<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-05"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="April" day="26"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 169?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices.</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies.</t>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a NF instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the RFC 9543 Network Slices apply.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─       
 ┌─────      5G RAN or CORE Network      ├────┐ 
 │    └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─     │ 
 │                                            │ 
 │                                            │ 
 ▼                                            ▼ 
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─   ┌──┐
│NF├──         Transport Network         ├──┤NF│
└──┘  └ ─ ┬ ─ ─ ─ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─ ┬   └──┘
          │                 │           │       
          │                 │           │       
          ▼                 ▼           ▼       
  ┌ ─ Data Center ─   ┌ MPLS VPN─   ┌ Public─   
                   │    Backbone │    Cloud  │  
  │   ┌───┐┌───┐     ┌┴─┐      ┌──┐┌┴─┐         
      └───┘└───┘   │ └──┘      └─┬┘└──┘      │  
  │┌──┐┌──┐┌──┐┌──┐  ┌┴─┐      ┌──┐ │           
   └──┘└──┘└──┘└──┘│ └──┘      └─┬┘          │  
  └ ─ ─ ─ ─ ─ ─ ─ ─   └ ─ ─ ─ ─ ─   └ ─ ─ ─ ─   
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. 5G End-to-End Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created (called, 5G Network Slices), with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different options to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), and Traffic
 Engineering (TE). Whether all or a subset of these options are enabled is a deployment choice.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: customer site and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site 1           │                     │       │      Site 2     
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably RANs, and CNs.</t>
          </dd>
          <dt/>
          <dd>
            <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
          </dd>
          <dt>Customer site:</dt>
          <dd>
            <t>A customer manages and deploys 5G NFs (RAN and CN) in customer sites. On top of 5G NFs (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, or switches) within a customer site. A customer site can be either a physical or a virtual location. Examples of customer sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within the provider network or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of the scope of this document to document how these controllers are implemented.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting customer sites.</t>
          </dd>
          <dt/>
          <dd>
            <t>The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a CE/AC/PE definition that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. For example, the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs subinterface on a Layer 3 interface), a CE may also connect to the provider network using MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). An example of such an AC is depicted in <xref target="_figure-51"/>. This is a source of confusion since these configurations are typically enforced on PEs. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                                       
│                                     │               │
               │  ◀─────MP-BGP─────▶                   
│           ┌────┐                  ┌─┴──┐            │
            │    │   MPLS-based AC  │    │             
│           │ CE ├──────────────────│ PE │            │
         ┏━━┻━━━━┻━━┓               │    │             
│        ┃ VRF foo  ┃               └─┬──┘            │
 ─ ─ ─ ─ ┻━━━━━━━━━━┛                  ─ ─ ─ ─ ─ ─ ─ ─ 
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <ul empty="true">
            <li>
              <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
            </li>
          </ul>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO is out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this segment does not involve the Transport Network Orchestration.</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         |  5G NSO   |                          
                         └───────────┘                          
                            |   |                               
                            |   |                               
                            ▼   |                               
              ┌───────────────┐ |                               
              | 3GPP domains  | |                               
  ┌───────────| Orchestration |────────────────────────────┐    
  |           | (RAN and CN)  | |                          |    
  |           └───────────────┘ |                          |    
  |                             |                          |    
  |    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━|━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   |    
  |     TN Orchestration        |                          |    
  |    ┃        ┌───────────────┼──────────────┐       ┃   |    
  |             ▼               ▼              ▼           |    
  |    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   |    
  |     | Customer Site ||RFC9543 NSC|| Customer Site |    |    
  |    ┃| Orchestration ||           || Orchestration |┃   |    
  |     └──┬────────────┘└─────┬─────┘└──────────────┬┘    |    
  |    ┗ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        ▼                   ▼                     ▼     |    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─|─ ─ 
  |                          Provider                      |   |
| ▼           |       ┌─┴──┐  Network  ┌──┴─┐      ┌┴───┐  |    
 ┌──┐     ┌────┐  AC  |    |           |    |  AC  | NF |◀─┘   |
||NF◍ ─ ─ ┤ CE ├ ─ ─ ─■ PE |           | PE ■ ─ ─ ─◍(CE)|       
 └──┘     └────┘      |    |           |    |      └────┘      |
|             |       └─┬──┘           └──┬─┘       |           
   Customer                                           Customer |
|    Site     |         |                 |         |   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC 9543                          
                      ■─────Network Slice───■                   
                                                                
    ◍───────────────────TN Slice───────────────────◍                  
                                                                
]]></artwork>
          </figure>
          <ul empty="true">
            <li>
              <t>The various orchestration depicted in the figure encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main types of segments that are shown in <xref target="fig-end-to-end"/>.</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects two NFs located in the same customer site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration. The realization of this segment does not involve the Transport Network Orchestration.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC 9543 NSC.</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC 9543 NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
          </dl>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an RFC 9543 Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new Network Slice may rely on a partial or full pre-provisioned segment (e.g., a new Network Slice may rely on an existing AC). The customer site segment is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the customer site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the Network Slice between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
      ├───────────────────────TN Slice─────────────┤            
                                                                
                        ○─────RFC 9543 ─────○                   
                        |   Network Slice   |                   
                        |                   |                   
                        |                   |                   
                        ▼                   ▼                   
      ○──CS───□ □───AC──○ □──────PN───────□ ○──AC──○            
  ┌ ─ ─ ─ ─ ─ ─           ┌ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ 
     Customer  |               Provider               Customer |
  |   Site 1              |    Network    |         |  Site 2   
               |        ┌────┐          ┌────┐                 |
  |┌───┐    ┌────┐  AC  |    |          |    | AC ┌─┴─┐         
CS |NF1├────┤ CE ├──────┤ PE |          | PE ├────┤NF3|        |
□ |└─┬─┘    └────┘      |    |          |    |    └─┬─┘         
|    |         |        └────┘          └────┘                 |
| |  |                    |               |         |           
□  ┌─┴─┐       |                                               |
  ||NF2|                  |               |         |           
   └───┘       |                                               |
  └ ─ ─ ─ ─ ─ ─           └ ─ ─ ─ ─ ─ ─ ─ ┘         └ ─ ─ ─ ─ ─ 
                                                                
              □──────□  TN segments:                            
                          CS = Customer Segment                 
                          AC = Attachment Circuit               
                          PN = Provider Network
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC 9543 NSC).  More precisely, a PE and a CE connected via an AC need to be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the RFC 9543 Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ┐                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                          RFC9543 NSC    |
  | Customer Site |                   |                   
    Orchestration      IETF APIs/DM    (Provider Network |
  |               |◀────────────────▶|  Orchestration)   
   ─ ─ ─ ─ ─ ─ ─ ─                     ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
                |                        |                
                |                        |                
┌ ─ ─ ─ ─ ─ ─ ─ ┼ ┐                    ┌ ┼ ─ ─ ─ ─ ─ ─ ─ ┐
                ▼                        ▼                
| ┌──┐      ┌──┐.1|    192.0.2.0/31    |.0┌──┐           |
  |NF├──────┤CE├──────────────────────────┤PE|            
| └──┘      └──┘  |      VLAN 100      |  └──┘           |
     Customer                                Provider     
|      Site       |                    |     Network     |
 ─ ─ ─ ─ ─ ─ ─ ─ ─                      ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                          
               └─────────── AC ──────────┘                                     
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping Schemes Between 5G Network Slices and Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G Control Plane and User Plane in TN slices for a single 5G eMBB network slice. It is important to note that this mapping can serve as an interim step to N:M mapping. In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G network slices (e.g., the Control Plane TN slice is shared by multiple 5G network Slices). Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.</t>
          </li>
        </ul>
        <t>In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                                                                 
|                        5G Slice eMBB                          |
                                                                 
|            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            |
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐  
| |CU-UP├─────── RFC 9543 Network Slice UP_eMBB  ───────┤ UPF | |
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
|            |                                     |            |
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐  
| |CU-CP├───────    RFC 9543 Network Slice CP    ───────┤ AMF | |
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
└ ─ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ┘
                                                                 
             |                                     |             
                       Transport Network                         
             |                                     |             
                                                                 
             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘             
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐                                  
                     Edge Cloud                                    
                  |             |                                  
                    ┌─────────┐                                    
                  | |UPF_URLLC| |                                  
                    └─────┬───┘                                    
                  └ ─ ─ ─ | ─ ─ ┘                                  
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ | ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  | ┌ ─ ─ ─ ─ ─ ─ ─ 
|   Cell Site   | |                            |                  |
                    |                            | |   Regional    
| ┌───────────┐ | |                            |         Cloud    |
  |CU-UP_URLLC├─────┤                            | | ┌──────────┐  
| └───────────┘ | |       RFC 9543 Network     ├─────┤  5GC CP  | |
                    |        Slice ALL           | | └──────────┘  
| ┌───────────┐ | |                            |                  |
  |CU-UP_eMBB ├─────┤                            | | ┌──────────┐  
| └───────────┘ | |                            ├─────┤ UPF_eMBB | |
 ─ ─ ─ ─ ─ ─ ─ ─    |                            | | └──────────┘  
                  |  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  |
                                                 | └ ─ ─ ─ ─ ─ ─ ─ 
                  |      Transport Network                         
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                 
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize Network Slices (including the adjustment of slice services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G Control Plane and User Plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deploloyment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for Control and User Planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a User Plane Function (NF-UP2) together with a dedicated User Plane TN slice (INS-UP2). In this example, the Control Plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="528" viewBox="0 0 528 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 268,328 L 276,344" fill="none" stroke="black"/>
                <path d="M 276,344 L 284,360" fill="none" stroke="black"/>
                <path d="M 292,360 L 300,344" fill="none" stroke="black"/>
                <path d="M 300,344 L 308,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="8" y="36">┌</text>
                  <text x="24" y="36">─</text>
                  <text x="40" y="36">─</text>
                  <text x="56" y="36">─</text>
                  <text x="72" y="36">─</text>
                  <text x="88" y="36">─</text>
                  <text x="104" y="36">─</text>
                  <text x="120" y="36">─</text>
                  <text x="136" y="36">─</text>
                  <text x="152" y="36">─</text>
                  <text x="168" y="36">─</text>
                  <text x="184" y="36">─</text>
                  <text x="200" y="36">─</text>
                  <text x="216" y="36">─</text>
                  <text x="232" y="36">─</text>
                  <text x="248" y="36">─</text>
                  <text x="264" y="36">─</text>
                  <text x="280" y="36">─</text>
                  <text x="296" y="36">─</text>
                  <text x="312" y="36">─</text>
                  <text x="328" y="36">─</text>
                  <text x="344" y="36">─</text>
                  <text x="360" y="36">─</text>
                  <text x="376" y="36">─</text>
                  <text x="392" y="36">─</text>
                  <text x="408" y="36">─</text>
                  <text x="424" y="36">─</text>
                  <text x="440" y="36">─</text>
                  <text x="456" y="36">─</text>
                  <text x="472" y="36">─</text>
                  <text x="488" y="36">─</text>
                  <text x="504" y="36">─</text>
                  <text x="520" y="36">┐</text>
                  <text x="160" y="52">┌</text>
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="400" y="52">─</text>
                  <text x="8" y="68">│</text>
                  <text x="32" y="68">1</text>
                  <text x="96" y="68">┌─────┐</text>
                  <text x="284" y="68">┌──────────────────────────┐</text>
                  <text x="408" y="68">│</text>
                  <text x="472" y="68">┌─────┐</text>
                  <text x="520" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="124" y="84">│NF-CP├──────┤</text>
                  <text x="212" y="84">CP</text>
                  <text x="236" y="84">TN</text>
                  <text x="272" y="84">Slice</text>
                  <text x="332" y="84">(TNS-CP)</text>
                  <text x="444" y="84">├──────┤NF-CP│</text>
                  <text x="8" y="100">│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="96" y="100">└─────┘</text>
                  <text x="284" y="100">└──────────────────────────┘</text>
                  <text x="408" y="100">│</text>
                  <text x="472" y="100">└─────┘</text>
                  <text x="520" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="160" y="116">│</text>
                  <text x="8" y="132">│</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="96" y="132">┌─────┐</text>
                  <text x="284" y="132">┌──────────────────────────┐</text>
                  <text x="408" y="132">│</text>
                  <text x="472" y="132">┌─────┐</text>
                  <text x="520" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="124" y="148">│NF-UP├──────┤</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(TNS-UP1)</text>
                  <text x="444" y="148">├──────┤NF-UP│</text>
                  <text x="8" y="164">│</text>
                  <text x="96" y="164">└─────┘</text>
                  <text x="284" y="164">└──────────────────────────┘</text>
                  <text x="408" y="164">│</text>
                  <text x="472" y="164">└─────┘</text>
                  <text x="520" y="164">│</text>
                  <text x="16" y="180">─</text>
                  <text x="32" y="180">─</text>
                  <text x="48" y="180">─</text>
                  <text x="64" y="180">─</text>
                  <text x="80" y="180">─</text>
                  <text x="96" y="180">─</text>
                  <text x="112" y="180">─</text>
                  <text x="128" y="180">─</text>
                  <text x="144" y="180">─</text>
                  <text x="160" y="180">┼</text>
                  <text x="176" y="180">─</text>
                  <text x="192" y="180">─</text>
                  <text x="208" y="180">─</text>
                  <text x="224" y="180">─</text>
                  <text x="240" y="180">─</text>
                  <text x="256" y="180">─</text>
                  <text x="272" y="180">─</text>
                  <text x="288" y="180">─</text>
                  <text x="304" y="180">─</text>
                  <text x="320" y="180">─</text>
                  <text x="336" y="180">─</text>
                  <text x="352" y="180">─</text>
                  <text x="368" y="180">─</text>
                  <text x="384" y="180">─</text>
                  <text x="400" y="180">─</text>
                  <text x="416" y="180">─</text>
                  <text x="432" y="180">─</text>
                  <text x="448" y="180">─</text>
                  <text x="464" y="180">─</text>
                  <text x="480" y="180">─</text>
                  <text x="496" y="180">─</text>
                  <text x="512" y="180">─</text>
                  <text x="408" y="196">│</text>
                  <text x="160" y="212">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="408" y="228">│</text>
                  <text x="160" y="244">└</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="280" y="308">│</text>
                  <text x="296" y="308">│</text>
                  <text x="276" y="324">─┘</text>
                  <text x="300" y="324">└─</text>
                  <text x="288" y="372">V</text>
                  <text x="8" y="388">┌</text>
                  <text x="24" y="388">─</text>
                  <text x="40" y="388">─</text>
                  <text x="56" y="388">─</text>
                  <text x="72" y="388">─</text>
                  <text x="88" y="388">─</text>
                  <text x="104" y="388">─</text>
                  <text x="120" y="388">─</text>
                  <text x="136" y="388">─</text>
                  <text x="152" y="388">─</text>
                  <text x="168" y="388">─</text>
                  <text x="184" y="388">─</text>
                  <text x="200" y="388">─</text>
                  <text x="216" y="388">─</text>
                  <text x="232" y="388">─</text>
                  <text x="248" y="388">─</text>
                  <text x="264" y="388">─</text>
                  <text x="280" y="388">─</text>
                  <text x="296" y="388">─</text>
                  <text x="312" y="388">─</text>
                  <text x="328" y="388">─</text>
                  <text x="344" y="388">─</text>
                  <text x="360" y="388">─</text>
                  <text x="376" y="388">─</text>
                  <text x="392" y="388">─</text>
                  <text x="408" y="388">─</text>
                  <text x="424" y="388">─</text>
                  <text x="440" y="388">─</text>
                  <text x="456" y="388">─</text>
                  <text x="472" y="388">─</text>
                  <text x="488" y="388">─</text>
                  <text x="504" y="388">─</text>
                  <text x="520" y="388">┐</text>
                  <text x="160" y="404">┌</text>
                  <text x="176" y="404">─</text>
                  <text x="192" y="404">─</text>
                  <text x="208" y="404">─</text>
                  <text x="224" y="404">─</text>
                  <text x="240" y="404">─</text>
                  <text x="256" y="404">─</text>
                  <text x="272" y="404">─</text>
                  <text x="288" y="404">─</text>
                  <text x="304" y="404">─</text>
                  <text x="320" y="404">─</text>
                  <text x="336" y="404">─</text>
                  <text x="352" y="404">─</text>
                  <text x="368" y="404">─</text>
                  <text x="384" y="404">─</text>
                  <text x="400" y="404">─</text>
                  <text x="8" y="420">│</text>
                  <text x="32" y="420">1</text>
                  <text x="96" y="420">┌─────┐</text>
                  <text x="284" y="420">┌──────────────────────────┐</text>
                  <text x="408" y="420">│</text>
                  <text x="472" y="420">┌─────┐</text>
                  <text x="520" y="420">│</text>
                  <text x="32" y="436">s</text>
                  <text x="48" y="436">S</text>
                  <text x="124" y="436">│NF-CP├──────┤</text>
                  <text x="212" y="436">CP</text>
                  <text x="236" y="436">TN</text>
                  <text x="272" y="436">Slice</text>
                  <text x="332" y="436">(TNS-CP)</text>
                  <text x="444" y="436">├──────┤NF-CP│</text>
                  <text x="8" y="452">│</text>
                  <text x="32" y="452">t</text>
                  <text x="48" y="452">l</text>
                  <text x="96" y="452">└─────┘</text>
                  <text x="284" y="452">└──────────────────────────┘</text>
                  <text x="408" y="452">│</text>
                  <text x="472" y="452">└─────┘</text>
                  <text x="520" y="452">│</text>
                  <text x="48" y="468">i</text>
                  <text x="160" y="468">│</text>
                  <text x="8" y="484">│</text>
                  <text x="32" y="484">5</text>
                  <text x="48" y="484">c</text>
                  <text x="96" y="484">┌─────┐</text>
                  <text x="284" y="484">┌──────────────────────────┐</text>
                  <text x="408" y="484">│</text>
                  <text x="472" y="484">┌─────┐</text>
                  <text x="520" y="484">│</text>
                  <text x="32" y="500">G</text>
                  <text x="48" y="500">e</text>
                  <text x="124" y="500">│NF-UP├──────┤</text>
                  <text x="204" y="500">UP</text>
                  <text x="228" y="500">TN</text>
                  <text x="264" y="500">Slice</text>
                  <text x="328" y="500">(TNS-UP1)</text>
                  <text x="444" y="500">├──────┤NF-UP│</text>
                  <text x="8" y="516">│</text>
                  <text x="96" y="516">└─────┘</text>
                  <text x="284" y="516">└──────────────────────────┘</text>
                  <text x="408" y="516">│</text>
                  <text x="472" y="516">└─────┘</text>
                  <text x="520" y="516">│</text>
                  <text x="16" y="532">─</text>
                  <text x="32" y="532">─</text>
                  <text x="48" y="532">─</text>
                  <text x="64" y="532">─</text>
                  <text x="80" y="532">─</text>
                  <text x="96" y="532">─</text>
                  <text x="112" y="532">─</text>
                  <text x="128" y="532">─</text>
                  <text x="144" y="532">─</text>
                  <text x="160" y="532">┼</text>
                  <text x="176" y="532">─</text>
                  <text x="192" y="532">─</text>
                  <text x="208" y="532">─</text>
                  <text x="224" y="532">─</text>
                  <text x="240" y="532">─</text>
                  <text x="256" y="532">─</text>
                  <text x="272" y="532">─</text>
                  <text x="288" y="532">─</text>
                  <text x="304" y="532">─</text>
                  <text x="320" y="532">─</text>
                  <text x="336" y="532">─</text>
                  <text x="352" y="532">─</text>
                  <text x="368" y="532">─</text>
                  <text x="384" y="532">─</text>
                  <text x="400" y="532">─</text>
                  <text x="416" y="532">─</text>
                  <text x="432" y="532">─</text>
                  <text x="448" y="532">─</text>
                  <text x="464" y="532">─</text>
                  <text x="480" y="532">─</text>
                  <text x="496" y="532">─</text>
                  <text x="512" y="532">─</text>
                  <text x="408" y="548">│</text>
                  <text x="8" y="564">┌</text>
                  <text x="24" y="564">─</text>
                  <text x="40" y="564">─</text>
                  <text x="56" y="564">─</text>
                  <text x="72" y="564">─</text>
                  <text x="88" y="564">─</text>
                  <text x="104" y="564">─</text>
                  <text x="120" y="564">─</text>
                  <text x="136" y="564">─</text>
                  <text x="160" y="564">─│─</text>
                  <text x="184" y="564">─</text>
                  <text x="200" y="564">─</text>
                  <text x="216" y="564">─</text>
                  <text x="232" y="564">─</text>
                  <text x="248" y="564">─</text>
                  <text x="264" y="564">─</text>
                  <text x="280" y="564">─</text>
                  <text x="296" y="564">─</text>
                  <text x="312" y="564">─</text>
                  <text x="328" y="564">─</text>
                  <text x="344" y="564">─</text>
                  <text x="360" y="564">─</text>
                  <text x="376" y="564">─</text>
                  <text x="392" y="564">─</text>
                  <text x="408" y="564">─</text>
                  <text x="424" y="564">─</text>
                  <text x="440" y="564">─</text>
                  <text x="456" y="564">─</text>
                  <text x="472" y="564">─</text>
                  <text x="488" y="564">─</text>
                  <text x="504" y="564">─</text>
                  <text x="520" y="564">┐</text>
                  <text x="32" y="580">2</text>
                  <text x="408" y="580">│</text>
                  <text x="8" y="596">│</text>
                  <text x="32" y="596">n</text>
                  <text x="48" y="596">S</text>
                  <text x="100" y="596">┌──────┐</text>
                  <text x="160" y="596">│</text>
                  <text x="284" y="596">┌──────────────────────────┐</text>
                  <text x="468" y="596">┌──────┐</text>
                  <text x="520" y="596">│</text>
                  <text x="32" y="612">d</text>
                  <text x="48" y="612">l</text>
                  <text x="124" y="612">│NF-UP2├─────┤</text>
                  <text x="204" y="612">UP</text>
                  <text x="228" y="612">TN</text>
                  <text x="264" y="612">Slice</text>
                  <text x="328" y="612">(TNS-UP2)</text>
                  <text x="444" y="612">├─────┤NF-UP2│</text>
                  <text x="8" y="628">│</text>
                  <text x="48" y="628">i</text>
                  <text x="100" y="628">└──────┘</text>
                  <text x="160" y="628">│</text>
                  <text x="284" y="628">└──────────────────────────┘</text>
                  <text x="468" y="628">└──────┘</text>
                  <text x="520" y="628">│</text>
                  <text x="32" y="644">5</text>
                  <text x="48" y="644">c</text>
                  <text x="408" y="644">│</text>
                  <text x="8" y="660">│</text>
                  <text x="32" y="660">G</text>
                  <text x="48" y="660">e</text>
                  <text x="160" y="660">│</text>
                  <text x="520" y="660">│</text>
                  <text x="16" y="676">─</text>
                  <text x="32" y="676">─</text>
                  <text x="48" y="676">─</text>
                  <text x="64" y="676">─</text>
                  <text x="80" y="676">─</text>
                  <text x="96" y="676">─</text>
                  <text x="112" y="676">─</text>
                  <text x="128" y="676">─</text>
                  <text x="144" y="676">─</text>
                  <text x="160" y="676">─</text>
                  <text x="176" y="676">─</text>
                  <text x="192" y="676">─</text>
                  <text x="208" y="676">─</text>
                  <text x="224" y="676">─</text>
                  <text x="240" y="676">─</text>
                  <text x="256" y="676">─</text>
                  <text x="272" y="676">─</text>
                  <text x="288" y="676">─</text>
                  <text x="304" y="676">─</text>
                  <text x="320" y="676">─</text>
                  <text x="336" y="676">─</text>
                  <text x="352" y="676">─</text>
                  <text x="368" y="676">─</text>
                  <text x="384" y="676">─</text>
                  <text x="408" y="676">─│─</text>
                  <text x="432" y="676">─</text>
                  <text x="448" y="676">─</text>
                  <text x="464" y="676">─</text>
                  <text x="480" y="676">─</text>
                  <text x="496" y="676">─</text>
                  <text x="512" y="676">─</text>
                  <text x="160" y="692">│</text>
                  <text x="256" y="708">Transport</text>
                  <text x="328" y="708">Network</text>
                  <text x="408" y="708">│</text>
                  <text x="160" y="724">│</text>
                  <text x="168" y="740">─</text>
                  <text x="184" y="740">─</text>
                  <text x="200" y="740">─</text>
                  <text x="216" y="740">─</text>
                  <text x="232" y="740">─</text>
                  <text x="248" y="740">─</text>
                  <text x="264" y="740">─</text>
                  <text x="280" y="740">─</text>
                  <text x="296" y="740">─</text>
                  <text x="312" y="740">─</text>
                  <text x="328" y="740">─</text>
                  <text x="344" y="740">─</text>
                  <text x="360" y="740">─</text>
                  <text x="376" y="740">─</text>
                  <text x="392" y="740">─</text>
                  <text x="408" y="740">┘</text>
                  <text x="76" y="756">Deployment</text>
                  <text x="132" y="756">of</text>
                  <text x="188" y="756">additional</text>
                  <text x="244" y="756">5G</text>
                  <text x="280" y="756">slice</text>
                  <text x="324" y="756">with</text>
                  <text x="372" y="756">shared</text>
                  <text x="432" y="756">Control</text>
                  <text x="488" y="756">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
                   │      Transport Network                      
                                                  │              
                   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
                      Deployment of first 5G slice               
                                  │ │                            
                                  │ │                            
                                  │ │                            
                                 ─┘ └─                           
                                 ╲   ╱                           
                                  ╲ ╱                            
                                   V                             
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
   2                                              │              
│  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
   d l  │NF-UP2├─────┤  UP TN Slice (TNS-UP2)   ├─────┤NF-UP2│   
│    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
   5 c                                            │              
│  G e             │                                            │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ 
                   │                                             
                           Transport Network      │              
                   │                                             
                    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘              
    Deployment of additional 5G slice with shared Control Plane  
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>}.</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      ┌──────────┐               base NRP               ┌──────────┐
      |    PE    |                                      |    PE    |
    ┌ ┼ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─|─
      ■<───┐|    |       RFC 9543 Network Slice 1       |    ┌┼───>■ |
    | |    |     |        ┌─────┐        ┌─────┐        |    |     |
      ■<───┤|    |        |  P  |        |  P  |        |    ├┼───>■ |
    ├ ┼ ─ ─├────>□<──────>□<───>□<──────>□────>□<──────>□<───┤─ ─ ─|─
      ■<───┤|    |        |     |        |     |        |    ├┼───>■ |
    | |    |     |        └─────┘        └─────┘        |    |     |
      ■<───┘|    |       RFC 9543 Network Slice 2       |    └┼───>■ |
    └ ┼ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─|─
      |     |    |                                      |     |    |
      └──────────┘                                      └──────────┘
            └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ 
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices         
]]></artwork>
        </figure>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). The realization of the mapping
   between customer sites and provider networks is commonly refered to as the "hand-off".</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not reproduced here because of the intrinsic shortcomings of these methods.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at the Service Demarcation Point (SDP)
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP-based
   interfaces (the only exception could be the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple for
   NFs, it adds complexity due to the requirement of maintaining
   mapping tables for each SDP and requires a configuration task of new VLANs and
   IP subnet for every slice on every AC.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      |             |           
           |                        |     |             |           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
|      ●───────●■    |          |    ■●───────●     ●───────●      |
| NF   ●───────●■ PE |          | PE ■●───────●L2/L3●───────●   NF |
|      ●───────●■    |          |    ■●───────●     ●───────●      |
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    |                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAI to IP addresses makes IP addresses an identifier for eventual
   policy decisions in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (for example, IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case, there is no logical interface representing
   a slice on the PE, hence all slices are handled within single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAI, a mapping table similar to
   the VLAN Hand-off solution should be utilized (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary. Alternatively,
   instead of using 2 full octets from the 8 octets in an IPv6 address, a provider
   could build a mapping table that uses only one octet or parts of an octet to
   represent utilized S-NSSAI. This mapping is a local allocation method to
   allocate IPv6 addresses to NFs in order to be representative of the S-NSSAI without
   redefining IPv6 semantic. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>.</t>
        <t>Different IPv6 address allocation
   schemes following this approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
        <ul empty="true">
          <li>
            <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary
   TN nodes are not required to associate any additional semantic with IPv6 address.</t>
          </li>
        </ul>
        <t>One benefit of embedding the S-NSSAI in the IPv6 address is that a specific S-NSSAI
   can be identified as needed at any place in the TN domain. This might be used,
   for example, to selectively enable per S-NSSAI monitoring, TE, or any
   other per S-NSSAI handling, if required.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI Embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. NF-A has a set of tunnel termination points, with unique per-slice IP addresses
   allocated from the 2001:db8:a:0::/96 prefix, while NF-B uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: customer A eMBB (SST=01, SD=00001) and customer B MIoT (SST=03, SD=00003).
   Therefore, for customer A eMBB the tunnel IP addresses are auto-derived (without the need
   for an explicit mapping table) as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets, and for customer B MIoT (SST=3,
   SD=00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
          <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘ MIoT (SST=3)            │     
     │                                                        │     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
        </dl>
        <t>Option B (<xref target="sec-10b"/>):
     : redistribution of labeled VPN routes with next-hop
      change at domain boundaries.</t>
        <dl>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off: Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the attachment circuit there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the attachment circuit with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to a NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ││              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to RFC 9543 NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   should be rejected by the RFC 9543 NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
X ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
X ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
X ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
X ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
X ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
X ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
X ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
X ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the attachment circuit.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator can define multiple transport planes. A transport plane may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A flex-algo <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>Detailed realization of transport planes is out of the scope of this document.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes, each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes example based on TE tunnels</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there might be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   X ┃│  └──────────┘ │┃   │
   X ┃   ┌──────────┐  ┃   │                     │
   X ┃│  │ 5G QoS B ├──────┤
   X ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   X ┃   └──────────┘  ┃   │    │    │         │
   X ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   X ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   X ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC 9543 NSC.  The RFC 9543
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC 9543 NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC 9543 NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo, a particular set of TE LSPs, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="RFC9350"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE LSPs <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  </t>
          <t>
SFC OAM <xref target="RFC9451"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="RFC9516"/>.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to a transport plane that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to a transport plane that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices’ specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="19" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-11"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="19" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the 'ietf-network' and the Service Attachment
   Point (SAP) models with the detailed information for the provisioning
   of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-09"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="25" month="April" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-12"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-00"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9451">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document clarifies an ambiguity in the Network Service Header (NSH) specification related to the handling of O bit. In particular, this document clarifies the meaning of "OAM packet".</t>
              <t>This document updates RFC 8300.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9451"/>
          <seriesInfo name="DOI" value="10.17487/RFC9451"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC9516">
          <front>
            <title>Active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC)</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="W. Meng" initials="W." surname="Meng"/>
            <author fullname="T. Ao" initials="T." surname="Ao"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <author fullname="K. Leung" initials="K." surname="Leung"/>
            <author fullname="G. Mishra" initials="G." surname="Mishra"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>A set of requirements for active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC) in a network is presented in this document. Based on these requirements, an encapsulation of active OAM messages in SFC and a mechanism to detect and localize defects are described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9516"/>
          <seriesInfo name="DOI" value="10.17487/RFC9516"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-01"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2376?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, and Xuesong Geng for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
