<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-11" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-11"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="September" day="23"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 181?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 188?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document describes an approach to how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). The realization of the mapping between customer sites and provider networks is refered to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of such hand-off methods.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control within the provider network, and (4) capacity management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
        <dt>Provider:</dt>
        <dd>
          <t>An entity responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>A provider orchestrates and manages a provider network.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t>The main 5G network building blocks are: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as:</t>
        <blockquote>
          <t>"part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>"The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts." (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>"where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand")."</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>"a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers."</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, Quality of Service (QoS), and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., via Layer 3 VLAN subinterfaces), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/>) and (<xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             v                          |    
  |    +-----------------------------------------------+   |    
  |    |TN Orchestration                               |   |      
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types that are as follows:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+ RFC 9543 Network Slice UP_eMBB  +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+    RFC 9543 Network Slice CP    +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |     RFC 9543 Network     +-----+  5GC CP  | |
|               | | |        Slice ALL         | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, in some deployments, in the case of a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) may need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deployment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (INS-CP and INS-UP1). Next, in many cases, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (INS-UP2). The control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <ul empty="true">
          <li>
            <t>The model described here in which the control plane is shared among multiple slices is likely to be common; it is not mandatory, though. Deployment models with a separate control plane for each slice are also possible.</t>
          </li>
        </ul>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+              
                      Deployment of first 5G slice               
                                  | |                            
                                  | |                            
                                --+ +--                           
                                 \   /                           
                                  \ /                                                      
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
+------------------|------------------------------|-------------+
|  2               |                              |             |
|  n S  +------+   | +--------------------------+ |   +------+  |
|  d l  |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|  |
|    i  +------+   | +--------------------------+ |   +------+  |
|  5 c             |                              |             |
|  G e             |                              |             |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+                 
    Deployment of additional 5G slice with shared Control Plane
]]></artwork>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>).</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
             ..............................................
            :                   Base NRP                   :
      +-----:----+                                    +----:-----+
      | PE  :    |                                    |    :  PE |
-- -- |- -- -- --| - -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
 N    *<---+     |                                    |     +--->*
 S    |    |     |       +-----+        +-----+       |     |    |
 #    *<---+     |       |  P  |        |  P  |       |     +--->*
 1    |    |     |       |     |        |     |       |     |    |
== == |    +---->o<----->o<--->o<------>o---->o<----->o<----|    |
 N    |    |     |       |     |        |     |       |     |    |
 S    *<---+     |       |     |        |     |       |     +--->*
 #    |    |     |       +-----+        +-----+       |     |    |
 2    *<---+     |                                    |     +--->*
-- -- |- -- -- --|-- -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
      |     :    |                                    |    :     |
      +-----:----+                                    +----:-----+
            :                                              :      
            '..............................................'

    * SDP, with fine-grained QoS (dedicated resources per Network Slice)
    o Coarse-grained QoS, with resources shared by all Network Slices
  ... Base NRP
-- -- Network Slice
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do no interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. These section lists few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <section anchor="an-example-of-local-ipv6-addressing-plan-for-network-functions">
          <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
          <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
          <figure anchor="_figure-11">
            <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
            <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
          </figure>
          <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
          <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
          <figure anchor="_figure-s-nssai-deployment">
            <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
            <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the AC there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>PE Underlay Transport Mapping Models</name>
      <t>The PE underlay transport (underlay transport, for short) refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and underlay transport are each related to different engineering objectives.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and two underlay transports (e.g., latency optimized underlay
   transport using link latency metrics for path calculation, and underlay
   transport following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while underlay transport determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple underlay transports within a single NRP. An underlay transport may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, underlay transports may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to underlay transports at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   underlay transports without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different underlay transports (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two underlay transports,
   each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate underlay transports is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Underlay Transport Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Underlay x--------------------------------.      +------+
|  |Transportx-------------.                  '----->| PE-B |
|  |   A     x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Underlay o-------|--------'               .---->>|      |
|  |Transporto-------|-----------------.      |      +------+
|  |   B     o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Underlay Transport A
 o---->>   Tunnels of Underlay Transport B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per underlay transport for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single underlay transport
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware PE underlay transport mapping model, the entire
   slice is mapped to a single underlay transport, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to PEs Underlay Transport Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Underlay | |
   :|  |     NS 2 +------+   +--->Transport| |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Underlay | |
   :|  SDP          |:   +------->Transport| |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to underlay transports at
   the granularity of 5G QoS Class.  Given that the potential number of
   underlay transports is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common underlay transport,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Underlay Transport Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Underlay | |
   S :|  +----------+ |:   +--------->Transport| |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Underlay | |
   4 :|  | 5G QoS E +------+    +---->Transport| |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" may be maintained by the transport
   controller - it is not necessary (or indeed possible for current SR-TE technology in 2024) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an underlay transport that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an underlay transport that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 28.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="June" year="2024"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-03"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-16"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-13"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="28" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-16"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-02"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-02"/>
        </reference>
      </references>
    </references>
    <?line 2353?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <dl>
        <dt>3GPP:</dt>
        <dd>
          <t>3rd Generation Partnership Project</t>
        </dd>
        <dt>5GC:</dt>
        <dd>
          <t>5G Core</t>
        </dd>
        <dt>5QI:</dt>
        <dd>
          <t>5G QoS Indicator</t>
        </dd>
        <dt>A2A:</dt>
        <dd>
          <t>Any-to-Any</t>
        </dd>
        <dt>AC:</dt>
        <dd>
          <t>Attachment Circuit</t>
        </dd>
        <dt>CE:</dt>
        <dd>
          <t>Customer Edge</t>
        </dd>
        <dt>CIR:</dt>
        <dd>
          <t>Committed Information Rate</t>
        </dd>
        <dt>CN:</dt>
        <dd>
          <t>Core Network</t>
        </dd>
        <dt>CoS:</dt>
        <dd>
          <t>Class of Service</t>
        </dd>
        <dt>CP:</dt>
        <dd>
          <t>Control Plane</t>
        </dd>
        <dt>CU:</dt>
        <dd>
          <t>Centralized Unit</t>
        </dd>
        <dt>CU-CP:</dt>
        <dd>
          <t>Centralized Unit Control Plane</t>
        </dd>
        <dt>CU-UP:</dt>
        <dd>
          <t>Centralized Unit User Plane</t>
        </dd>
        <dt>DC:</dt>
        <dd>
          <t>Data Center</t>
        </dd>
        <dt>DDoS:</dt>
        <dd>
          <t>Distributed Denial of Services</t>
        </dd>
        <dt>DSCP:</dt>
        <dd>
          <t>Differentiated Services Code Point</t>
        </dd>
        <dt>eCPRI:</dt>
        <dd>
          <t>enhanced Common Public Radio Interface</t>
        </dd>
        <dt>FIB:</dt>
        <dd>
          <t>Forwarding Information Base</t>
        </dd>
        <dt>GPRS:</dt>
        <dd>
          <t>Generic Packet Radio Service</t>
        </dd>
        <dt>gNB:</dt>
        <dd>
          <t>gNodeB</t>
        </dd>
        <dt>GTP:</dt>
        <dd>
          <t>GPRS Tunneling Protocol</t>
        </dd>
        <dt>GTP-U:</dt>
        <dd>
          <t>GPRS Tunneling Protocol User plane</t>
        </dd>
        <dt>IGP:</dt>
        <dd>
          <t>Interior Gateway Protocol</t>
        </dd>
        <dt>L2VPN:</dt>
        <dd>
          <t>Layer 2 Virtual Private Network</t>
        </dd>
        <dt>L3VPN:</dt>
        <dd>
          <t>Layer 3 Virtual Private Network</t>
        </dd>
        <dt>LSP:</dt>
        <dd>
          <t>Label Switched Path</t>
        </dd>
        <dt>MIoT:</dt>
        <dd>
          <t>Massive Internet of Things</t>
        </dd>
        <dt>MPLS:</dt>
        <dd>
          <t>Multiprotocol Label Switching</t>
        </dd>
        <dt>NF:</dt>
        <dd>
          <t>Network Function</t>
        </dd>
        <dt>NRP:</dt>
        <dd>
          <t>Network Resource Partition</t>
        </dd>
        <dt>NSC:</dt>
        <dd>
          <t>Network Slice Controller</t>
        </dd>
        <dt>PE:</dt>
        <dd>
          <t>Provider Edge</t>
        </dd>
        <dt>PIR:</dt>
        <dd>
          <t>Peak Information Rate</t>
        </dd>
        <dt>QoS:</dt>
        <dd>
          <t>Quality of Service</t>
        </dd>
        <dt>RAN:</dt>
        <dd>
          <t>Radio Access Network</t>
        </dd>
        <dt>RIB:</dt>
        <dd>
          <t>Routing Information Base</t>
        </dd>
        <dt>RSVP:</dt>
        <dd>
          <t>Resource Reservation Protocol</t>
        </dd>
        <dt>SD:</dt>
        <dd>
          <t>Slice Differentiator</t>
        </dd>
        <dt>SDP:</dt>
        <dd>
          <t>Service Demarcation Point</t>
        </dd>
        <dt>SLA:</dt>
        <dd>
          <t>Service Level Agreement</t>
        </dd>
        <dt>SLO:</dt>
        <dd>
          <t>Service Level Objective</t>
        </dd>
        <dt>S-NSSAI:</dt>
        <dd>
          <t>Single Network Slice Selection Assistance Information</t>
        </dd>
        <dt>SST:</dt>
        <dd>
          <t>Slice/Service Type</t>
        </dd>
        <dt>SR:</dt>
        <dd>
          <t>Segment Routing</t>
        </dd>
        <dt>SRv6:</dt>
        <dd>
          <t>Segment Routing version 6</t>
        </dd>
        <dt>TC:</dt>
        <dd>
          <t>Traffic Class</t>
        </dd>
        <dt>TE:</dt>
        <dd>
          <t>Traffic Engineering</t>
        </dd>
        <dt>TN:</dt>
        <dd>
          <t>Transport Network</t>
        </dd>
        <dt>UE:</dt>
        <dd>
          <t>User Equipment</t>
        </dd>
        <dt>UP:</dt>
        <dd>
          <t>User Plane</t>
        </dd>
        <dt>UPF:</dt>
        <dd>
          <t>User Plane Function</t>
        </dd>
        <dt>URLLC:</dt>
        <dd>
          <t>Ultra Reliable Low Latency Communication</t>
        </dd>
        <dt>VLAN:</dt>
        <dd>
          <t>Virtual Local Area Network</t>
        </dd>
        <dt>VPN:</dt>
        <dd>
          <t>Virtual Private Network</t>
        </dd>
        <dt>VRF:</dt>
        <dd>
          <t>Virtual Routing and Forwarding</t>
        </dd>
        <dt>VXLAN:</dt>
        <dd>
          <t>Virtual Extensible Local Area Network</t>
        </dd>
      </dl>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
