<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-12" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-12"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="October" day="07"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 174?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 181?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document describes an approach to how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). Passing information between customer sites and provider networks is referred to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of hand-off methods for slice mapping purposes.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control within the provider network, and (4) capacity management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. Specifically, the use of "Customer" is consistent with <xref target="RFC9543"/> but with the following contextualization (see also <xref target="sec-ref-design"/>):</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
      </dl>
      <t>This document makes use of the following term:</t>
      <dl>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location. A provider is responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
      </dl>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t>The main 5G network building blocks are: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as (Section 1 of <xref target="TS-28.530"/>):</t>
        <blockquote>
          <t>part supporting connectivity within and between CN and RAN parts.</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand").</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers.</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture. The following further elaborates on how Transport Network Slicing is
defined in the context of this document. It draws on the 3GPP definitions
of Transport Network and Network Slicing as described in <xref target="TS-28.530"/>.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices (<xref section="8" sectionFormat="of" target="RFC9543"/>). For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, Quality of Service (QoS), and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., via Layer 3 VLAN subinterfaces), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/> and <xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             v                          |    
  |    +-----------------------------------------------+   |    
  |    |TN Orchestration                               |   |      
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on RFC9543 Network Slice deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a RFC9543 Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (TN Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+         TN Slice UP_eMBB        +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+            TN Slice CP          +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (TN Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |       TN Slice ALL       +-----+  5GC CP  | |
|               | | |                          | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, in some deployments, in the case of a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) may need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deployment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (TNS-CP and TNS-UP1). Next, in many cases, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (TNS-UP2). The control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (TNS-CP) and Network Functions (NF-CP) are shared.</t>
        <ul empty="true">
          <li>
            <t>The model described here in which the control plane is shared among multiple slices is likely to be common; it is not mandatory, though. Deployment models with a separate control plane for each slice are also possible.</t>
          </li>
        </ul>
        <t>Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
(1) Deployment of first 5G slice
 
+---------------------------------------------------------------+
|                         First 5G Slice                        |
|                                                               |
|                +------------------------------+               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
|                |                              |               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
+----------------|------------------------------|---------------+
                 |                              |
                 |      Transport Network       | 
                 +------------------------------+             
 
(2) Deployment of additional 5G slice with shared Control Plane
 
+---------------------------------------------------------------+
|                         First 5G Slice                        |
|                                                               |
|                +------------------------------+               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
|     (SHARED)   |           (SHARED)           |    (SHARED)   |
|                |                              |               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
+----------------|------------------------------|---------------+
                 |                              |
                 |      Transport Network       |
                 |                              |
+----------------|------------------------------|---------------+
|                |                              |               |
|     +------+   | +--------------------------+ |   +------+    |
|     |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|    |
|     +------+   | +--------------------------+ |   +------+    |
|                |                              |               |
|                +------------------------------+               |
|                                                               |
|                         Second 5G Slice                       |
+---------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>TN slice mapping policies can be enforced by an operator (e.g., provided to a TN Orchestration or 5G NSO) to instruct whether existing TN slices can be reused for handling a new slice service creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>.</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
             ..............................................
            :                   Base NRP                   :
      +-----:----+                                    +----:-----+
      | PE  :    |                                    |    :  PE |
-- -- |- -- -- --| - -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
 N    *<---+     |                                    |     +--->*
 S    |    |     |       +-----+        +-----+       |     |    |
 #    *<---+     |       |  P  |        |  P  |       |     +--->*
 1    |    |     |       |     |        |     |       |     |    |
== == |    +---->o<----->o<--->o<------>o<--->o<----->o<----+    |
 N    |    |     |       |     |        |     |       |     |    |
 S    *<---+     |       |     |        |     |       |     +--->*
 #    |    |     |       +-----+        +-----+       |     |    |
 2    *<---+     |                                    |     +--->*
-- -- |- -- -- --|-- -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
      |     :    |                                    |    :     |
      +-----:----+                                    +----:-----+
            :                                              :      
            '..............................................'

    * SDP, with fine-grained QoS (dedicated resources per Network Slice)
    o Coarse-grained QoS, with resources shared by all Network Slices
  ... Base NRP
-- -- Network Slice
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do no interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. The following sections list few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <t>An Example of local IPv6 addressing plan for NFs is provided in <xref target="sec-v6-ex"/></t>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
There is no additional 'labeled transport' protocol on the AC (e.g., no LDP, RSVP, or SR).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>PE Underlay Transport Mapping Models</name>
      <t>The PE underlay transport (underlay transport, for short) refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and underlay transport are each related to different engineering objectives.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and two underlay transports (e.g., latency optimized underlay
   transport using link latency metrics for path calculation, and underlay
   transport following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while underlay transport determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple underlay transports within a single NRP. An underlay transport may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, underlay transports may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to underlay transports at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   underlay transports without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different underlay transports (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two underlay transports,
   each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without per-path bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate underlay transports is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Underlay Transport Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Underlay x--------------------------------.      +------+
|  |Transportx-------------.                  '----->| PE-B |
|  |   A     x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Underlay o-------|--------'               .---->>|      |
|  |Transporto-------|-----------------.      |      +------+
|  |   B     o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Underlay Transport A
 o---->>   Tunnels of Underlay Transport B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per underlay transport for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single underlay transport
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware PE underlay transport mapping model, the entire
   slice is mapped to a single underlay transport, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to PEs Underlay Transport Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Underlay | |
   :|  |     NS 2 +------+   +--->Transport| |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Underlay | |
   :|  SDP          |:   +------->Transport| |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to underlay transports at
   the granularity of 5G QoS Class.  Given that the potential number of
   underlay transports is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common underlay transport,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Underlay Transport Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Underlay | |
   S :|  +----------+ |:   +--------->Transport| |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Underlay | |
   4 :|  | 5G QoS E +------+    +---->Transport| |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" may be maintained by the transport
   controller - it is not necessary (or indeed possible for current SR-TE technology in 2024) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an underlay transport that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an underlay transport that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 28.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="June" year="2024"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-03"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-16"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-13"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="28" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-16"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-02"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-02"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
      </references>
    </references>
    <?line 2291?>

<section anchor="sec-v6-ex">
      <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
      <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
      <figure anchor="_figure-11">
        <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
        <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
      </figure>
      <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
      <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
      <figure anchor="_figure-s-nssai-deployment">
        <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
        <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
      </figure>
    </section>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <dl>
        <dt>3GPP:</dt>
        <dd>
          <t>3rd Generation Partnership Project</t>
        </dd>
        <dt>5GC:</dt>
        <dd>
          <t>5G Core</t>
        </dd>
        <dt>5QI:</dt>
        <dd>
          <t>5G QoS Indicator</t>
        </dd>
        <dt>A2A:</dt>
        <dd>
          <t>Any-to-Any</t>
        </dd>
        <dt>AC:</dt>
        <dd>
          <t>Attachment Circuit</t>
        </dd>
        <dt>CE:</dt>
        <dd>
          <t>Customer Edge</t>
        </dd>
        <dt>CIR:</dt>
        <dd>
          <t>Committed Information Rate</t>
        </dd>
        <dt>CN:</dt>
        <dd>
          <t>Core Network</t>
        </dd>
        <dt>CoS:</dt>
        <dd>
          <t>Class of Service</t>
        </dd>
        <dt>CP:</dt>
        <dd>
          <t>Control Plane</t>
        </dd>
        <dt>CU:</dt>
        <dd>
          <t>Centralized Unit</t>
        </dd>
        <dt>CU-CP:</dt>
        <dd>
          <t>Centralized Unit Control Plane</t>
        </dd>
        <dt>CU-UP:</dt>
        <dd>
          <t>Centralized Unit User Plane</t>
        </dd>
        <dt>DC:</dt>
        <dd>
          <t>Data Center</t>
        </dd>
        <dt>DDoS:</dt>
        <dd>
          <t>Distributed Denial of Services</t>
        </dd>
        <dt>DSCP:</dt>
        <dd>
          <t>Differentiated Services Code Point</t>
        </dd>
        <dt>eCPRI:</dt>
        <dd>
          <t>enhanced Common Public Radio Interface</t>
        </dd>
        <dt>FIB:</dt>
        <dd>
          <t>Forwarding Information Base</t>
        </dd>
        <dt>GPRS:</dt>
        <dd>
          <t>Generic Packet Radio Service</t>
        </dd>
        <dt>gNB:</dt>
        <dd>
          <t>gNodeB</t>
        </dd>
        <dt>GTP:</dt>
        <dd>
          <t>GPRS Tunneling Protocol</t>
        </dd>
        <dt>GTP-U:</dt>
        <dd>
          <t>GPRS Tunneling Protocol User plane</t>
        </dd>
        <dt>IGP:</dt>
        <dd>
          <t>Interior Gateway Protocol</t>
        </dd>
        <dt>L2VPN:</dt>
        <dd>
          <t>Layer 2 Virtual Private Network</t>
        </dd>
        <dt>L3VPN:</dt>
        <dd>
          <t>Layer 3 Virtual Private Network</t>
        </dd>
        <dt>LSP:</dt>
        <dd>
          <t>Label Switched Path</t>
        </dd>
        <dt>MIoT:</dt>
        <dd>
          <t>Massive Internet of Things</t>
        </dd>
        <dt>MPLS:</dt>
        <dd>
          <t>Multiprotocol Label Switching</t>
        </dd>
        <dt>NF:</dt>
        <dd>
          <t>Network Function</t>
        </dd>
        <dt>NRP:</dt>
        <dd>
          <t>Network Resource Partition</t>
        </dd>
        <dt>NSC:</dt>
        <dd>
          <t>Network Slice Controller</t>
        </dd>
        <dt>PE:</dt>
        <dd>
          <t>Provider Edge</t>
        </dd>
        <dt>PIR:</dt>
        <dd>
          <t>Peak Information Rate</t>
        </dd>
        <dt>QoS:</dt>
        <dd>
          <t>Quality of Service</t>
        </dd>
        <dt>RAN:</dt>
        <dd>
          <t>Radio Access Network</t>
        </dd>
        <dt>RIB:</dt>
        <dd>
          <t>Routing Information Base</t>
        </dd>
        <dt>RSVP:</dt>
        <dd>
          <t>Resource Reservation Protocol</t>
        </dd>
        <dt>SD:</dt>
        <dd>
          <t>Slice Differentiator</t>
        </dd>
        <dt>SDP:</dt>
        <dd>
          <t>Service Demarcation Point</t>
        </dd>
        <dt>SLA:</dt>
        <dd>
          <t>Service Level Agreement</t>
        </dd>
        <dt>SLO:</dt>
        <dd>
          <t>Service Level Objective</t>
        </dd>
        <dt>S-NSSAI:</dt>
        <dd>
          <t>Single Network Slice Selection Assistance Information</t>
        </dd>
        <dt>SST:</dt>
        <dd>
          <t>Slice/Service Type</t>
        </dd>
        <dt>SR:</dt>
        <dd>
          <t>Segment Routing</t>
        </dd>
        <dt>SRv6:</dt>
        <dd>
          <t>Segment Routing version 6</t>
        </dd>
        <dt>TC:</dt>
        <dd>
          <t>Traffic Class</t>
        </dd>
        <dt>TE:</dt>
        <dd>
          <t>Traffic Engineering</t>
        </dd>
        <dt>TN:</dt>
        <dd>
          <t>Transport Network</t>
        </dd>
        <dt>UE:</dt>
        <dd>
          <t>User Equipment</t>
        </dd>
        <dt>UP:</dt>
        <dd>
          <t>User Plane</t>
        </dd>
        <dt>UPF:</dt>
        <dd>
          <t>User Plane Function</t>
        </dd>
        <dt>URLLC:</dt>
        <dd>
          <t>Ultra Reliable Low Latency Communication</t>
        </dd>
        <dt>VLAN:</dt>
        <dd>
          <t>Virtual Local Area Network</t>
        </dd>
        <dt>VPN:</dt>
        <dd>
          <t>Virtual Private Network</t>
        </dd>
        <dt>VRF:</dt>
        <dd>
          <t>Virtual Routing and Forwarding</t>
        </dd>
        <dt>VXLAN:</dt>
        <dd>
          <t>Virtual Extensible Local Area Network</t>
        </dd>
      </dl>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
