"/>, an end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating end-to-end 5G slices. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G slice spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this segment does not involve the Transport Network Orchestration.</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <figure anchor="_figure-orch">
            <name>End-to-end 5G Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         │  5G NSO   │                          
                         └───────────┘                          
                            │   │                               
                            │   │                               
                            ▼   │                               
              ┌───────────────┐ │                               
              │ 3GPP domains  │ │                               
  ┌───────────│ Orchestration │────────────────────────────┐    
  │           │ (RAN and CN)  │ │                          │    
  │           └───────────────┘ │                          │    
  │                             │                          │    
  │    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━│━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   │    
  │     TN Orchestration        │                          │    
  │    ┃        ┌───────────────┼──────────────┐       ┃   │    
  │             ▼               ▼              ▼           │    
  │    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   │    
  │     │ Customer Site ││RFCXXXX NSC││ Customer Site │    │    
  │    ┃│ Orchestration ││           ││ Orchestration │┃   │    
  │     └──┬────────────┘└─────┬─────┘└──────────────┬┘    │    
  │    ┗ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        ▼                   ▼                     ▼     │    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─│─ ─ 
  │                          Provider                      │   │
│ ▼           │       ┌─┴──┐  Network  ┌──┴─┐      ┌┴───┐  │    
 ┌──┐     ┌────┐  AC  │    │           │    │  AC  │ NF │◀─┘   │
││NF◍ ─ ─ ┤ CE ├ ─ ─ ─■ PE │           │ PE ■ ─ ─ ─◍(CE)│       
 └──┘     └────┘      │    │           │    │      └────┘      │
│             │       └─┬──┘           └──┬─┘       │           
   Customer                                           Customer │
│    Site     │         │                 │         │   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC XXXX                          
                      ■─────Network Slice───■                   
                                                                
    ◍───────────────────TN Slice───────────────────◍                  
                                                                
]]></artwork>
          </figure>
          <ul empty="true">
            <li>
              <t>The various orchestration depicted in the figure encompass the 3GPP's Network Slice Subnet Management Function (NSSMF).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main types of segments that are shown in <xref target="fig-end-to-end"/>.</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects two NFs located in the same customer site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration. The realization of this segment does not involve the Transport Network Orchestration.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC 9543 NSC.</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC 9543 NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
          </dl>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an RFC 9543 Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new Network Slice may rely on a partial or full pre-provisioned segment (e.g., a new Network Slice may rely on an existing AC). The customer site segment is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the customer site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the Network Slice between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
      ├───────────────────────TN Slice─────────────┤            
                                                                
                        ○─────RFC XXXX ─────○                   
                        │   Network Slice   │                   
                        │                   │                   
                        │                   │                   
                        ▼                   ▼                   
      ○──CS───□ □───AC──○ □──────PN───────□ ○──AC──○            
  ┌ ─ ─ ─ ─ ─ ─           ┌ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ 
     Customer  │               Provider               Customer │
  │   Site 1              │    Network    │         │  Site 2   
               │        ┌────┐          ┌────┐                 │
  │┌───┐    ┌────┐  AC  │    │          │    │ AC ┌─┴─┐         
CS │NF1├────┤ CE ├──────┤ PE │          │ PE ├────┤NF3│        │
□ │└─┬─┘    └────┘      │    │          │    │    └─┬─┘         
│    │         │        └────┘          └────┘                 │
│ │  │                    │               │         │           
□  ┌─┴─┐       │                                               │
  ││NF2│                  │               │         │           
   └───┘       │                                               │
  └ ─ ─ ─ ─ ─ ─           └ ─ ─ ─ ─ ─ ─ ─ ┘         └ ─ ─ ─ ─ ─ 
                                                                
              □──────□  TN segments:                            
                          CS = Customer Segment                 
                          AC = Attachment Circuit               
                          PN = Provider Network
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC 9543 NSC).  More precisely, a PE and a CE connected via an AC need to be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the RFC 9543 Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ┐                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                          RFCXXXX NSC    │
  │ Customer Site │                   │                   
    Orchestration      IETF APIs/DM    (Provider Network │
  │               │◀─────────────────▶│  Orchestration)   
   ─ ─ ─ ─ ─ ─ ─ ─                     ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
                │                        │                
                │                        │                
┌ ─ ─ ─ ─ ─ ─ ─ ┼ ┐                    ┌ ┼ ─ ─ ─ ─ ─ ─ ─ ┐
                ▼                        ▼                
│ ┌──┐      ┌──┐.1│    192.0.2.0/31    │.0┌──┐           │
  │NF├──────┤CE├──────────────────────────┤PE│            
│ └──┘      └──┘  │      VLAN 100      │  └──┘           │
     Customer                                Provider     
│      Site       │                    │     Network     │
 ─ ─ ─ ─ ─ ─ ─ ─ ─                      ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                          
               └─────────── AC ──────────┘                                     
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping Schemes Between 5G Network Slices and Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G Control Plane and User Plane in TN slices for a single 5G eMBB network slice. It is important to note that this mapping can serve as an interim step to N:M mapping. In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G network slices (e.g., the Control Plane TN slice is shared by multiple 5G network Slices). Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.</t>
          </li>
        </ul>
        <t>In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                                                                 
│                        5G Slice eMBB                          │
                                                                 
│            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            │
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐  
│ │CU-UP├─────── RFC XXXX Network Slice UP_eMBB  ───────┤ UPF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
│            │                                     │            │
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐  
│ │CU-CP├───────    RFC XXXX Network Slice CP    ───────┤ AMF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
└ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ┘
                                                                 
             │                                     │             
                       Transport Network                         
             │                                     │             
                                                                 
             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘             
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐                                  
                     Edge Cloud                                    
                  │             │                                  
                    ┌─────────┐                                    
                  │ │UPF_URLLC│ │                                  
                    └─────┬───┘                                    
                  └ ─ ─ ─ │ ─ ─ ┘                                  
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ │ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  │ ┌ ─ ─ ─ ─ ─ ─ ─ 
│   Cell Site   │ │                            │                  │
                    │                            │ │   Regional    
│ ┌───────────┐ │ │                            │         Cloud    │
  │CU-UP_URLLC├─────┤                            │ │ ┌──────────┐  
│ └───────────┘ │ │       RFC XXXX Network     ├─────┤  5GC CP  │ │
                    │        Slice ALL           │ │ └──────────┘  
│ ┌───────────┐ │ │                            │                  │
  │CU-UP_eMBB ├─────┤                            │ │ ┌──────────┐  
│ └───────────┘ │ │                            ├─────┤ UPF_eMBB │ │
 ─ ─ ─ ─ ─ ─ ─ ─    │                            │ │ └──────────┘  
                  │  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  │
                                                 │ └ ─ ─ ─ ─ ─ ─ ─ 
                  │      Transport Network                         
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                 
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize Network Slices (including the adjustment of slice services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G Control Plane and User Plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and CU-CP need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Referring to the example in <xref target="_figure-7"/>, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for Control and User Planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a User Plane Function (NF-UP2) together with a dedicated User Plane TN slice (INS-UP2). The Control Plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2023), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="528" viewBox="0 0 528 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 268,328 L 276,344" fill="none" stroke="black"/>
                <path d="M 276,344 L 284,360" fill="none" stroke="black"/>
                <path d="M 292,360 L 300,344" fill="none" stroke="black"/>
                <path d="M 300,344 L 308,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="8" y="36">┌</text>
                  <text x="24" y="36">─</text>
                  <text x="40" y="36">─</text>
                  <text x="56" y="36">─</text>
                  <text x="72" y="36">─</text>
                  <text x="88" y="36">─</text>
                  <text x="104" y="36">─</text>
                  <text x="120" y="36">─</text>
                  <text x="136" y="36">─</text>
                  <text x="152" y="36">─</text>
                  <text x="168" y="36">─</text>
                  <text x="184" y="36">─</text>
                  <text x="200" y="36">─</text>
                  <text x="216" y="36">─</text>
                  <text x="232" y="36">─</text>
                  <text x="248" y="36">─</text>
                  <text x="264" y="36">─</text>
                  <text x="280" y="36">─</text>
                  <text x="296" y="36">─</text>
                  <text x="312" y="36">─</text>
                  <text x="328" y="36">─</text>
                  <text x="344" y="36">─</text>
                  <text x="360" y="36">─</text>
                  <text x="376" y="36">─</text>
                  <text x="392" y="36">─</text>
                  <text x="408" y="36">─</text>
                  <text x="424" y="36">─</text>
                  <text x="440" y="36">─</text>
                  <text x="456" y="36">─</text>
                  <text x="472" y="36">─</text>
                  <text x="488" y="36">─</text>
                  <text x="504" y="36">─</text>
                  <text x="520" y="36">┐</text>
                  <text x="160" y="52">┌</text>
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="400" y="52">─</text>
                  <text x="8" y="68">│</text>
                  <text x="32" y="68">1</text>
                  <text x="96" y="68">┌─────┐</text>
                  <text x="284" y="68">┌──────────────────────────┐</text>
                  <text x="408" y="68">│</text>
                  <text x="472" y="68">┌─────┐</text>
                  <text x="520" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="124" y="84">│NF-CP├──────┤</text>
                  <text x="212" y="84">CP</text>
                  <text x="236" y="84">TN</text>
                  <text x="272" y="84">Slice</text>
                  <text x="332" y="84">(TNS-CP)</text>
                  <text x="444" y="84">├──────┤NF-CP│</text>
                  <text x="8" y="100">│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="96" y="100">└─────┘</text>
                  <text x="284" y="100">└──────────────────────────┘</text>
                  <text x="408" y="100">│</text>
                  <text x="472" y="100">└─────┘</text>
                  <text x="520" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="160" y="116">│</text>
                  <text x="8" y="132">│</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="96" y="132">┌─────┐</text>
                  <text x="284" y="132">┌──────────────────────────┐</text>
                  <text x="408" y="132">│</text>
                  <text x="472" y="132">┌─────┐</text>
                  <text x="520" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="124" y="148">│NF-UP├──────┤</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(TNS-UP1)</text>
                  <text x="444" y="148">├──────┤NF-UP│</text>
                  <text x="8" y="164">│</text>
                  <text x="96" y="164">└─────┘</text>
                  <text x="284" y="164">└──────────────────────────┘</text>
                  <text x="408" y="164">│</text>
                  <text x="472" y="164">└─────┘</text>
                  <text x="520" y="164">│</text>
                  <text x="16" y="180">─</text>
                  <text x="32" y="180">─</text>
                  <text x="48" y="180">─</text>
                  <text x="64" y="180">─</text>
                  <text x="80" y="180">─</text>
                  <text x="96" y="180">─</text>
                  <text x="112" y="180">─</text>
                  <text x="128" y="180">─</text>
                  <text x="144" y="180">─</text>
                  <text x="160" y="180">┼</text>
                  <text x="176" y="180">─</text>
                  <text x="192" y="180">─</text>
                  <text x="208" y="180">─</text>
                  <text x="224" y="180">─</text>
                  <text x="240" y="180">─</text>
                  <text x="256" y="180">─</text>
                  <text x="272" y="180">─</text>
                  <text x="288" y="180">─</text>
                  <text x="304" y="180">─</text>
                  <text x="320" y="180">─</text>
                  <text x="336" y="180">─</text>
                  <text x="352" y="180">─</text>
                  <text x="368" y="180">─</text>
                  <text x="384" y="180">─</text>
                  <text x="400" y="180">─</text>
                  <text x="416" y="180">─</text>
                  <text x="432" y="180">─</text>
                  <text x="448" y="180">─</text>
                  <text x="464" y="180">─</text>
                  <text x="480" y="180">─</text>
                  <text x="496" y="180">─</text>
                  <text x="512" y="180">─</text>
                  <text x="408" y="196">│</text>
                  <text x="160" y="212">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="408" y="228">│</text>
                  <text x="160" y="244">└</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="280" y="308">│</text>
                  <text x="296" y="308">│</text>
                  <text x="276" y="324">─┘</text>
                  <text x="300" y="324">└─</text>
                  <text x="288" y="372">V</text>
                  <text x="8" y="388">┌</text>
                  <text x="24" y="388">─</text>
                  <text x="40" y="388">─</text>
                  <text x="56" y="388">─</text>
                  <text x="72" y="388">─</text>
                  <text x="88" y="388">─</text>
                  <text x="104" y="388">─</text>
                  <text x="120" y="388">─</text>
                  <text x="136" y="388">─</text>
                  <text x="152" y="388">─</text>
                  <text x="168" y="388">─</text>
                  <text x="184" y="388">─</text>
                  <text x="200" y="388">─</text>
                  <text x="216" y="388">─</text>
                  <text x="232" y="388">─</text>
                  <text x="248" y="388">─</text>
                  <text x="264" y="388">─</text>
                  <text x="280" y="388">─</text>
                  <text x="296" y="388">─</text>
                  <text x="312" y="388">─</text>
                  <text x="328" y="388">─</text>
                  <text x="344" y="388">─</text>
                  <text x="360" y="388">─</text>
                  <text x="376" y="388">─</text>
                  <text x="392" y="388">─</text>
                  <text x="408" y="388">─</text>
                  <text x="424" y="388">─</text>
                  <text x="440" y="388">─</text>
                  <text x="456" y="388">─</text>
                  <text x="472" y="388">─</text>
                  <text x="488" y="388">─</text>
                  <text x="504" y="388">─</text>
                  <text x="520" y="388">┐</text>
                  <text x="160" y="404">┌</text>
                  <text x="176" y="404">─</text>
                  <text x="192" y="404">─</text>
                  <text x="208" y="404">─</text>
                  <text x="224" y="404">─</text>
                  <text x="240" y="404">─</text>
                  <text x="256" y="404">─</text>
                  <text x="272" y="404">─</text>
                  <text x="288" y="404">─</text>
                  <text x="304" y="404">─</text>
                  <text x="320" y="404">─</text>
                  <text x="336" y="404">─</text>
                  <text x="352" y="404">─</text>
                  <text x="368" y="404">─</text>
                  <text x="384" y="404">─</text>
                  <text x="400" y="404">─</text>
                  <text x="8" y="420">│</text>
                  <text x="32" y="420">1</text>
                  <text x="96" y="420">┌─────┐</text>
                  <text x="284" y="420">┌──────────────────────────┐</text>
                  <text x="408" y="420">│</text>
                  <text x="472" y="420">┌─────┐</text>
                  <text x="520" y="420">│</text>
                  <text x="32" y="436">s</text>
                  <text x="48" y="436">S</text>
                  <text x="124" y="436">│NF-CP├──────┤</text>
                  <text x="212" y="436">CP</text>
                  <text x="236" y="436">TN</text>
                  <text x="272" y="436">Slice</text>
                  <text x="332" y="436">(TNS-CP)</text>
                  <text x="444" y="436">├──────┤NF-CP│</text>
                  <text x="8" y="452">│</text>
                  <text x="32" y="452">t</text>
                  <text x="48" y="452">l</text>
                  <text x="96" y="452">└─────┘</text>
                  <text x="284" y="452">└──────────────────────────┘</text>
                  <text x="408" y="452">│</text>
                  <text x="472" y="452">└─────┘</text>
                  <text x="520" y="452">│</text>
                  <text x="48" y="468">i</text>
                  <text x="160" y="468">│</text>
                  <text x="8" y="484">│</text>
                  <text x="32" y="484">5</text>
                  <text x="48" y="484">c</text>
                  <text x="96" y="484">┌─────┐</text>
                  <text x="284" y="484">┌──────────────────────────┐</text>
                  <text x="408" y="484">│</text>
                  <text x="472" y="484">┌─────┐</text>
                  <text x="520" y="484">│</text>
                  <text x="32" y="500">G</text>
                  <text x="48" y="500">e</text>
                  <text x="124" y="500">│NF-UP├──────┤</text>
                  <text x="204" y="500">UP</text>
                  <text x="228" y="500">TN</text>
                  <text x="264" y="500">Slice</text>
                  <text x="328" y="500">(TNS-UP1)</text>
                  <text x="444" y="500">├──────┤NF-UP│</text>
                  <text x="8" y="516">│</text>
                  <text x="96" y="516">└─────┘</text>
                  <text x="284" y="516">└──────────────────────────┘</text>
                  <text x="408" y="516">│</text>
                  <text x="472" y="516">└─────┘</text>
                  <text x="520" y="516">│</text>
                  <text x="16" y="532">─</text>
                  <text x="32" y="532">─</text>
                  <text x="48" y="532">─</text>
                  <text x="64" y="532">─</text>
                  <text x="80" y="532">─</text>
                  <text x="96" y="532">─</text>
                  <text x="112" y="532">─</text>
                  <text x="128" y="532">─</text>
                  <text x="144" y="532">─</text>
                  <text x="160" y="532">┼</text>
                  <text x="176" y="532">─</text>
                  <text x="192" y="532">─</text>
                  <text x="208" y="532">─</text>
                  <text x="224" y="532">─</text>
                  <text x="240" y="532">─</text>
                  <text x="256" y="532">─</text>
                  <text x="272" y="532">─</text>
                  <text x="288" y="532">─</text>
                  <text x="304" y="532">─</text>
                  <text x="320" y="532">─</text>
                  <text x="336" y="532">─</text>
                  <text x="352" y="532">─</text>
                  <text x="368" y="532">─</text>
                  <text x="384" y="532">─</text>
                  <text x="400" y="532">─</text>
                  <text x="416" y="532">─</text>
                  <text x="432" y="532">─</text>
                  <text x="448" y="532">─</text>
                  <text x="464" y="532">─</text>
                  <text x="480" y="532">─</text>
                  <text x="496" y="532">─</text>
                  <text x="512" y="532">─</text>
                  <text x="408" y="548">│</text>
                  <text x="8" y="564">┌</text>
                  <text x="24" y="564">─</text>
                  <text x="40" y="564">─</text>
                  <text x="56" y="564">─</text>
                  <text x="72" y="564">─</text>
                  <text x="88" y="564">─</text>
                  <text x="104" y="564">─</text>
                  <text x="120" y="564">─</text>
                  <text x="136" y="564">─</text>
                  <text x="160" y="564">─│─</text>
                  <text x="184" y="564">─</text>
                  <text x="200" y="564">─</text>
                  <text x="216" y="564">─</text>
                  <text x="232" y="564">─</text>
                  <text x="248" y="564">─</text>
                  <text x="264" y="564">─</text>
                  <text x="280" y="564">─</text>
                  <text x="296" y="564">─</text>
                  <text x="312" y="564">─</text>
                  <text x="328" y="564">─</text>
                  <text x="344" y="564">─</text>
                  <text x="360" y="564">─</text>
                  <text x="376" y="564">─</text>
                  <text x="392" y="564">─</text>
                  <text x="408" y="564">─</text>
                  <text x="424" y="564">─</text>
                  <text x="440" y="564">─</text>
                  <text x="456" y="564">─</text>
                  <text x="472" y="564">─</text>
                  <text x="488" y="564">─</text>
                  <text x="504" y="564">─</text>
                  <text x="520" y="564">┐</text>
                  <text x="32" y="580">2</text>
                  <text x="408" y="580">│</text>
                  <text x="8" y="596">│</text>
                  <text x="32" y="596">n</text>
                  <text x="48" y="596">S</text>
                  <text x="100" y="596">┌──────┐</text>
                  <text x="160" y="596">│</text>
                  <text x="284" y="596">┌──────────────────────────┐</text>
                  <text x="468" y="596">┌──────┐</text>
                  <text x="520" y="596">│</text>
                  <text x="32" y="612">d</text>
                  <text x="48" y="612">l</text>
                  <text x="124" y="612">│NF-UP2├─────┤</text>
                  <text x="204" y="612">UP</text>
                  <text x="228" y="612">TN</text>
                  <text x="264" y="612">Slice</text>
                  <text x="328" y="612">(TNS-UP2)</text>
                  <text x="444" y="612">├─────┤NF-UP2│</text>
                  <text x="8" y="628">│</text>
                  <text x="48" y="628">i</text>
                  <text x="100" y="628">└──────┘</text>
                  <text x="160" y="628">│</text>
                  <text x="284" y="628">└──────────────────────────┘</text>
                  <text x="468" y="628">└──────┘</text>
                  <text x="520" y="628">│</text>
                  <text x="32" y="644">5</text>
                  <text x="48" y="644">c</text>
                  <text x="408" y="644">│</text>
                  <text x="8" y="660">│</text>
                  <text x="32" y="660">G</text>
                  <text x="48" y="660">e</text>
                  <text x="160" y="660">│</text>
                  <text x="520" y="660">│</text>
                  <text x="16" y="676">─</text>
                  <text x="32" y="676">─</text>
                  <text x="48" y="676">─</text>
                  <text x="64" y="676">─</text>
                  <text x="80" y="676">─</text>
                  <text x="96" y="676">─</text>
                  <text x="112" y="676">─</text>
                  <text x="128" y="676">─</text>
                  <text x="144" y="676">─</text>
                  <text x="160" y="676">─</text>
                  <text x="176" y="676">─</text>
                  <text x="192" y="676">─</text>
                  <text x="208" y="676">─</text>
                  <text x="224" y="676">─</text>
                  <text x="240" y="676">─</text>
                  <text x="256" y="676">─</text>
                  <text x="272" y="676">─</text>
                  <text x="288" y="676">─</text>
                  <text x="304" y="676">─</text>
                  <text x="320" y="676">─</text>
                  <text x="336" y="676">─</text>
                  <text x="352" y="676">─</text>
                  <text x="368" y="676">─</text>
                  <text x="384" y="676">─</text>
                  <text x="408" y="676">─│─</text>
                  <text x="432" y="676">─</text>
                  <text x="448" y="676">─</text>
                  <text x="464" y="676">─</text>
                  <text x="480" y="676">─</text>
                  <text x="496" y="676">─</text>
                  <text x="512" y="676">─</text>
                  <text x="160" y="692">│</text>
                  <text x="256" y="708">Transport</text>
                  <text x="328" y="708">Network</text>
                  <text x="408" y="708">│</text>
                  <text x="160" y="724">│</text>
                  <text x="168" y="740">─</text>
                  <text x="184" y="740">─</text>
                  <text x="200" y="740">─</text>
                  <text x="216" y="740">─</text>
                  <text x="232" y="740">─</text>
                  <text x="248" y="740">─</text>
                  <text x="264" y="740">─</text>
                  <text x="280" y="740">─</text>
                  <text x="296" y="740">─</text>
                  <text x="312" y="740">─</text>
                  <text x="328" y="740">─</text>
                  <text x="344" y="740">─</text>
                  <text x="360" y="740">─</text>
                  <text x="376" y="740">─</text>
                  <text x="392" y="740">─</text>
                  <text x="408" y="740">┘</text>
                  <text x="76" y="756">Deployment</text>
                  <text x="132" y="756">of</text>
                  <text x="188" y="756">additional</text>
                  <text x="244" y="756">5G</text>
                  <text x="280" y="756">slice</text>
                  <text x="324" y="756">with</text>
                  <text x="372" y="756">shared</text>
                  <text x="432" y="756">Control</text>
                  <text x="488" y="756">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
                   │      Transport Network                      
                                                  │              
                   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
                      Deployment of first 5G slice               
                                  │ │                            
                                  │ │                            
                                  │ │                            
                                 ─┘ └─                           
                                 ╲   ╱                           
                                  ╲ ╱                            
                                   V                             
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
   2                                              │              
│  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
   d l  │NF-UP2├─────┤  UP TN Slice (TNS-UP2)   ├─────┤NF-UP2│   
│    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
   5 c                                            │              
│  G e             │                                            │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ 
                   │                                             
                           Transport Network      │              
                   │                                             
                    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘              
    Deployment of additional 5G slice with shared Control Plane  
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      ┌──────────┐               base NRP               ┌──────────┐
      │    PE    │                                      │    PE    │
    ┌ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─
      ■<───┐│    │       RFC XXXX Network Slice 1       │    ┌┼───>■ │
    │ │    │     │        ┌─────┐        ┌─────┐        │    │     │
      ■<───┤│    │        │  P  │        │  P  │        │    ├┼───>■ │
    ├ ┼ ─ ─├────>□<──────>□<───>□<──────>□────>□<──────>□<───┤─ ─ ─│─
      ■<───┤│    │        │     │        │     │        │    ├┼───>■ │
    │ │    │     │        └─────┘        └─────┘        │    │     │
      ■<───┘│    │       RFC XXXX Network Slice 2       │    └┼───>■ │
    └ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─
      │     │    │                                      │     │    │
      └──────────┘                                      └──────────┘
            └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ 
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices         
]]></artwork>
        </figure>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). The realization of the mapping
   between customer sites and provider networks is commonly refered to as the "hand-off".</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not reproduced here because of the intrinsic shortcomings of these methods.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at the Service Demarcation Point (SDP)
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP-based
   interfaces (the only exception could be the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple for
   NFs, it adds complexity due to the requirement of maintaining
   mapping tables for each SDP and requires a configuration task of new VLANs and
   IP subnet for every slice on every AC.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           │     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      │             │           
           │                        │     │             │           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
│      ●───────●■    │          │    ■●───────●     ●───────●      │
│ NF   ●───────●■ PE │          │ PE ■●───────●L2/L3●───────●   NF │
│      ●───────●■    │          │    ■●───────●     ●───────●      │
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    │                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAI to IP addresses makes IP addresses an identifier for eventual
   policy decisions in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (for example, IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case, there is no logical interface representing
   a slice on the PE, hence all slices are handled within single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAI, a mapping table similar to
   the VLAN Hand-off solution should be utilized <xref target="sec-vlan-handoff"/>.</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary. Alternatively,
   instead of using 2 full octets from the 8 octets in an IPv6 address, a provider
   could build a mapping table that uses only one octet or parts of an octet to
   represent utilized S-NSSAI. This mapping is a local allocation method to
   allocate IPv6 addresses to NFs in order to be representative of the S-NSSAI without
   redefining IPv6 semantic. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>.</t>
        <t>Different IPv6 address allocation
   schemes following this approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
        <ul empty="true">
          <li>
            <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary
   TN nodes are not required to associate any additional semantic with IPv6 address.</t>
          </li>
        </ul>
        <t>One benefit of embedding the S-NSSAI in the IPv6 address is that a specific S-NSSAI
   can be identified as needed at any place in the TN domain. This might be used,
   for example, to selectively enable per S-NSSAI monitoring, traffic engineering, or any
   other per S-NSSAI handling, if required.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI Embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. NF-A has a set of tunnel termination points, with unique per-slice IP addresses
   allocated from the 2001:db8:a:0::/96 prefix, while NF-B uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: customer A eMBB (SST=01, SD=00001) and customer B MIoT (SST=03, SD=00003).
   Therefore, for customer A eMBB the tunnel IP addresses are auto-derived (without the need
   for an explicit mapping table) as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets, and for customer B MIoT (SST=3,
   SD=00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
          <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘ MIoT (SST=3)            │     
     │                                                        │     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
        </dl>
        <t>Option B (<xref target="sec-10b"/>):
     : redistribution of labeled VPN routes with next-hop
      change at domain boundaries.</t>
        <dl>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off: Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the attachment circuit there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the attachment circuit with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to a NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC XXXX Network Slice)       RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ││              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to RFC 9543 NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   should be rejected by the RFC 9543 NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
X ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
X ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
X ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
X ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
X ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
X ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
X ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
X ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC XXXX Network Slice)        RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the attachment circuit.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator can define multiple transport planes. A transport plane may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A flex-algo <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
        <li>
          <t>An NRP <xref target="I-D.ietf-teas-ns-ip-mpls"/></t>
        </li>
        <li>
          <t>Any combination thereof.</t>
        </li>
      </ul>
      <t>Detailed realization of transport planes is out of the scope of this document.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes, each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes example based on TE tunnels</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there might be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   X ┃│  └──────────┘ │┃   │
   X ┃   ┌──────────┐  ┃   │                     │
   X ┃│  │ 5G QoS B ├──────┤
   X ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   X ┃   └──────────┘  ┃   │    │    │         │
   X ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   X ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   X ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   RFCXXXX NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The RFCXXXX NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC XXXX NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC 9543 NSC.  The RFC 9543
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC 9543 NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC 9543 NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo, a particular set of TE LSPs, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="RFC9350"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE LSPs <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the RFCXXXX NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The RFCXXXX NSC needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the RFCXXXX NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   RFCXXXX NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   RFCXXXX NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  </t>
          <t>
SFC OAM <xref target="RFC9451"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="RFC9516"/>.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to a transport plane that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to a transport plane that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices’ specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-08"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-05"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-10"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="I-D.henry-tsvwg-diffserv-to-qci">
          <front>
            <title>Diffserv to QCI Mapping</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Szigeti" initials="T." surname="Szigeti">
              <organization>Cisco</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="April" year="2020"/>
            <abstract>
              <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-henry-tsvwg-diffserv-to-qci-04"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-ip-mpls">
          <front>
            <title>Realizing Network Slices in IP/MPLS Networks</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ran Chen" initials="R." surname="Chen">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Luay Jalil" initials="L." surname="Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="26" month="November" year="2023"/>
            <abstract>
              <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-03"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9451">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document clarifies an ambiguity in the Network Service Header (NSH) specification related to the handling of O bit. In particular, this document clarifies the meaning of "OAM packet".</t>
              <t>This document updates RFC 8300.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9451"/>
          <seriesInfo name="DOI" value="10.17487/RFC9451"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC9516">
          <front>
            <title>Active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC)</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="W. Meng" initials="W." surname="Meng"/>
            <author fullname="T. Ao" initials="T." surname="Ao"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <author fullname="K. Leung" initials="K." surname="Leung"/>
            <author fullname="G. Mishra" initials="G." surname="Mishra"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>A set of requirements for active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC) in a network is presented in this document. Based on these requirements, an encapsulation of active OAM messages in SFC and a mechanism to detect and localize defects are described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9516"/>
          <seriesInfo name="DOI" value="10.17487/RFC9516"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-01"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2377?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Jie Dong, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,       Daniele Ceccarelli, and Bo Wu for
   their review of this document and for providing valuable comments.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>jdrake@juniper.net</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amit.dhamija@rakuten.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
