<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-14" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-14"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2025" month="January" day="06"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 174?>

<t>Network slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 181?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document describes an approach to how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). Passing information between customer sites and provider networks is referred to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of hand-off methods for slice mapping purposes.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control within the provider network, and (4) capacity planning/management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. Specifically, the use of "Customer" is consistent with <xref target="RFC9543"/> but with the following contextualization (see also <xref target="sec-ref-design"/>):</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
      </dl>
      <t>This document makes use of the following term:</t>
      <dl>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location. A provider is responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
        <dt>Resource Control:</dt>
        <dd>
          <t>In the context of this document, resource control is used mainly to refer to buffer management and relevant Quality of Service (QoS) functions.</t>
        </dd>
      </dl>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t>The main 5G network building blocks are: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as (Section 1 of <xref target="TS-28.530"/>):</t>
        <blockquote>
          <t>part supporting connectivity within and between CN and RAN parts.</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand").</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers.</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture. The following further elaborates on how Transport Network Slicing is
defined in the context of this document. It draws on the 3GPP definitions
of Transport Network and Network Slicing as described in <xref target="TS-28.530"/>.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices (<xref section="8" sectionFormat="of" target="RFC9543"/>). For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, QoS, and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modeling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., via Layer 3 VLAN subinterfaces), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/> and <xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             v                          |    
  |    +-----------------------------------------------+   |    
  |    |TN Orchestration                               |   |      
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on RFC9543 Network Slice deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a RFC9543 Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (TN Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+         TN Slice UP_eMBB        +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+            TN Slice CP          +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (TN Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |       TN Slice ALL       +-----+  5GC CP  | |
|               | | |                          | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, in some deployments, in the case of a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) may need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deployment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (TNS-CP and TNS-UP1). Next, in many cases, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (TNS-UP2). The control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (TNS-CP) and Network Functions (NF-CP) are shared.</t>
        <ul empty="true">
          <li>
            <t>The model described here in which the control plane is shared among multiple slices is likely to be common; it is not mandatory, though. Deployment models with a separate control plane for each slice are also possible.</t>
          </li>
        </ul>
        <t>Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
(1) Deployment of first 5G slice
 
+---------------------------------------------------------------+
|                         First 5G Slice                        |
|                                                               |
|                +------------------------------+               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
|                |                              |               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
+----------------|------------------------------|---------------+
                 |                              |
                 |      Transport Network       | 
                 +------------------------------+             
 
(2) Deployment of additional 5G slice with shared Control Plane
 
+---------------------------------------------------------------+
|                         First 5G Slice                        |
|                                                               |
|                +------------------------------+               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
|     (SHARED)   |           (SHARED)           |    (SHARED)   |
|                |                              |               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
+----------------|------------------------------|---------------+
                 |                              |
                 |      Transport Network       |
                 |                              |
+----------------|------------------------------|---------------+
|                |                              |               |
|     +------+   | +--------------------------+ |   +------+    |
|     |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|    |
|     +------+   | +--------------------------+ |   +------+    |
|                |                              |               |
|                +------------------------------+               |
|                                                               |
|                         Second 5G Slice                       |
+---------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>TN slice mapping policies can be enforced by an operator (e.g., provided to a TN Orchestration or 5G NSO) to instruct whether existing TN slices can be reused for handling a new slice service creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity planning/management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>.</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
             ..............................................
            :                   Base NRP                   :
      +-----:----+                                    +----:-----+
      | PE  :    |                                    |    :  PE |
-- -- |- -- -- --| - -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
 N    *<---+     |                                    |     +--->*
 S    |    |     |       +-----+        +-----+       |     |    |
 #    *<---+     |       |  P  |        |  P  |       |     +--->*
 1    |    |     |       |     |        |     |       |     |    |
== == |    +---->o<----->o<--->o<------>o<--->o<----->o<----+    |
 N    |    |     |       |     |        |     |       |     |    |
 S    *<---+     |       |     |        |     |       |     +--->*
 #    |    |     |       +-----+        +-----+       |     |    |
 2    *<---+     |                                    |     +--->*
-- -- |- -- -- --|-- -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
      |     :    |                                    |    :     |
      +-----:----+                                    +----:-----+
            :                                              :      
            '..............................................'

    * SDP, with fine-grained QoS (dedicated resources per Network Slice)
    o Coarse-grained QoS, with resources shared by all Network Slices
  ... Base NRP
-- -- Network Slice
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do not interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. The following sections list few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enforcement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <t>An Example of local IPv6 addressing plan for NFs is provided in <xref target="sec-v6-ex"/></t>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
There is no additional 'labeled transport' protocol on the AC (e.g., no LDP, RSVP, or SR).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green),
de-prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfill the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>PE Underlay Transport Mapping Models</name>
      <t>The PE underlay transport (underlay transport, for short) refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and underlay transport are each related to different engineering objectives.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and two underlay transports (e.g., latency optimized underlay
   transport using link latency metrics for path calculation, and underlay
   transport following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while underlay transport determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple underlay transports within a single NRP. An underlay transport may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, underlay transports may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to underlay transports at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   underlay transports without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different underlay transports (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two underlay transports,
   each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without per-path bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate underlay transports is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Underlay Transport Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Underlay x--------------------------------.      +------+
|  |Transportx-------------.                  '----->| PE-B |
|  |   A     x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Underlay o-------|--------'               .---->>|      |
|  |Transporto-------|-----------------.      |      +------+
|  |   B     o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Underlay Transport A
 o---->>   Tunnels of Underlay Transport B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per underlay transport for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single underlay transport
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware PE underlay transport mapping model, the entire
   slice is mapped to a single underlay transport, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to PEs Underlay Transport Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Underlay | |
   :|  |     NS 2 +------+   +--->Transport| |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Underlay | |
   :|  SDP          |:   +------->Transport| |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to underlay transports at
   the granularity of 5G QoS Class.  Given that the potential number of
   underlay transports is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common underlay transport,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Underlay Transport Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Underlay | |
   S :|  +----------+ |:   +--------->Transport| |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Underlay | |
   4 :|  | 5G QoS E +------+    +---->Transport| |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" may be maintained by the transport
   controller - it is not necessary (or indeed possible for current SR-TE technology in 2024) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently traveling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an underlay transport that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an underlay transport that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 28.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="June" year="2024"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-03"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-18"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-14"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="20" month="December" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-17"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-03"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its Associated Data Models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document describes an approach for structuring the IETF Network
   Slice Controller as well as how to use different data models being
   defined for IETF Network Slice Service provision (and how they are
   related).  It is not the purpose of this document to standardize or
   constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-03"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
      </references>
    </references>
    <?line 2294?>

<section anchor="sec-v6-ex">
      <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
      <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
      <figure anchor="_figure-11">
        <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
        <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
      </figure>
      <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
      <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
      <figure anchor="_figure-s-nssai-deployment">
        <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
        <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
      </figure>
    </section>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <dl>
        <dt>3GPP:</dt>
        <dd>
          <t>3rd Generation Partnership Project</t>
        </dd>
        <dt>5GC:</dt>
        <dd>
          <t>5G Core</t>
        </dd>
        <dt>5QI:</dt>
        <dd>
          <t>5G QoS Indicator</t>
        </dd>
        <dt>A2A:</dt>
        <dd>
          <t>Any-to-Any</t>
        </dd>
        <dt>AC:</dt>
        <dd>
          <t>Attachment Circuit</t>
        </dd>
        <dt>CE:</dt>
        <dd>
          <t>Customer Edge</t>
        </dd>
        <dt>CIR:</dt>
        <dd>
          <t>Committed Information Rate</t>
        </dd>
        <dt>CN:</dt>
        <dd>
          <t>Core Network</t>
        </dd>
        <dt>CoS:</dt>
        <dd>
          <t>Class of Service</t>
        </dd>
        <dt>CP:</dt>
        <dd>
          <t>Control Plane</t>
        </dd>
        <dt>CU:</dt>
        <dd>
          <t>Centralized Unit</t>
        </dd>
        <dt>CU-CP:</dt>
        <dd>
          <t>Centralized Unit Control Plane</t>
        </dd>
        <dt>CU-UP:</dt>
        <dd>
          <t>Centralized Unit User Plane</t>
        </dd>
        <dt>DC:</dt>
        <dd>
          <t>Data Center</t>
        </dd>
        <dt>DDoS:</dt>
        <dd>
          <t>Distributed Denial of Services</t>
        </dd>
        <dt>DSCP:</dt>
        <dd>
          <t>Differentiated Services Code Point</t>
        </dd>
        <dt>eCPRI:</dt>
        <dd>
          <t>enhanced Common Public Radio Interface</t>
        </dd>
        <dt>FIB:</dt>
        <dd>
          <t>Forwarding Information Base</t>
        </dd>
        <dt>GPRS:</dt>
        <dd>
          <t>Generic Packet Radio Service</t>
        </dd>
        <dt>gNB:</dt>
        <dd>
          <t>gNodeB</t>
        </dd>
        <dt>GTP:</dt>
        <dd>
          <t>GPRS Tunneling Protocol</t>
        </dd>
        <dt>GTP-U:</dt>
        <dd>
          <t>GPRS Tunneling Protocol User plane</t>
        </dd>
        <dt>IGP:</dt>
        <dd>
          <t>Interior Gateway Protocol</t>
        </dd>
        <dt>L2VPN:</dt>
        <dd>
          <t>Layer 2 Virtual Private Network</t>
        </dd>
        <dt>L3VPN:</dt>
        <dd>
          <t>Layer 3 Virtual Private Network</t>
        </dd>
        <dt>LSP:</dt>
        <dd>
          <t>Label Switched Path</t>
        </dd>
        <dt>MIoT:</dt>
        <dd>
          <t>Massive Internet of Things</t>
        </dd>
        <dt>MPLS:</dt>
        <dd>
          <t>Multiprotocol Label Switching</t>
        </dd>
        <dt>NF:</dt>
        <dd>
          <t>Network Function</t>
        </dd>
        <dt>NRP:</dt>
        <dd>
          <t>Network Resource Partition</t>
        </dd>
        <dt>NSC:</dt>
        <dd>
          <t>Network Slice Controller</t>
        </dd>
        <dt>PE:</dt>
        <dd>
          <t>Provider Edge</t>
        </dd>
        <dt>PIR:</dt>
        <dd>
          <t>Peak Information Rate</t>
        </dd>
        <dt>QoS:</dt>
        <dd>
          <t>Quality of Service</t>
        </dd>
        <dt>RAN:</dt>
        <dd>
          <t>Radio Access Network</t>
        </dd>
        <dt>RIB:</dt>
        <dd>
          <t>Routing Information Base</t>
        </dd>
        <dt>RSVP:</dt>
        <dd>
          <t>Resource Reservation Protocol</t>
        </dd>
        <dt>SD:</dt>
        <dd>
          <t>Slice Differentiator</t>
        </dd>
        <dt>SDP:</dt>
        <dd>
          <t>Service Demarcation Point</t>
        </dd>
        <dt>SLA:</dt>
        <dd>
          <t>Service Level Agreement</t>
        </dd>
        <dt>SLO:</dt>
        <dd>
          <t>Service Level Objective</t>
        </dd>
        <dt>S-NSSAI:</dt>
        <dd>
          <t>Single Network Slice Selection Assistance Information</t>
        </dd>
        <dt>SST:</dt>
        <dd>
          <t>Slice/Service Type</t>
        </dd>
        <dt>SR:</dt>
        <dd>
          <t>Segment Routing</t>
        </dd>
        <dt>SRv6:</dt>
        <dd>
          <t>Segment Routing version 6</t>
        </dd>
        <dt>TC:</dt>
        <dd>
          <t>Traffic Class</t>
        </dd>
        <dt>TE:</dt>
        <dd>
          <t>Traffic Engineering</t>
        </dd>
        <dt>TN:</dt>
        <dd>
          <t>Transport Network</t>
        </dd>
        <dt>UE:</dt>
        <dd>
          <t>User Equipment</t>
        </dd>
        <dt>UP:</dt>
        <dd>
          <t>User Plane</t>
        </dd>
        <dt>UPF:</dt>
        <dd>
          <t>User Plane Function</t>
        </dd>
        <dt>URLLC:</dt>
        <dd>
          <t>Ultra Reliable Low Latency Communication</t>
        </dd>
        <dt>VLAN:</dt>
        <dd>
          <t>Virtual Local Area Network</t>
        </dd>
        <dt>VPN:</dt>
        <dd>
          <t>Virtual Private Network</t>
        </dd>
        <dt>VRF:</dt>
        <dd>
          <t>Virtual Routing and Forwarding</t>
        </dd>
        <dt>VXLAN:</dt>
        <dd>
          <t>Virtual Extensible Local Area Network</t>
        </dd>
      </dl>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
      <t>Thanks to Jim Guichard for the AD review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y9aXMb2ZEo+h2/oi474hEwAVAkJXW3xtY1CJIy50oUTEjd
vhGOcBSBIlktAAWjCqTYjX6//eV6tqrCIskTbyYMt0UsdbY8efLknp1Op1Gk
xSR5Fe31ousknqS/xkWazaLsNrpKisds8SkaTtJRkke32SJ68Ua/zaOPeTq7
i/rLxSKZFdHl4PDd4O0w+pCM7mfZJLtLk3yvEd/cLJIH6PxyOp8kU3gQ20Av
HxbxLJ9ni0J632uM4iK5yxZPr6J0dps1GvP0VSOKimz0KnpKcn47TubF/avo
GD7l0HaR3Ob6a/40dT+Osuk8HhXORxxcfm6Ms9EsnsKix4v4tuikSXHbKZI4
77y468zyTjrvwHTzztHzRr68maZ5DhApnubQ4PL8w0VjtpzeJItXjTFM+VVj
lM3yZJYvofNisUwasNyTRrxIYlj2dbbEFe81EGR3i2w5hy8/nPeGe41PyRN8
OYZFdqK3Jz8NrujNsbwhqETDZPEAfxuNeFncZzAi/ASriW6Xkwkv4P8sfn3K
fy1gt950o+Gv8eJT9piOfsWHFhluazJOi2yBn7PFXTyT7X0V/edyls6ThdlO
fGKUFgD+n9NkRp+y5azA/egt82KRxvhdMo3TyavoU25G+vMv3FF3lhTl6V2n
o/t4MY6uMwBYkX/NtK6T2SzJvYldABIBdOy8FgseZ/2k/nM5SeNZ9HY5Sj7t
MoO32Wyc+aD5OEuLZBz9H9jjcTZ1ZvLLBHuvmoczkXfZPfwdR6fZchSP45Tg
UQJQML/3sOg7WnQVIHT8KXfdvdGu/5xRuy6chDJE3i7TPHrXjfqA5otkEedl
sHxIJsltNktHhAeAEEkCp+saQBJH4ySaxNB4usTfR/B8O8oPZxZy7+LxIh17
kBvO43TmAGwCU5imd8tkAlOUWUyXi3Qyyf5cmLFp+tAIfngFf+6LYv7q8HAy
NU3wgcNGo0FfpDfLovLU/Gd2P4vOFvGnxM5xuJzNnh7iSVK1wcMCjnqORLE3
TRYCBN3q5B9j7OrPT/F9llUD+PIBEO706VP2UIbsdXpzAwQXwMfww28drAPA
R72H9MGb1mW+iJOJM4kUBuje4AB/XtzczKpnAWfo1xj27NMyLU+jD8c+tsO+
L4r4MfYG7cczQCX/uEFXfx5hyzrEip+i/4RbZVIe8CcA5K+ZgyVn8WQS5+3o
w9923YIJDNP9BYf58wP3Wj2d02T2FJ09pkBYiydY3qw8q7+9jXqf07hwQPGf
8ad4UfiwuERSkOQeVbyB3sf5nz8jBncB3UvD96ZpEZ3BwUx/iSvwIP60LBIH
HqdwYONJtkjCkb1Robdi/Od4sRgt8+pVv8t+GSf3MDoMVh72dJEWaX5PB1xO
1+7kbkpDdGMc4s83Bc9jli2mMMgD3JENvNPNJ2j34k3nNMs+0XvnpbwIcAjv
spt0khgyDNCLhk95kUzzqDefL7J4dL8XtNZbMgpendI3Ho4C7J6iQVIki5zX
u0Pj93fLX5F0xE87NjxdwAUBKP+QJsFzxFVEx8+Oj0PgxIs7JLpI9XIgey/u
ujlDJBaAdGFrgfrBsx+GneOT7otnR3UQ/jCM5AEBaxQvRvewvaNiuUiI2Svu
E2TV5OfmizfDVghxM9fnW24FTBDYozeDwYa1IWsYT7ond/M5LWqc5J+KbD7N
xstJkh8O58kovVVi6X88SwrAybwb5/PP/zt3f7kc/+nk6PlzA6Afui9Onq0D
ED8A19csviPuNYpnY1jD6D6BG5D6/A+8NEfAlwLhWuZJNIpzoFL42CL55zJd
ULO8BLga+NSBpxbO/2VwO/7+hOD2vnPdu+r+/ObH7t8Gw15vWAe+0nPcMoJv
or/dx8tJNIhHnxLg/x/TAuA5jnoO/jEEh9lkSRPFuwJ58OjZ8+6zZ7vAkgft
TZDjG1WftHeI+Ajbkw2wfXx87GYdYKMIsh6EcoLN1Zvu0dGJOxGFhvwCx2kI
9y+QbJCC3izTcTJJ4RYxy4PVuYurWBgt6s3wXc/5UpDjB1jJE67jyJ1AxRru
8ild14ez5DFfZPDmcd5Bhgkw9XA5n2TxOD885Cl3HmBO3fn4lhZ4eX5+/sOz
4+5R77xqlfpT9K7Xhyt2BFxa8RQ14VOejFrbrAwHWDP7o26aJAkOQzsgIxzC
F52jOGHKd94fXF/WYSUyWQDnwfIG5Cu4ccdpBhcqUP7beIRMN7a1X0Te+dj2
tqGFrB1oDZ7JFo3mi7SLd+bhOHuc8Y7Q5P7x8I/j7rN/HD87+vEfz1784+jZ
iDen0+lE8Q0SpRFIGiq55zA4ohpw93F0m8RE2ov7uIge4xzk7GIBdGEEZ+/m
iaj9CYhqb5JZwqQNTuiigA/5fTqPBovsFzibUROpUwvawp1PF/RMLuhuqD6A
q8OMD+J0CnjukkS6YoDj036AoQCJAKhoOhtNlmNshlNi0PVGoyTPjUaiCYe6
1QYgLxL7XR+/QrJhdQvmtw9XrW6j8eEeAAGy/5JIOZDGEYgISGt8VQdM0y4E
KCcw4DhX1XDogiMgXPcIV+gQ+NIZTbc8Nlz5tyDFiN5DIQLHbQbgTB/whOQs
5kfZzS/0XQLA/HBfNY9FssTrBdisp+hmmU4ITDeTbATTGbEmZvJE2o5sBm/g
4TFulQ4AXMIDEJ2F3bQGo840HY9B8mk0vosQTQktcNgQZrTWhFY7C3BM1EPa
cxtmgby4bKO33ht4JklmBkQXy9mI6Xzz6iJvRfFokcFuT5eTIp1b1IjyJRBq
QNxkfAc9TrLlGIYB6hdHowTPVs77j+P9DMuEGyWxW9v8GXCG4bojCih3xSdH
9jN3d9PD6xuEO36bfE5z0ncp5hSObiwqsiibF+kUjgDuGAJ94oNJtD/R2+QB
ZcA7ELl5hObwbQ/AlN3eJgvYYIF8Too0WGHGE43TaRveVaM8wigfZfMET2o1
4gLeQK+xdys3f/sNqG6HWv7+O5y3cZrH0xuQ20k4s+pBAiOuHXAgh+NR7l4f
kC5f3BUz7nERP/L85oA+U2TLdY4P8SLN8Ky5DJjBDgAo71oioNCu8XHqGpED
8GJWAE0XGMjOjQHy2QJOE3epCApPAEtXPRyRrzE0h5XDASuWc5JNQWwe3ROw
+ymIZCluF9x/LZ1MMevM8hSmo/SIYZ2zxrJIbwDfibDg7G4XICvQA+PkFjgF
Osy//fa/ri/6P754fvL779HjfQqIafc1PJXpTI9fkXwucIaGfCH9AHReZFPS
anrY2bVXH6BnPRrF7unIovvsMYK5RTi5UH0cL/RUwTJwhTC1Ej2iLcJe6Kjn
tiUcJOYSYZQyLgFqZssFPgudAjVY5kU2hW5zwNwKEFQjIyPMbXrXSWbjTpHh
H9onZPAXgIcMCJ82QG8Ag+o1R820m3Tb/qGmvQXMJnEYWFIi1mnBUgLM9SGb
PAhuhtAh4MzhTk6JZuAjwGc18e/gvJMjxZOD0usTpXP3LM5zeJMzaSB4BEAC
XAMcX7L4By2RendoCsiaAuTp9Oj88nsEH5z+AhcBkJvApk3gKMxGTy3ASiBM
0U2cA+/z12x4mOPWLekORPwaYf/58hbQK8W5wZ4i9k+eLOb7tO+9uRiR9r3P
8fD8v/ASRmrVKb0+XPEelH9ZNSrkcn5Vb2Pt4wfU3/BsEH14AkJ6gp8Oap9e
YYPIPP28cwDfrXt6Vfqi9ukH+i/4oqEzlNdBOPOqn/wWDRq3r5jiToneDhRD
3Z/8FtxFNEQkO4rKXSiowy64xXFku/Db8WQPgmXZz34L7OJAF4oP4Ts4PPxY
OKcV/nTAD3ldrK4uooMuvA6i/rnC6gBOn9/FQH47gMdXQRelWTijhrOQJYWz
+AawqOwiRLlwR7wuvhq16Pz+9ir6zqe4LKr9aa+GRkf/T90xjYbIlOR7cF3Q
tx0g0nezP+0xa7j3O163NXyd3mdjvitcsgnvi6c5X4NRsUjv7ojlAh4vGFzo
FfITwCvABfoXIIghVxk8hb3PJ/FIeDhnbq4UhNdhSs/CSQMaOOY7OybdXFW3
bSLfS7rqiFPrRu9grSJ24D3BrExu+ByU6Yi+EyNQPedm0r2Dy2wqPWHfKlXE
yKYg/92iuxpuBbhcQPRoR9yGmJb/fdk56/qWVh6nQ9d8B/qdiKT9++9d3i1Y
oXLGAKdZEpHwQfcDzMFqh81UJwkJElEvz+VqAnFGNM/wdXPYuRoOe5ctgjeN
21CGkIeGiRrVKUwjOk1GMar1pCEzI7OsiPBaRF6tyGg+hUFX5g/bOHdlFUfA
IiSf51meqE5VOJuwcYNbIHopnOERaIrcXMGiDgPCsLGLXHfmbfwEFPdY35y0
gXGV98+BHRgAB8AcoYWH7r/HCzATVmbNUpTfQeJYMBcW80bs3cPTHRBF9roR
c7j4BXzuyOqBSZ3AXqCIBVwy4o22iABp7rNxbjfDrHq+XCC48m751LIgvObI
Eo6YwUpS8vaycRQyfjw09d88ainAo5/SRbGMJ3Abpg8oDBiJk6z5LcR9IFnP
X758DrCAtR+afTlZ0/bEbXtCbXWqAFVhuxByxFFBF3mCB5GpR/MYUBwEhs7d
Iia5QTlkc56ECzQ3+DnI1LCswXkOglLzpAUPxot8TQfCwlcxqixpNZ9DJ/E8
RmsSYe0MtuFwanTpQJVQfzNmtTMdLOmI9mWYiE7gt9/+SFIc8qOACB3ahd9/
b+sP/8zyDuCNfGPOUocOSkcwilvl+BDOTZrq9Do6PaE8hOohyile+ZTnWuGC
yrKUqczV9YDkPVlC9H33CFHRim2ihxCSd5NOEERwpozGA3rIS1S80ehN4MAs
7+4DjHe0Mi/elGQUS7Nul7NxjC1U54BCLe2u6P+AMqkNI9CUwHDYQ4pK4jET
gBtYQHTa54tjnCX8xGgSp1P8mfXjSMhg0CJbwDsQMONZmk89Wd2VWFHwvI5h
JgvYpuhT8hTdZYDZItV4l3KmyAJ/4zukZyNSMxJq+fd7QjqZCUgS8KSnmIE5
jNPJUyd+ABSMgZy3Aa1hr58642Q+yZ5woSgVp3ivliEST/LMAwmxHEIqSKmp
6ii6V0HqQ6CwHIO7qpozvs5djHMehW2/QFUDqwBS/Eqo31wlULq+jZDoKmwM
MuDpBJltORkzEcfZBlcdnUZzHPHOukE74HImWgcx2dIR+S46k9mQ7cMDjLmj
gSOY5nWai7KGgW53XM6eig97rBeZ4V2OPZN06Kk/bpaFoy3JJiCFCpuDsv7S
ArSZJwnvF19SAATY4xy2C07jq0ZDh3zVeBX14LaGyxWPJArLRAyApMz4wkeS
S0QMBwrMgaLsdLjZkiG7jacEUO1pg3abui4puLswPSJPMkGkAoTLI9HkeJI9
KidCnZxh6Er68Gn8CTZO9sCHJ+6kAyRiEwhSdiym68w78OFhdeCF4U/uroCM
nkbNu6tTXh38TAtsvnjTb5FJwedDum7/pKUQpExSJBGwtvn9U053Hx2QB7lL
4aKnTcf25mqq2EU8uQtVziDW+KPD+s4/x0hS6LSGPNIicTVNc7m/dWy8SjMY
AFsOYOAEWVH4agC36xmycX0SS6LmGSwdiV3ICPRRvR01fxr0W8TI4d2PzN59
lhdWgVapJoKnR5lORJkG2G5zVfX5CscdvCwpx7yrpV2+99OcWSdk7iZPTMmF
oNwsUSMdTX1z+QK48ocYPvwVzyMgLQxihIq/ZsMW3kt818Mk98o65L2oCUsK
f0j2WjwyXQZ71W3CBrFHj8jkhbSTKSFZ+4m8IQX4LGQdmVc6SeTKmsruKvdY
khZdFua336CXDjYUolmlIEer4J3olqFNSe4FBug7VpCDCPvddyzm1mvt+WFW
0DNhJonCWmZKHDFg8qtvbGqjm7LComChrwZHEjxRqyesEjFK3nYgdf7t1T+X
WQELek36zyhfzrHjkiFNTgXOTEWb/hV9RC8AbIoo1sutiOpwmtHz7vNuefy2
naiD2Ox4Y9mecbqAXhxLTuXuvBJBXsVw1KoiTznLZh1nhLF03/VWjjA1DxIY
WEcAM/igi6OHauYqmMl3s8d1+fYrEUpH2YIJJuFKqbucURBlWm9SOQv9vP4r
b7vybTfL2atLNBLE0GSUtLXPafxEMAfWnpguYLZm2QR7G/lOTNiXM3EWSLvR
Je3BLWlLyF6aJ3f4ACoscC3LWYoicttpTwg7TsngBj3R7UtmEmTNEr4lUPxA
XRYwU3gDpqOC7CNXF0ZeM/yE4S5p/WzPdOyYdCsosISzpI6IqEsz9S3giwII
E3z1M0BObls0OHZAhFT6D4fyUsiVma/AU27VHHcgZpuOeBLgqVgkc7q/CuZ3
XObGN+rGeJyWczKEL5LEMiaiCHgVnfXbOEUGrDt9vKmtob2asHH/yPBWmuNS
z5+BiK+1/fnmglBFWfFSrWVDFLn8CYgo0hGYokcObacHDdXabjfCKmqUdK5r
X9jgYfNj9vUQNVgPvN2U8NnG6urC1SWXt8LR6B5cXazsCCXlb/BBR3DWE66v
4oN9PFz6Q9UH2jOPyeJxyQQPJ4JWdtBh/KMPFZtA9pfTePTpJpsl9DOaNeio
rahBl9bUjfTvKrIwo3ee+h0a7NOD+5H+XUWrwbmMS+9Wb37Wj9Q/9m3/v65/
6h17tv9flfT65uOqcrlB75seD+b+jXtfN/cSIvvIzZurH3wrw5EaF4C/E9a+
2hx8hp7Q8ywn+XaNRQH5sS9yelCWrpj9XvbWuieewN420ySeObZ8vt5ZqIR2
E7bMWh0yfafmX+lklHhU3oiKjiIBrQFoxKU7ipSny6KBz1ivJPHqqvXg6MgK
gGmr5g4bQZNi5jQh5iUP5qSqq0DxlHy+j0H0YvXId7ALFdMyQDZjNBoVj9Uw
pT4TqPeiaJR8lpSt3aqGVfXx4VwVgryK0SKJicVgtzHsCYRGFPXSPJuI3tY6
MpBmAf2DyF+iyObomUHiFkmCKPyyjlyFw5T2mGPomAkwurxDQA40tpvfSaLE
q/bd1XsWg2cxOpfFOcy2RQKkCLZk2Rf9MrORso5oDy/fBLV7e+zLgnvnzB+d
yBXNPsCdf40XPzB4xs9PdWNL2NfF5ElsE44XAvSqrPlJBWMu21byOgLY5P4G
xeHmMJIbhlhdec3PqBcmrWwqO2F+uI+RL0oWyNuMYBGOJKLeSY5BYZ4sqAsE
tc9xG/gK/m4iFc5JYakOVTLRHnBv1N+eIwrHMkRa55EoRiYRIQMfLxYhrOrn
drkgZUsyiW+yBYfgzMgmWT/lNG8EUnadfoGYcfb4yhzqNnaUi5UEGvckHJVk
e8cqFAr1H1xaVu8GJDQBAMnnMmk37paw67CAhM4NnNoMY2Z+rYKtPQC4557C
DaQFV59EHk7eeXnVYAUKoNUknX0yxhMaNXkAui3hpJ5N8xQOOEjpl6JUA4Hk
MV6Mq5+6gKcQErULN0dCkXmcoNshTxhwXyy/dtoquVmPOz2yP+CD/9s1eXiy
kiuEGiuR3lEwEpNj9A/mrjG6Ykl2C3G7NZsCMhogy3Q5Ra05P80QQ9N+CuIr
rAg1a3LweAjoSWQpuFRSfhdOp0s2nZzVqHcpboA+giLoUsy5CGQ0WDze442c
4WnJzY+AQHBSg7Xj4VuMWWeWw/7kt08k2k1AuLqDY8Nus3c2PgA31hCp3LH2
q9DeVpgBQbCbMyJ9/41vV8NZ3QBjSzEYqCSbpmN8LxodC47tupLW1JN2Kwog
a/zTmxCXRZJbcvdk5WDWKsjy+KCi8E6eBMoDET82U/2EMfRESgBzR/5sOIYm
dRlW9aqeoOCoWItq86fri7zVqDOs/jUbGs0XXqmNc2fHmh/OYek/3yesnp6I
Xjpf3ogxmv1JnbXgIpMZWp7G7KTvQGR0n7HetvJ6uE6UsTsjM4bcE45dA65A
0kfA1RGTFGy0EmwT0vb8eI1Gk6wdGeHh3SbB3FG1GNddAKixGjwABVR7c+DB
Zx3GgpfjYVZ+aSuKS/K0As6r9ofyrzKZM74fy6/aHzb++AWvRpWgg69qSV7F
9XKrBklPLoRVcnPAa0V7lbXKrRryk/HlczqqeK38v8afz3Zk5nugHbnalvDH
0q/YUeDktlqJW1/gUef9iG9Czzx07Vt16bVyfPtK3n3WuY9/bfbPW35HFTOy
fytmVPnrN4VRFLx22TW3o2+GkJUDf9GLu/pjafASlQp+f+0rBoREqnqgRFuJ
5TBngTCZVJjB6dngexhY7Qu1zTj3QQ6M9YyZV590B5Yl3zxLF4yxoKE44c+V
r4ZRDvN4P0NZUgX5CxTDXBvukxDxKB6P6caG6w+u2GSikSesXBZjJMircJ2a
uJucIzlBgFTVvm80hbmhORhHAUZCDJnopwEHru1ZUBy9N/2GvEVitN/GS+Zy
AL3Mc3Wg6J8rl++RfDWVXdVMyzq1G6cxMeJM8P6iOI8lPC6eGeKZpqAoxzAJ
q6GeB5e+Z33z6uKnSzKozQr0vbGk14YdNvtX+MhFfLMAfo+jjxHIMBNP6d8b
XOYttWe4rkIIOXOF35NShxkPuyzkPAwblYxDvEF3sAiJmyIPWhN7SBk5llBW
GwjSyjF5hgFin32Ii/oHMPL3ltqbSmZseWg+M/5Sld2TMwRsEqr9YS7qlBf4
2VHwAjKcs2yKUT4Uz1ARrYPBOiZWJx7R0K7U1j/P1exGphN7dAUf+ES05TDw
wbgF1H4EdjBnEY3cUNQ3gkNE0K4iHK0Vy0VOVxYWldkLiZ/BRAywPR/RmyDN
OdOJ+frsI7sMfIRjGg3IXVSxM2p+HFy0kPnSvbTezY6ly/UiaZOTDfSLkhNN
/QYxqaOPG/cb3UBy27C/8zD2SPIIN5m0Moih6iDbjdqrUIXVLj9sEEYFw/v4
wbopoHbKGKAS1o5lMyCqy4VxsRIWtTxh1MDSDOGyJz+cc+ujoBPlKJlZhgIN
cNXIWSheoqAQq6se2g+Q5KnN10bgQAsOa7JxMffxfJ7McqOTmzy5nh4IyiJP
Jrd8HAwA1PdGOnWi17CJAnZwXnL5uaNYX0SpXNTBqnfhUwutzfamTlgoeWm5
iNc/3/sPtW7yVtWdVRMCdvNkNoQMzCbYkzYrN5oj3XK13n7gVRkKJC5QMpMu
eW9Z3f7YmyQhfGUEl+cLlM0kgjPmzFxG5DaiThx2zPYC/BHhxoc/agoxkmMv
tEG/PmlpvJntC+kskpzeLGOt27qVBMzCi2fW0BkwXQdVvFP4DDGKDsNfyR/i
l27Uj3CXxGZE6xq5EkZDOG3nVdPI+Qgs+oEsRnjccKyQ9eVGK+mN/v6p9CqP
ZRt5EOr1HXACXahqdP3hmkYa/rz1SF+ypv1u1zl83e7+NtCTd4A6Fb/XNPoi
NPI4aw+1lb92bG8BEalnoH8m7RqlHcgLybKCl7GcWeQiBue5nFtgDOU6Rr8I
42v/tneFvHKqjFZOnncAEaTPdLU5vVXyJNw9n00vmlsvaTIyd+YZ+qtymCb6
reOEiiV0Pck7eDMP2eHEaKPkmYeXUXN4/fBS3f5/+PGHl+gpKyTvnkIulnAD
PQL3NkMvLYCgmaMQqTy45wQQfhyNGz6iU8fJAFNDySiAMbn+IOwKf3/GLtPL
NCf9ZvP6LAc+AqOc0K+6be6nHO80zOpQzU2Y2wjuqTS3BJXghpCB5btxLn5Q
MmkVMVIU7m2ygGjAtol7XesYidvMN6zHHogQ84q5DeRv11NfuEhVp9+hrSBE
xL9LCnq6DXS9fLOqXq/a+cyEORw9u+EoEfvFiL0HgT0vqWuYOZ/PiDl3GCIS
ZkrrLzLvniu5226IGC71527g5YB9jlhYA/iFU2aJYmAkCvJPHJyr2vOBw38M
0jjTV6+pkmCoCFGRWiJWzieOZAxgsxIMnpMjPCPDqeE6ev3c5/o3sUrQq8Mt
bcclDf5lXFJZeGK5wnxf5TQlUtWgnpkST1hzCuLgHCg/tffO8s5ChvYCm4ez
n6hNJl9mh7VSyk0nCVUr8JdzG+C5Il48oCimu+aIbFtpy2eFZHUOV+8KMLHn
IPQGxJJHvANy0ZFbLYuuvpmmLTZBG17LcS93hQe6TEiwRDzFBUEzs3HW8OvS
ThJNObYrZ59JoWjhxv53YfDWMhZRVMH/VWg8w1HMt0bn6TWq4fDeze7Gxolo
VW7kanuVyTPx3az+3XIk/al6pC9aUyX0Kvi/zY3ky8G58/HL0Kj8CB4+n9A1
/htgaAkJXSmk4kdqRB0BOyfKOX+4cDdRGKBGobdggDdnfQdvTKPQY/DARdGD
6M3PDoY6I/l+g+sw1Bmp5D24cU2AhPVSSMWPHob2Q/nJ2ScfQ7dEa+8j4p5D
3r8IrYne+zgtqiBfwHnxLJBq8lCsGawTay5nrL0nV/RItfgVcTg2oE4YG5yP
sJzEcdIdKcGpZMh3piDcgrBkdVpP5suA/WEtOnPoVVyK6n35liNeEyalSt1E
lLrEeakSV9QaIiIEnBw8h3JaBU9WYsNMcOGIs25WaEYEOM2Qs8aJuYz1XCeK
mrlskmIaRVrJYa9/6LN3DgfqxSIWJWODa/j2sk+pFGfZG2SDMCEwRlmwU9Kk
QlZay8Hl6nWCuuy+x9znovOXByWK1Cxg5OTagZYkcXGItMhV7G4owqObvSGb
5/HjHSdxiA0mdUaMSQbEpQaz4rHy+VaYXcqTO2RhVqhV/dveTQLov9hrC5to
whTy0KnQ5a0rnJC4H4ofmEyWqqIm4OwBxdxDRvCCRiZMqtDXKVI5SrieTtvI
r08d4+HiGRRQ8MBzrA4qb8kPyM1chz4pb3tXmEKsx2EhHiBMDGRq7Ue8JnLk
BAC+ByZzAkzpT39DBcj5T5eVHaEIJ2CDZ7ULWMuZ45JCahf2d7VCPPHUddy5
OvB6Qq8XzX0jKTbwS5NHjZUSBEUTYyUOTxEmP6xL17bL4aHwqhiV8ugkeuk4
ZX1KkjnbWGXj85QRhjJHIJ2CeZHJk+ht5z6bEu3RLGeCiqSOBuC0Q5Rk4Frv
ZqeFUXFpEC7PoAszDOQFk41N4ZN8ZrsUy6Ho0FSkRj3iSbrVUvJMYm/mGq8q
9i4+iAh4pvdEtacZpxKdETjItkDe8L67DaLeQ5o8yt1CtJAvITRwnXMo0Tmm
+iXnPL+xmxDYc+Zmo7hcDXJn2ugfvI7uJtkNHAmbP0/jikqmYQqQdmKa2Euw
GXc/deNuybW4pd6Hv2bZFI+NG3lHQWU64H0ymZOvmpL50O5gsi/WJsyz2Qqf
+HDHcqGZDTHZC3V5gWHDyaKnN6mdYc195nhxeYdMBWFjdWCiGD3vfl/hnM2h
e9bJjNINMC7Ljdhm0Ds44DtxW1yAtTVxI4bvW1Vh3H78fbhjubO5ksFBMhxY
Qyv0TOAUEzoRIhtl67krfygDWTvxR83nMeyUOL2Ly+AVkIM8oio4mUmJ4OTT
ZDqBIWbEaV4xgzdjHVhiF55qGLVxmHYylHO6dmUMxPOB03fw9Ou8I/AszScp
xVpkESwGOdOOia+b0YWhWQsNupT8CM2i3BQLrxqNku7yfQVNpqQCtTkj2v7V
skgoqTDdgj7u9I2jQ9S8GvaJy1PHFi9jQ1J7+moUa6VzPkduib1SZQRPl1dk
d+wNSgDD3IVdJ48Cyax1cMC9eh/uleuMI1sXJCYQqFAgZkx+3Akji+f+IYyd
72LSjs7FCaECn+CkGc8W2JrArUV6AFbl8p34F6hrrjcj61FMRGxEpldyv7Eu
AZZ3wBhTXd0HEzqyIXGQn2fVn8o0vbsv2IHBj8BGOMXsfXGfUQWRggQeEwVW
URDLO8g9NCuM089Rr/uSqaGT68Tzdd0gi1YKq/yq72AVKR2r8+vb0IEEb1bq
qLbqIAoi9b6kg4fdOyinG9yxg5VEnAiZU0Px+g78/fIP6UGnIh2pt7lBAsYV
5VgQkt/aMINVRQc7waCqg/JrTYyx18EWUcWl9XsdrOBorvfQLo8uUzddlNZ/
UPeBvjBdmA5Wgb/kaiVHF05Uv+LXig78Nay8/a38dfVNl4BPVKFdNSquyvtg
drZqt2u+/fYdVKFdNSo+OB34J64m4Wj1b9gQtc7+efTeeREIq/Ap2gnowJ2l
PqTE1KidXeqq73krHbdx81Cvr2raoOuVpq5FJ/Y/yl6SBzvlpl2bnNZzYHe9
16vn4AxZmkPpwUBXG4LBvLwvXKsKdlCp/S8jkfubaSIzqLAErO/ANAkNIjvh
En25wbfdcJu1r5oOGMM9BgTRd+v2278adrjgVZ9T+18zEVfPrnKjKts3aw+I
4f5wtcEnv6akgGMEDsRWECcpU3+eG+lrPw/Ej+HyBsQFl4m2/rdXw+G7i5bl
HZ0cuSJQv2D2cdd8uXVhxOxqlJdCZjEzrqsjMnHGyDavqfthrkavL9e/xeoH
Nc3XWTKNF5KPjNKiYcans4HkC1a/fgzfxNzoufhrP0dACFCOSjy1+n5UWQEC
wwOqlNNpOqHo5f55h51WcAK+pKmhqy+6x36+TnWn4Nkd0eyOKZuYzf6OAtLz
UgBdhR4EAeOlKfKxLVRzidRbXUDlwiRqHCfGBZXld8rBww7k4m2GFWzzV4H4
iZLmOefTM5YD7NZJNUT6EJB3Ayf+zGnB6YnULUeTFOrAmrDpRnWLRZSy7IrJ
kXLxHfMdvlW/7JozzBgDGaNCF+MMi9uwoLBdm960WvmgsRwXua84bRl3tXUi
u8lZxLrAblnXgUC+9g0UlfuJSpfBeUX1n4qlGWme3aVmyKu68dcvuydh0lkQ
hUumP9U0VGiFnPFEhLfFJ1i9wIPq+n2/Q+uSJ5H9cCgVgTq3sVQnUU/MnQC9
YSDGwIGY2jwNtjU8UsIssi/MEk0r0nDLXdD94ShIHafEmHNfuf6UbpJxtNZ0
GpdneRtNKvF4DPsOxPMwp2sBvj19MwAWbllks2yKl49WWOwNW9EV1ZaGW6EY
ddG/EqlGZdkR3J9G6LZebXFyyxHm9aaTdaAnIwFtd5dmPrXZTg3QNK7a0SDb
vUnFdxWT+uIZ5j74mKP7K0X6u6m4pUe0oMC9rRuijrEvf2TCuMZhMQ2Wmrox
4hGe8jGWpv6/vas3nv2TMtANLnMlMd76yGJQfQUilVskZB8CnHqkFASaaJhM
2a8sL/GcQ/piqZHiudipuzJcVHBkKBOEs/UNAoNE+6u3n9WqNU3AOyIh4CCn
9R8g4b1NP1NwHtpLG6Q1i8kgpzjgatxzyShn0wGYs6ocCxHkylIB7yiVG7E6
rTInQ+98XmZ2k3aeYswCFMkRLxOqDtqbOyZxaK8fx8PWTpZpq4arL1JhXxWq
jYMqxUmd0OuoEOirhieqsCahpmn4FTUNdAj4A2WVRlQ9PHuHzzVLOvZSsQ98
rBwu+3oVGO5aUbnIx45w2gyl6h++pmk4l1Wd608o3xyUoqQf6lyNQn0ECp1+
erPuETU9+vG4+6wL/z884WD57jO/RAs1NVJ796B/vkaddmASrtWMauBBYQ5H
z54ZIFWMGgUpF9a4Vbn6Dz8FQLSpqZsvsCJ8fCu/rM7XBYyHTd2Nx2vJRZaS
wPlcpc2+e49UZg669vL+yJ03cG6ONXIoyG1an6VsR6ysdya/scgmFQ5+57LG
JneKMfhnkkqNE5evG0dzqbyirv4Agg58e/Wq0VO/slKmLRE+sFtxC9BRbWKW
JncjCYA000rbDYhEe2syQ1G8WvR+gZe9cc9RxsPmZXHMsD5fhpffEsNglU1z
5nXLyVnMys5n9zixsSZsP11k8fiGKlkk705PW34GLw27TqdUcpmrmIGQkzjs
h0IboSRZ23ITbJhOgQdJKIPtOwKQPg5wkpxbxsJ1g5ZpZsiBSE8lOY6f7ApR
4TZd5AVNj2472kTq3JQBf6f7U8YAw79IDlcR+hRgXawMKn45TkhuTZFKqlHZ
sgl8rCMKQ1+m86hphfARGtwRayTsJNzUIMAG+SHpzU2qR3WVOLMQJxwC+UUi
fDQtHjsTuJ430o/Bu5eId6zOiOvDqc2R/ziBoYAUTFLM6BO9zR6BmWNnO6wH
vJxpkaHmx+u3b/stTdSm0LCyp129rXWK/+ZGg3B3dVqOCHem2Ox/7Hwc0Nyk
d2DzMNZBivQd/pLSRwGt6y9QeYpofYML6Yt2AA6FrICSCbiTF63BAsBOOSRo
AR5GXilGfuARHfpjz002vaH8V2gadveYvU7FFWeaftb0ZMk4yGEFDG42kpzt
XS38p2oGpTntMEeTQySEwJn0k1SqSBKhYZWm+uPUtFyyD02zTArh1Uxnbk8z
r6eWO3GbDJtcX+ZSygtATO5oo3gidU0wk2Pbie4XGmMOHIeqEQjfRa9fR1fM
HVfc0ru9ypyUeZl6ZYQ5ta/AjrDVhA5KPWhc7dVJtNqiDzSpwaPaijgzOkHG
jqIv1YLDafiHuxDzIJwS8ZE/sE23nYPp6CCEwyazdMVDHhyOt4fDsZ0DcFAM
iX4ZEi4w+oPSjh1EvXffChJekzX29bqHAhbyC2AZ1fdQmyDbechvvR1ONwJ2
9IWyo0fkDycOiXSsm7oRLWUl1/Cb1a4odZav2ldFH7BgCvM0ibK/rI/aT9v3
4aTo+uI+VnCS/0E39WankPXzOPiKeehKVlvvS1lq9/soY1qpC5xqP5lMjGHU
W0pFB6VTXb4HVpt8a/jna+UZXPplh9ngHaM/MwZKH0zJeSsdSrSuD29YtI2v
mYghgr23b+UrM8qLN32ijauKRGxbLWaXiayFiP3KQoTury+BSLTzRHQUPFM0
7KpCJXDwBRDZdP5Lr4pBqiorbzitFQhf20fdBVEeYiNdLq8mvCVe6i1xFdwS
R7vdEjD0lSPOApM/ogCVCu9n5ddBdgcumazEOVXbm2Avt9AwW1CubFZNO53d
YNQ3JrKgyJK2GvkeoBuWW9xM3MHPJddjTEMHUgGSrdik4cZOnDAQzqM8Se5o
JTaBLnC/qoNxJAzJbpaw8C6ykTDvftlYTbZ9ZUOmUCBP55377BZN0ChdUxQJ
evMbv33DwIsD8Zxy6DryR5HZcrFOxDiBMijmayJtSGtQlczVibTJk+2dy6uC
ZzgtbXSBCgfL2Evdg6GNaPQ0VY56gkKkXPGlpFpKZ6NsMZeU4+QbvEm74+JK
t+Erm9AMnk09PwWTm4N0AZy3aeJleSJ3+E7/oz5I3vw0FSKfbF4MZXDxPXfE
8P6At98aGm0BoHiSAcoZb3qVV117Sx6dH7Wji6POiP5dtoFB54ACEFhsjgQA
zUPyZGVvjDZQSRfk8HgxFmEU8/c7h3ePdkXTyGsG7iUlSpd08mpG5BxldChM
0BG6oXBZAieMVdD1bYIBm76iT01dlXq+73//nZKUmEA8QWCzaTVFjG4VDT2H
8yxMvUI+3BcdKVkK72APbV4331UfTfG+rtBUzvWwLkeqOtQ+8e3HwVGrC8j8
uSAMm1K4miVv/nQw5SR0PPZnnmcTMSRWxnLFJGM2aQHHrWDirs3OORxG69Dk
OR63jAeNc6JM0JkHT43xW87HsQTtplK1TsP27BpeeRoUhU7L8z+yyTKbtB/s
B8TKEKAsXOssLPTMKfdmgvJlvYpVp8TTzM2VInsIv0/STwljK4UAYCXo/5CS
bFxQTErV4k5h8r5u5AQ/inlYgCzK53ASt5p43irGCHTzLKeIJdblWB+NI3Y1
+u23qzfdoyN0NZLT5iTewRaOsq05HH7osA/SLBNieeboWTFcanjWamm9VzrO
VKUCQMOBcZOnbsQuOi/eYO/csdENWRQwlSQQiTElpT2JLEdiHewzD6N93GlU
5LHe8bVGoxTeP3W82poetntV9LCJL6vpYVtNiIiL7uPSw4qOjKONAdpjRBBz
3Kwahh5ffds5uAvbALl/KRxc/dzHEAxIiH04fPx2cCg9vkErVbY4bwRVCXJ1
Lerli3KTndAWTi9WkvcPuJMa2twQrlOKxwD9+/wHPfzPOP/N4V961+dnrcjH
Wudrs+7w8X9TkP9OFOQLxvj6dX1bDJEAmY2749o3fAw5NvtWgSHHFkMYQY4r
MORr5vD1cHBeX0i1vvy1rochiw0byHeV59Bur5KO7HvVkfH9gax0qLNwLr11
ISShyXqeYSUtazg2qenZR5s1Hsihs5bIxC2ToF2KhYQHNfEByVwcb40eCQXn
JxX30pK9epGYvFD3sLoJJ7NGr1SerikYqMoAKoacF1qgh6tKkKsHrYiSUmId
yoKFJ3Id8Hx4A7WgUVqxRzAW6MKCaeGTIFHFTyzomNDsdMY1fAFiIEMv4mj0
NJqwKixPkk+O4RvePMSUuAn6Eo2UyThSWyH92hmfPVUlOQm07MDkOiToGXcq
b76hTFpVAd7RbGAXRrlxDwvsTNBNpvPPLNcIFlvFo6IuO1np1RsrenuMCTPZ
A/r5y5fPOfMQVTk4cX45oV90h21lq+qSVq/UueDDvck76q4VwWhAeMsIqTsr
/tbisCz9SHbPJ/Y3k+pgVORbi47Z/qznupQQiaUTreLgVHBw+1UvlAWwmtSl
01HXOnL1ScLXmhlc3t6pspH0B9eX6EJ8jm8QZlqnnHR8ZkAW/LsM/0M/I7wF
r+KvzI3OX2xdvDE+AIFpdkDOoe4DCOTi9oWZddqcDlX6Kg+2SPLlpMilfrjD
kXOG+fskpsyoMYZsjD4lhXoYcb2xUTyH5qjKORwn9oO6HM0yrOWB9VmIDISD
t4RqkYfOBGgC5XZapNMwpgAw5a/ZUPRiMgGun4bqu/kkTr0kKHAo0JdRPdfk
9C1ZNwswZwxmDMWxw4QdsG2LNLmdPPnn00nM8LwiMQMfrQuYSuduwTNSb3qr
8SskgMU/LKhwyqZJkU6J8JLP2n48nqY5+nxq631E4n2pwCrN8drTgnj73UgS
1aamuowGRcnt4YRSqC8XAPUxHXOECpVqN05ookgkbHR9yLz2pXzBNmZPa8XC
FPDqSMad7PbWjRPRNXjBYGH1Didfrd1LgNV9NuajoQU0AOgzQD/U1d9hnIzc
oFhNj9RrlDwJPrakH7gFBCpm6XhXKDxyWwQS5wQ3rE3F3sbftButiDvBSE4n
abj6Okp9P/S9FNOPucppXsFxT6fTZIyKe0S/RYbusJQyZRovPjEhQPJPP3UA
Rjex2FlkHm31hyTdJt61mOHEU1dKr4Ryj6ILRbV6Jdij9Nai2h1c7HQtj0ZL
zDvMOnRYEAOcCy9RkI/iOZEAndN9CnctxisS2cL8X0tMIXMI4v4cU8mYAEQ2
abQ9FONClqZSJ1tznDqdjsHOPJZv2ierYDXodZEtnFTPcJsQzpcOo5msEyyq
qA3NlEpyhkbr+ulmZC73yV7AWknJRqE5vXE++S/phjKrMZHqZ/Ei30ym6HrF
nJ6zbObEwSg+cDQMUHGMLKrNc9Q2FVDEQfrqeoCZtonI7aGFDL/Z86w3IYPT
alMWrJn6a7OPbwWJEAoh8+brpy6x+TgTVX1K9bNIMQ0XU0EELqz2mmvfGOoM
d6Ik8IujW7jwGEAudrfovmK+h/2EcRssJtL0NoCNNGFLcuv+wcdetIhFPT1i
bR/BO7fABUolM99wYTOkk1c/edpbWoidEYnEaDAKHRSOzR1XV1JREcBdlEU0
U7h1wtt36IT0kYUDe085H2vMd0upaxOT9sq9AgBP6fHRuiG4/HIyy5eLavKm
uBzUDV4WKRticRPQZR7N3RyVSBWnQOQDLvFTzjeudMKXUu7cStgbwOVOCpiP
AO63S1s7XGfchklKHzLVmMk28tlIWEGkiidmLwzJIQdwjifnJ0aY7nGSxWNz
ucMIeAVialSQC8cPzM5+OOfgzhRFNcE0wwvrki1nwG4LsXDX0BHfmjRFJ67V
GdibIjlKAJrjITnvvxsAMGDHx5Mnp5zE3FTmGCZi6KosAH18XJMEq5xle93L
a/sqKr9OhS5V/KTu5qxLeFWl7Kh8HZjHjcKNUqjw+Ns7kr6ixNarRqcTwX8r
+pf+W0X2fe1/K+dtI7rCDv/wR7OEHdxZcTmv/9CIhuarlddF4Azmf3QehVl8
VzML+Dtw5uR/9Gdhi8iuwi4iv4vqH1eNP/0pgv+scvV1xtGN/Fc/BR/lr2jZ
GJxfNQsGZzUsNnWhsPiuZhY77MhxzSzWvrxZlLFzI2qWsNPpdfczElmd8zc4
qZGdxfYvedzrYn83QrXPV94fMD2IEOpbV8JENqNp3TRs+Pbcid1lTz3qKAt5
PxKjqV/b1saSYCy9Lx03iNQa+ij77D1Tin702TlbG1e4zt6EUoQgpR+KxMba
NHGQGBq+cY3+dCDcnl/KroqZ5Hy3XKlJXZCIE7Rprzljg6kXKDnv6Wpyc7uc
cLpa0pU9O35JN9OH6ozKqkjAmbFbHVdTdbKJilZOlXBtdnCUOlKTBTCdTyTh
dLR3TApdSkK+YIUNh+DdchJqUecdff/SJlWHL14eneAXFIiEGloJEkT1ZxT9
BZ4jef1UhJozyWvIKk4U6OFXTepqdZwl1zo3Z+fJcecGeMRh52o47F2yGkac
O6LAD5J1mvKkutVgDCzGwwm7atV/6koI3QxZvU08uhMBZb2zkClLPpNyxPXD
zEu9Ym9SORXDqkQvj/zkZ0yYlBZVykWnHpr1U9UUCpjGA3s1mTxIsnddbjCb
kHLpfUBoTnIUNc+GaIp9iCdLrV7mFG3W8gQT4Lqi2+SR1C20ecqSGkDrMnAW
Kq4GaV+9dOcCPuHo/WypEktqTRbaIfl6UsG3upS4eZBnddcUVTCXP/4vIM+M
dXSEVW3OJXVzV5XpQsGJW7bb7oQYS1lqpkwfzwYR4RcLRC2uYEtOrziy9lvO
TE/cvzrJaiLoe+hphEWD7zTjbp6YPmRg5KEt296OrnofWoTWWGmczBIUlG9O
J5/GB3hejyQfRXVu5JBtSQdduRttOBqT23QyCSscYDeuY7OXK4ro5k1CPqdk
cVJ4tsNYWC69ANcXoRyKzLSCy7OomWEt1iUeaPkqb4svHcgGn2ZIyOHw/DWd
/bXVDitqGfJu1o7wsMIBFTqwE6FzwltsX5ue+erEc2EnniHXsys6P/sP13VS
wQtV/eB14tiEH2geHE1k8jLQR+dn/2Hhh6RHXcTBH4Jh6O0fDryFSV6KrpPf
8erC78RPLkmCke3k7fHh2xO3E8xX+W1m4sAEU2EqTMwZsTDhn10m0sCkZis2
feW9tnKw+poEFt5YB9FbMR9Zrsc9tfag1pQGaTBPWuL1vONYUabVmOiJx/KJ
mbUYOxkZ+w5JWh9kco7KXOyRKZdJkhbbAp2T0qJFOdrr5/+Bze4pCiR1KtGT
1oh8bkXPnnFGAKHfpR5J9Zs6RUErmISyGY5KNKjO1jHmufe00CZMp1TqoItc
8shwNG46NLiJLgecqZCnZn5qMoON7BDmPnRc+S+OrUm04+RrYjU2mTt5A89R
HY0pKq0tUDJkoRZMKvLgsLTTXpV4vDENr4UXxWiRSS7Mcq58TI3I7UjdCRuE
NWzpophQnRsM2yHmEaGAdw6nmBuRRQgQtUuafXJR5tgZYSfa5OZuXbOd1Fsm
cQXP3TB2FIqEKT9AOMJ0XG45ldjLURhPHuOn3LpsY0UC5AnbnDJS8obgEGJn
Yp5T+cFI5SJOqYG8hP2NJqUMIWdruSV7b2zADahafedbZpbSS1CCEdaCi6sH
2kWwm16/bQxy1GVsZTU3K5pj/DDcZBamfQsCqJxfmaPjwsw0jCEgqVbMoWkB
59HGvQfeLpfyvZ/xTNaVlQ04MIeboUI2smZhhz2Y5Nb/HhNzEk8MhyDDglZo
y/ATBxZxzt4k6BfDXIWs93IQcbI+7o+8AHivWTEKH3t9cTiBZwO+ToK+Kjk6
lmJYDgkZcGZfD8dorhNTups/UCdHE9nPbViOI27h8dW6pzb3zH38AMefk3zy
uWO+lbY2WQg0ycFGhPaLyBqOqIyUFNRBlts5sqWhmPDZ8rUY/6LWDDxUbeH0
yb6LXDkeObVfFFlLfV10ScSkWkWJBYfd6KuLiibzLCPXFQ9+t946LPmoaG/T
gdykXGkjdjejogWKenyw+cePGGGHUhdVU8NbZQTH8C5bwDZMNdgPe+hJDzOL
dW3J1kdyJi4lD4vpjuN5YeMGyZ5o+vZS2qLG4PvnqH8nYuRVvhDpUHbPiPfQ
oQe2afwJ/g0w0SGsVkztAA3GfSK8Yrcx14NBA9NKHlkiRdVI1ISmakXJiyRZ
kIxlDR2WurVRql4uyK4kjnhshc9maZFhO0mm8n6WuEkXcVqwQEO/XDcoccWI
F2QS4mKM1ltCY4s05s7RPpSS4pja9FIKXtd9OYBZ4zTffBh0PuqvpPkDUgB0
DWuuj11Brl6uQtpjpSo6np77FukxnKRXFWVRyMdQ821aWyQqRWRqbewALz7a
Gb7ibWeoSCKdE0W+odjZiajEIWeOPfsoeVk/AlZfUgQcKy6B6LBZjObICYXx
Zqbg2zwM5wqyQJlezj62IhMyiE4Y2o7mKoAnu54dlryiLKTbTFj4YV/QNKBT
74P1dV2C1wcZfr18++Wv7YSRioZGyvlimahOYpVJHNRIrHaO1RJr5hav/UNY
b7n0hX1lNKmSxEqWu1BijbaRWL92JhYmKJGukVjl5/8JEmsjE5SPmkTj2kzh
2miLaEmdUSmbSvpS27BaSnWI20YZ1WXLvlJC7SH7xqnV5bL1uV2uP89OjJ5O
j2ubiqPbLKuQY11KIKRZ2UxxExHZltIjT4wbCDl1C43Gq8aQpUDC7KqC/5K5
YW/iVgU6XWI2hskTl5DM04eEdaaikgeS7mQNwy4x7/5ygXc1hpJaIZaKdCX5
bB9Tho8y4BR/NeYAvLUCEYaz8i/EkcJA1mxcnk2Weglj9DysuBrOXWPJ8AfQ
cHYRHvGyvA1ujsvBw0tlbSgnubiC8JyU3YRrDOTAmfc0Z3A+Ov6BzCOkVIUh
JmM3l57Dm9NtKbYUeu4V4+uhplCkOgIY3dt6Ff1AjGe7Prz3VXT8nLjtFItP
nhzL81LCECZlOFdmbuy028oJyjKpogX7EZIlhmesdXWZ+2PutMgqBVE84oCY
ebx4svsg3RzSyPo8AYwlEA+QjnwqPqKY1eoiN/r5iZ6+bNaZx3C8yWzYxUnB
Zj7Gi7F0TykJJkWy0FK0FLdAXZKyhlh3YMbR5XB0n4IsN3ZsMqfAwx/9+IP4
CH//8tkPyEQBpRgtEnTtbPPRJVdPkAEB29l8aeu4Sl4PZOg1lQN5Hzl2jTyZ
Iks4Ujpl4cDQM3oJDXLIhXMkFkxBqRYIG+QdP1INS95wQnhRQ2CnJME8RaN7
8muCT4qYQmnCU4BWwFDqmGZjo4AxmGXEhnTWQaH9EUErcMCBKWeAegB6QgSh
382TVF2gGoAmeYWTB0Md+YgSzyKH4JcRSWeuaoeyyYpox8tO8vl3TrwbvRu8
HUZv4xu4pAIxHobJQZCvt8xUueU7jJ1V+tiUp5SoA2NukrH43Vql1dUFySqO
L7Jn4iM9p/jk6+MUMuEU5a3Twlk1Ez1BIQGkkMu9aACkHvUuxZwrEsBFgomn
OIRp4w8dwAE0vvk/ihD64ugZZlPlHEGUSl+zr0jWlifB09LK2zY/ioJ8QhvG
EpBcndZ5O0iErJVQfkFBUO12TiUA6xtw9EwrZnAQDWd29WosoJcDYoxxysSo
IUc2kfmJgZ3VGe9ZSdvTu+voWQx9k0Paq+in6wvkSOCPF8TiNjy1DW9sQyAz
rrsengcECqwK/RHIU0KSVcySzwUg8px5OiEBcWGs5NkSKyGkiT9q3446sqNu
PyzeRN7IOjDVoqjrxAqrtStYvwCbM/oIayyYTDJSFp7VirJNHSaZfVMtaJTo
pgeZWrzq5UO13P/22x/NtmgReAMxFQ7DNGHVrHJl9rzKWmjeC792ErSrda2i
AlqpmRPpW4rRXNfM+fjtmomb3rtB5/TNgN6+Xt/swJUgve8PfBj7zYx/HZEr
JgJcSy+YZ9jMVtTzNzOsrmebHUiuxIPynq8bbYUUAVAwK4OzYm1mTgfupMpA
CZArFKxeHFXIUy6IStU41qaz/86heXyXIskTsmwuUWXXTLotIqxM2VVEYTHE
k1raVYnPfXGg60/i1EzipvoyrwvpK2nwnPvRM4t4Vy2QmJoOlQOoSpXth1Mx
761iVyCxiCZf789sOl9qnj5kEDB4iBLYIwPUNPSQ2BkAgaMfbEeT5LYgyEa4
rlbAf5z1DylxNxsgvXrPIFskk1vVYMpUimxujDaYxo4c4WMgt9AnW6akc85n
jsw715/eMEsOZrPTbHWj9yYUzdYI0zBqlJol7FESMLEbXpl3QXnS510O9f3l
wHuujRXLeNqUCoxgXgGXcYayrwSSMkZ73BBn3RJuTNkWICJUXW8mOys2/Bka
Gmeh0aPG806taeRx6sru1DP+Yo+Xp7cU0qu0Yv3H8os7wYpWiPLyWv+xrhO4
8N6/+9MRnMc/9fb8j/v+x42dHONjp3v+x33/48ZOTvCx/p7/cd//uKYTv8zO
6z/Wf4LLbs1U9DW7z+Wf8qfa1xfr8dgeKp2USWPwqnjAk4Wgj41K75oH3Ec9
5/LNr5XzrsH61oCHqOPMDmxSEic9CXNlVdWCDQ/m/bQKnuK3XGe38+Codw86
ZW25/vRg5vZgNcHQCXX5nQ0m8Pyo2IlqZT5898fXf3z9WRTbn3V62MnVBXRS
7dHluXMdVHSC2nF/JsRL1cyE6xnXzeTAZ5VKMLHs3kGnWjuOTFR/eOQhh3ww
rK6n+idtP77tD4/t7hyUeKiQ8Tuo/0nxBBD189f6akWE79+ZCiv2bLEH0JIC
wRyynrt5l8yrEdX4fJWu2hoe0OpFaFhlqtZwgGRWttOSS1grio6fZvFUvImA
F9D+yHLqZmeV4Fu+1kqinlMskAvb4SjsQnY7SawBU0XHCPkV0ZiQwwczmmgq
dOZjZslGyNz4rrs21goexTgC84J77ai3z4PBTabyJGdGNGZbImwtXz1DvkUz
cTax9RvnyULF35vkPn5I8bEa7xkMfG6bOO4kGZNFXx0RCETMXTIAHI87/top
9oOd4N0dlN+BjSFHj+QzieJukgizGaQWofqabTcfpjE0l06CYDMPR7Vyiif0
6Bbj/+gTDsNTxmq+dzMuaZs5OQ9M59Zzy1dgBglZKnlNP42C8XIQbIKLv3Nk
oBuPYZVFSh4RhL5VmCST7u2JnaRtBR5h33WxwtDy8+iMw95ltoQNYis5WJsZ
oH2DMzr7iEzYW5oBJRHiFT1RfmVyizKsci6u4eILtMfjH+2xPX4McExGKGm4
ZZYozF7Q0+Am65G4PhbgJKnrRW8ZFwFk/fzZJWwjFy/dV9oCHIzRzOSOAOg5
WQ0+F+gsJiWqCPfkcXWF8r31zAaElv5AfwsjnAW6SzqPmsHcdbr3cN4Yz0o4
b0Ygo0RA5nE/QN6cWF+eerTV1ceFU5mLFGh0fOLFHfp6fpYaRnbFTrng5yYm
6uTlM0pYrlDXTDa8mrFniqKBSW9bcMEyh36jydLQg+Za1XjL22Y1bhKMxLC5
zzLtfglMTGUptzfNAXtCLIoLSfCgpDm2JV8tAFg3ffTjj9+Xl+wJW0EhM6Xa
dnMp+NlzShUtB+3KHWzGPPd8UUwciyRvpqrdtYbctqT84arJTG4QThiYbhWa
rmcxYoSmnm774YdrrhNNFVNOKJK7OYxd9UrfqFdGcPcbnYsbQbbupqiOZ2rU
JpRhFRKaMCco3iKdlKpXMMZkkmC6EwTRBLG+gb8lfubiXGsQSJ4Te0mO4sWC
oyfDWXYbHzL8IXlITVby0rBth53pt6sZFIFElectx3GhczRlOR9nBK6sXZPg
BS1wtxh4hKi6yKYNmj25xiF5ju/I7NbWwDDY+6mpbiDE2zGdYhZ72K4GIX1p
8Q2z1dvuKrq7E7bTxYAHMk8o3UneqF542yZt0E7JynX+tw//+Mv7gX+mu42e
saeiVfZy8PCcLc1qR6BaezmWIexdXHaet0gzJjaFtiFp2nvlstvsF2Y2DJfE
Njs5pKWl6Z424vEvMbLDNpdJXJEvKa5IH1Ln1ydEf+TFTPXQnM50AekbIXPF
WOICnfuZfAxjjBHE7GZRpRfa6uVrGUTdE6oerPqmbQD/JxC9qp5jDc3m51gJ
U/XcDtN/rQlKtlKFNewi33701lz6aGYMs8KJ/m3P/7jvf9xdbVTS7lTriL5O
CfTV2p+vVP18udLn3zqff+t8/kt1PrspffLKAL2dVD4tiUSoV++MSuqdep1O
f12mW2R56PIoEjZ1iMBDzmEJ+1XCH/GlGZLJB1Y8QG+t5tvhoEX8Gh5w8r6O
Re7czxua+U/uL7KwZbPQJIayK/BukrROHotnLHjoow32FynuF1i+o+KG7UZ/
SVhq8PRKzcDhJGzWajiaJ8OTWBkD+Yd6JsQwmDeJOFGxqWrPU07tRU2g1a12
g/UwTopPVFfV9y5KEeNC18WUl4bH41/zx3jeKLN7G+btqO+Eg5xag+U4LmKW
0YE5dpxcHU+3/ZJXxz52VGQjjM7REE4V0KDtWzReXQ9/GpAn1PAa/ToHjiWP
+pli4eIxa5ikB+MfVFpLQ9ciPD+aKOkncSoKHYqSOYlinFeNQVfABIgjN6x9
o+yKJLZsIzg6sJ5k2afl3MnnxxKMjaMqJk+NSfbIiU0SI1cg1aC0YpjC9pxj
PuCvKSMlW1LBxXOEJUZ71O/tWn44qhQDoh7IuO0Gx37gAd2md0v+yme6LYWp
MFtaQwzHNomdH1oTNPQfrRBkSKkOd1lq60/FNxNU8lB2aUCsi7W61m0VrcSw
iz9Cw6SJya1rQpBW+ndPN+upZj29rCYYZF+9Oi0tYZI4Oas/a+AtcGN0kQge
zOaGM5qIG6mHxQ0KcXJi6zRJJ1e8kthp56FKVZ7ksM0ZbzkvDSY80kCzUv5t
zU6jCYDJMRNbUOC1++uEvnBTc2vyI86NyPk/UVB7wMLey5y6MTnZTdW11Kjv
rOcGpX5U51qeFlU1Y0u+RDdVZdvwknY+UJpP3DPxekjKaVnEJP+YRbwexGAc
nTRFuBDP28wmR5bVq3uLpFcmIBFEqA90LtUkipgOc+Q6mUgT6ojdo/U7douh
x9HB/MVfLzV5hxNM+GHYOT7pvnh2hBrHXgQPkUe3FwxIi2A3a5sC21Zq5HqG
OAkQqyl574JiI20OF04wK06djwmq5JD2mXSp6M6Z32eTMXwLzNBS953tAc6P
iLWY15J16rhic/d4ccAtp7yfpiSKojfpQ8LKO2yPS6VsNjbhkH267ZQQ83Md
1TsJqcEnvcW+xRHR2zysabmwW6fdOEiryXNrMiaxNhPDWCk2VdJymRBVT+bC
9eWZ5NXywzDtpJDOuMhekwNVLGc4sy6nZFRjBxAPGyabEw+GYdqA/qKmD85J
ntxpfK7GKpgAxSAr/R1tl01nQzHaJre0ILgbjGrLDdgV2egFoJ6jcoA2YQEH
YdM60lzjLfJRNk/EduRkEuva8FoMhwH2aTa2Pvl01E1WsHbEB8BmVhrd5JJY
6Z8pctfjfDTvyJw0n9K5tTMoKZ+Kt9QDTIiSyvqBnLAIuMrxX/R9anM+UECF
UZonkqdhlC24HCjdqM6WcZ2+IJ9Xadt4W2mJkue0nIe8zGF3Pdc8hQunopDz
K3SSUhUBippAi2jfErE+przdj5ry1T5V/sQcTuTcht/ievaFhn64CmioFq/S
6hFXzh2zMYGul87ayfhuadohcOUYpm0qZWzuEvPa6xnixMUE2LW5iwWIfn4/
OvPm6u1KCq4UhqhL+EV2ezK2otleo/C5IwWKkG0cnKgx4sjm3Y6avAzEk5bG
S6Hifd1UMGCXj5IZXL7S209noP6IXsrmmqnYLCWSXpBNK4sxkWSkecoDhFmd
eTTK2Yi/S6wf0nV17DP5zbRURm1jMwjbqO+SGZZPlqiXwjkE7XXXPKkX6Ijo
VU7op6ytHFg/PGOZ15PybjSkXHgz2yFaXthwxIRB3CdNvnw6f1HzQ78l3Omm
o8tH0B5dEv3k233mMu8JumGtla7hE8scpZOZBIm2IfacQbA2VoZYR/J89bI5
NH2CiGyhghR7p+dadNOmGk2lTCBvpJwaDnZqs7UysEnxFJHLJrYq5EhIpGur
Cy3eOlKxhyRFkDCwVe3NTRqXyg02PtkGRONlIvkori44NQcD1krpNmKHa/IU
eiG2aO9SvVwp6vJJIn70TGZUF3xiuGk/DQfRLymI8b6Dy+9NJikbQD2phvnS
nByniDpq1W4nllSGEEk/naVYBoKfzyVXONvyYZIIQmEdJC0J8W4M2HY9ZG3d
b94nQpceCAifowuuNkLL6P785sfu3wbDXm/oRqsatx/WiJGwAiz+nMQLkXLX
SB5+JSUGCIoVNndquaAPXcsqu4k12VvBK0wLCCzpcsZMKV8pbK/C74lzsb8g
i4fVcrQ7EZ3CXo2h3DBzbgixV4AjntrMFKEHT2GSbAhvqCWJtNBQ8+Ko89Gq
Ux2bvmGz5bqhdRR2SCzjonMOOjeVi5pXJ6W+GZ4YQcrbFYLObHaeKHDwt1su
9hMlIHlTkXNDhG04Ku4lZaIxQWFkd3eHcAtYOd+bOIdwOu2AvOW+ogHJ8yhJ
H8SmLMl1hE+n0IW7WYapY4y7TdmEWTjKQKHsgfeEwl0kQb4yCF/l6EuliJAZ
II5BK1JzJYTIdZoQbo76a3P5l8IJfbRPevyCUiZNLlx7F0Y/S+nnKRIwo32y
jovJ2ElQ2vToFREZ3E/zwCuu6YwH691l9qGlGdIcRwvWDvHl7pactlMPyk1z
5jllezYvyIQaGwVqiuzveDnSuDzgVx9gyEOyA8CHnO1xmoNFtKpWE+esnz04
qP67e3vqpjYcGw0zeSiIY3AsZdg1m+rv0zZFOCRjDN0nQQ1w1vlK1oFAAyE6
IK/mkgdPGTTH1KuwmyM/JXfTFkppV7CqVJNc3PLquFxRuaT5HJkm3wEApuYd
8Lr4wt1eBxXNrakLc6OsfaEND8sXOP872NZOG5FXPhoSkbbY74L265Z3QM29
0LewuX784OyhM/uVPnE1jI78sbg6QO3wB9K8bnQ2IXNgh0uXuOYBGpTXwm61
xehf2XwN5FfOZ2/yx3by69a+xeiRA/lj29PB9pOvGn21bvInGyG/2nL0r2xe
A3nbqAJtnn8zyLs4f/LNcH7t5F9sBfno6yC/TfMayK+Cz97kX26E/A6jG8g/
93F+y+brR6+Y/Pf/nSH/w78E8i+qIE//vos/w5gwhb7UzeLfNt8yGy6pr7oj
197QX9R8h9dB4yKsW+LyR6WadOEDwPDU1jnBV7OqfIlh2ijer5pX0lCnOk7K
hUHJNSbgpdQxhkULLizgGiybJYGrtT5h2M/3idEDlcppSmiMida1yplev04v
ZWzGTkhyrgYmMwI6kJMurplK5Ja1kWhWqxqWmTQ3JDKiNb8jvusUyMIsM2qs
HM8OLjCb00jDa2jijmRE/PrByGc/mY3ZgOLKn1kNTy9MOBnzgIezpppskd6l
M0oEpHVvFwknoOQY9uGAqnDSTpr6miLHirq1JLS33Bxe6H6jFXUJrOw087JF
DuNoEhQx1wxToRGlbFy3qi31VLBcTgRFcknQiRBlvwo/djyS/KqCo9wx5nIS
y0+znw1brs0NH/Km1i67N2hO7DVVPyTwR4shbqgi6HhGhg+oRCqlexJUQWgB
cWcfSQPPAMfZ4XHVlY/RTsVlnkVvqdUanVgZL8rr6IVUy6kCPOUEc6SsIy2t
g1vAJkPneRa5NnvTlvJtbCbTEmnJizYlsDaOYbwit2ixIs+8FeDEh/6q4mYI
b6mOP4a4wmJeRZml62r7d12H/0Cp2oOz4r9rC+8BbbESS93KmR83CR8wqTUr
b8e/285LY9i5hE3CBzZluvn7F+TGqWwxiJ+omExFi8MofKCxalJCzUPKrtkK
WxzCI8ED62d1WDcr9wt3Pw5r11E5xoob7NLisGqe2+OucwYDHuDohV77eNWb
3GbRuXvg11zz/zJCQHR/B0JQOkDbtkBKwAdoY4vSAdrYAovovRcmIrLVNze0
EP4j2qHFX4QTwRb/JmhmLmGTfxO02nX8TyFoL0sEjQ7TtgQNZnFRY4a8QQMf
iwTiicEadNeCQIYWMmHk5OirJp9RYtynyCXjMdOexNbDvHKf24G8QYYB4pab
P1hLyCib3kiyaOswok5YL+X5l89NA3ZjctrgXNnzn+QVUyiI3J9usSKJmLSR
+7N8M3rh3QGj6CSwJ2Om6Vnlo9tC/EyB/xd7cwcGuYV5HlKA9LLQzyqxqbY/
9PVMZxRs0EEHmo4KyB0Ji1fHrxKPTe42vkOsNJlw57Hxh/PDgVk8mM2MHags
sLsJeo3JqdY61/Wdc3Uah65i4B6td4hNhS3XguLiY8b2woXYPF9FAg1i1QGI
9AFAgKZQrL4iv57j6k1tUvXiknosa+HpZI5GIBHWcy157rnS77u0ODLbqQ+B
6/v1kE2W08RViqjkAvLYmHwf3RIZKM8VGByLMcW0NfvW9VXG2icPGVPjHe1q
CCvAvH0B/V0WiwtbKoWteC3BUG6RdVFIaK/xTfZg8tzRuDHFpJL9EZ1wFhmZ
XzMK+lenNvRiDBO80nE2SRKWEzTucUK3DSHnAqe2nDZJwUEmNCe+RXdlbUF5
Te8pz3T0GQz6T03qhrEDEBwAI0HyTNykgnJeLGTGFKxBSbD5BHUpW7wNylVw
wvKQKDJ2YA2sGdY7vZ0skSQReZh54MfnyT1ADa1cjf3WTU2CPjs5i/FsWTRl
VCS1KlbDSGZAtDrZbcfoCM7OsmGLswajU9yCwq4OyS52G6cTWDy68AGyqOtS
Xkbn3OJHiBy51czwPLkLiVGwJtdfNaWKdXdA6/YUgyFyFuCD8qL0zi8wOrtJ
O08x7qMWDor6l9ev4PxPJUroEjF+ylt4jfgiHql3SxgMrj7UOGohmZb2McA+
Bkn8qbb5NP6cTpfTsC17edh1iFeOt7Wh33vmbqp4F1PEFdzUpNx5+972SE5m
JqO19eC/Gr5Xp61hXzVAFq+8SVUnFNjPLcXj0j2yZa7HN+chzzgtC8Xd6N7J
nW624WhxPFKTeIeIBowCNHeSLVpMRLjq00Jjrz9IzWSc2xSjh27iHKDlPlrK
/Km5S467J5q95Pj59y/wiuROL4tINsLRt8byoy0ptEjiKXbATuRmJ0hpllPU
oZMjx97r0k8Ts+Y8IuIBuDgEiajsmDyO8d6H46dXf5MPTsXDZs6mfz+J5QiL
/SV8D0q8E/nhvKcBIn9ObktJKqkU26O9CI8mOrs6gMYqSW3pJ0NlKoIBHRyY
OTCpW5RxU+UlME2iZQQCwl54USRhbk9wX+EGa2iMSVqvs1LfJ0qRRZUaMTZC
d0o9iqiC2x16PWazfUAv5LqCiVfeP+4VJNhd7w0sjk1wYcDNKulTjMeYC1uz
k+TPpVviJeKEN0/MMS9vfkHGgoJAhV4joyPLHy/JXYTytZgVEtEvuBTvk5Sv
rPPl0XN3vDiBc4dnjQ8d5j7feOweCa3JPZL8NYP6Yccvf/wB49ZIWYoRqVMc
HgOt4GRJtUtiMkzJctS5MiQx1T9x3S4JxJ1Ut3Kq6WD8xJlW0aylV2REsbJZ
IrSFXp0oegOPzCRdl3QLtAsgAhviPfh/E6RR/pN6mdPmwaoGQZtrjaLz2SHn
sd7MkEsCOVNnl1bSaXEBQozMPGY+Q7rxAZyKOLJvgh1vYeGz8eRpnyhPYYqr
wEBZriBSrhgY0PgT73sO/DX7HzmVoDMn5woxXc3+eUsRMaF09l1nNeRfJY7o
RBpBfsDKBYuSuFTJIkvHLsvJ0Z6E6ETNNMmLQrl5h5tqiM846RjOkk8H3k0F
uRESouLhCftwnMT4UCke2WPVfCKUYG9lIn6VPTUXRJXZkXKdLOCFFZE5gvxG
Q5uSyWiIebGYhrAjvZNzzeEENB4sGVsf1cf4qdbprTnL2JTlGNBDv8ugbWut
3eR79THzNHEmlkRfRE/FnHvgqCci77XSn1dGnxXqHVfmH/un9pHh5kcmdY88
mEdS+4inXPnj6w5P9XU0quvFjpbgn97aR+hPsfaRo82P0J+47pGI5w5vRpt7
uV/7CEF3uvYRgm6y9hGC7izaCN31i042bwD96a995Bj/pJt7WdQ9shN0l2sf
GW6ey2QzXL4h7q5/pPY02t9OvraX9ZTBe6xO/fm9qj8vJZ0Iu3P0jPZElULi
zrGdNwdrmd7rDVupZnKCjZQnEBoeam7W5hIQz4kpJikssoWh9F7SFU8CCiIl
LR+wncqKQyO46DWObNQgqAeDSwqDkZD9RU3tR33PqiKNf6J7GP9V14Vd5wCb
YGRGcTjAYUnj7HBnnvga13ZPDggqlvX6Eq86TgE+uA3Mbt4uJ7dYpIpge3eH
TEmRiB9/JK7tODblULxV9ptlQwwSkfgtUQShF4vLNkgvRjhou5wHxnEpgIyO
s9blxeGiSD0DK2qZ6F5Unwa5g11PrRKgDctpNB+4skmC2ToQ0EEkgaMVM7JF
b/aEYcjwB6Zy3Gt58Ug2MpulTluANb6TuChCMSeJpeHltgWRCmD1e28VZWRL
MHvp6mRwdlQn2xWBaJI2pdF6WM4Tk/pCF1Yx57VnnV1lKspL7qZ2bmv5XbRL
WOEDuyX5A4WBjoh8+aGwarlDKqr02KZLUh2HIk0sSRmSsQYzP1F8BnsXOey5
qm3NZNSpjKQT8h4zgETzTE9yp5COI5485aQM95PkykAgoGBWxjSf5puD8KUc
hq0ExxpxrUv2w7OXalOxvC+IY8oYs0pqZ9qKFwv2GYoCUs7Oi9xnwm9EYhP6
IrmuKPpFNPv5cmpy4xCRssl75IDw7uACdZ+4AxOc11b1C7lgfR4lImFoMjLS
+Ks2XeTyHioV+UKVuFOrAsYYX8QwbGcVO4vkF87CLkrKq2EfpjqbULnHmanJ
4ha4zk31VuyKMiJFimKUKYMKIILomRccFz8HcXE658QNVk5xmATlG1Aigh2c
Ax5w3HXDZUmU+Qgtrlv8z+tnBZyd5XOqX39fHQZtJhvbGH5Im6Q7Nenhv6Mt
mijudGijO0cdVKWY3wr8N0ForTq1L/REU+WD6WbA3TCUC8muWFnyxJmKs4AY
/z3aOPLh6u+2zSgyHPtXbev9F2zrdPdtTXbf1tkXbuvxt9nWY39bO7tvK5Vd
O95tW9Po22zr4gu2dbT7ti5339b0C7f15Nts68lXbyv9e7LbtkbfggivEw5/
2CQcjnzhcEtffxOO7Txv09g4Med687r8Ucwpyv3gWaO7IzO5kznUy0yBVkBO
JoGDNUtSImU9l0xV2TKPydHeCc5t2QBq6kAjLj6j0QpaaaYTNxonsREE5bSa
rns+8tBzZrzqShhoAIYNZdXE018XrRJV9mDYgI3xrITHXxnSCq/GdfSVca0X
0VdGtvbpeXUpBB6gnNB2fcjUj5tmcLAhuvXFpg5WG2bw3F/CqbeEgy06OFk3
gxV3sCovwca4Rlt0sHYGV/4S+l7k2TYdDGtnsFq3hJN1S4jCDtbO4Mhfwpn6
0G7dQc0M+D/5em28a82JXG09g+uv7aDiNPrzr16CjXqtOY0r/e9LT6NdQrSh
g5rT6HVQgUg29jU4jefeEg62mEHNaTTDb+yg5jR6HVQswUbABqfxwi5hywjc
mtPoUrUvWoLXpgKRbBzssb+EN/Y0ft0MfLqMr7pY2Ohrr7avvWDXX/FbdLD1
k9+EHfnq+Nmvj6DdFEP7dUG0FSG0YoOuiaTdkrfGmdskrBGlVrbp0kQVWeag
SQslTpN+ahqrbvb5bOKFUbOEabM4gy2nffFa+6xw28mn6XfmZpghTVrg7tfx
ZACK/Q2rYbFE86iaNKodpdpXTCKK+vA5umZmi44668D0Jlh5QPzWnNRI6Dfg
UZNHik7WeF0vG3KlC64kiZSRBxI/eqrxo83BX05b6sjy/Pvnv/9eETKqLhkl
uUEjQjUKVZ2rdNFaHquLHjeJLUypns0m7Vu6QdSQvKkd6YMzGJvpYDkpDC0d
c0R1ZtXe0RnsDiYU6lwiZo4QBH85NQ6FTlkA9BkvcrMyyXvGgPnh6NkzknOu
YPNfNV6RLpeRK0jTvHniUXPYuRoOe5ftiHLT4U0gqZDbUVKMui3N2M9eogja
dDJZ5sWilKAbxVA0V1qF8E1i8qWzWtmpaHa3TMeYi8+R16pePtFksaviIpDH
QIrt9CJDxrciz6UAG/oS/7NXS+2VgI1P3gwGkYAxgr3hxtgp32y1s4DGXZ5r
N5I3nS43dj/WNl7Blv0JMw29xm370/OXygE7H6tnDo33+dn9SN509nlk/+NX
TLu2MU375Yv6aa/+/zvt7w20j5550z56ZrBOe9NOt582/uNz/avqpBuE21a9
dSAaMmT3/krpzUhcWNU6P5S4NPhi3x9i346Mp+q09lStKkG25amqb+ydquPK
U1XbeLt9rmm83alafdN9PlptP+0Dd5+PZAe2PVXV+7zVtKuPxtY0bB2015yq
skziNN5u2lWvLU9VXePq77di8A9qmd/gcq6ooE1nQnlgk7oDvljD+l6ioy6l
RoWD854LvSSc6oO6a14n6LgBqPQ9h+pQjlnmdzVnfUaFBdDtQ6Mk2dw7Z6ss
FyNiXa4JW7uN83tKi8GOqtyeJU1TGSN+ajzEC+FcaTa5ps2xn9rRPVd7CCbE
rLKTfbRhZQRloJEVu6GwISrsRFwnm+ffpp+MA3yFd22QRKQuGQz7WHGillJe
Z1xy0+XoaxLBkNa8NheM6d/P12I6dVK0YEceWdmcqMX4LI2jIO09Oq5QCO/W
6VzW5tqpzeficvRbpnQJ8rmwu1lVShenlSCegrKIlbkXaaWie01zJNw5cJ5U
jCkofusHW+EXXiZaccE5ND4ffkpQdYhYa+hxXP0dfPVMQbsH8HJECMUI4NjV
4bw7xvKSxaYqnFdMZEheNgcEsyhDm3JrI90EJ5sUz8UnGQSO5RyLTS+cXPjy
IPn9h+E70V9sKn6Tdly8UoylqaUJpL2VYHfeYrpbRQ1LHYhN+1d27mw6LoBu
VG7LJVpuUm2N97AbyVEegm8k4OKh0gzlWlBcnXPY5Q52Hf1h0MkJaaeWoJBO
nBhefbaM8S70coFUhJ4jajGUyD+viAgFCLrKDHYKfZKIT8pZr36Vfl7rx/jJ
Rgpe09M4JQ8doia67WUUz3MwuLxuUep5Cm6xkGjmy6k64N3KuPgr94Aum0z3
/Watrju2211pSMR+260T56xOpvNFMk2X01YZ6akv2DhKyJXAAUhubzE/mveg
dMMFoVCdoPGkHG2Xzqyn1yHOiNABt3I5JU2f8Yg0E9MJeOSJw+rY/67tBpmU
cNi9HtQTy98XRVZyyqoz8B4/s0XpNUkXJ7i+JesxAU061JgmWRbfcQ9xynHV
/IyiPJZaYv+0mSgrFgkR/JsnKm2mPUuYLsH9nODe4p7WpfDis1DNHVanvHFj
X+T5lWF9t8irExkeW0wwjRd/Jd6y9wq3vHOkihF26pcXSY3DsMmpNDmtbTIJ
m/SlSb+2SWqabL2W0e5NErfJ6blie+forHZi1LK30ygaYLPrvmzdxIaIxLuP
Mirv/nHN7r+WEJL78u4f1+z+awkpmZZ3/7hm919LiEmy++7Pdt/9orz7xzW7
/9oCbodRKACov/u+pLvv/nZ5u6INu3+yYfeX5d0/2bD7aXn3Tzbs/m7n5Rue
/ZOzzjfc/ZPdm+w2yhdQ/mity9rxs53imbZPTvvBxrYzFyp++syAxOOHeFbE
d2zPKNeBQZd9Y2Ir8w8tW0mizNGZp4Uf5QCGjSwEr76SVeEiYiW+RIKSHSYj
ZMiuHF7BMGLCNPhcgyRrMbU3gqXYmBBKK0A8DoUbUMQBSkmPLERI/VQtbeJz
8u3IJKa1nA8vzsYeTTPJHnRJ06ztoYJFDGDRpcwYlE/BLSFnJBsy+qSjohwU
fHxUGRRcfpXChMsvyzxtYLM8vqwbbXHYPL7sPzBR4DZslqU0K/Fr2chmVTXZ
wGZVNdmazVoZd5etSa1tspHNKk9sazbLjrI1m/UKdmZXNgt3fzc2K9j9ejar
dvfr2aza3a9ns2p3fxs2K9j9bdisYPfXsVk1ux/tNMrWbFaw+1uxWf7ub8Nm
bd79kw27X89m1e5+PZvFTaLy7m+D/P+Ss3/yTXd/azYr2P1tmkT70b+CzTra
nc1qRZ3oL869+S3Cx+0Ne1wbergm0lAU3kYxT5n4VbHMFTg1EHFdGKKJQSQj
iSr73DDE3I9D5MJcpko38yDxQl3AsBt+BEMVvSp/bCaqjkQkTs1Ji0aKoyJP
JrcYJopl3cTBavLk6mdL1qBSsCRxrmuDH6siHw2/s21koSC2UKovjGhZmcOx
6q4LpelSlFInCNexRO6xo+8xQoi7XLkDDNH4umaA/eD5ycYJRSt3Pqkzn1Nn
Pqc18xltMZ+6UEXtI9lijpVxijVw7Dvz7tfM+2hHOG7eWB+ONB9HNkHXT3Qx
o0Q+FfOJNs5HYrCYxft6dC22R1e/Qa3JP1hWvN2yzPMjQe/NYObn7wW9t50P
BXqmu6PrsYOuiaD8ruhq4i+FEUSU33bexY5wpH+Pt4djf8d9TXdF18W3QNfR
rui6/JJl7UBdi62pq7Mt6fbzib6Qup7sSl3XxZU61GmneZ/8K6jrV8xnF3TF
F3/7pei6joM9Nl5HWzOwazlWG1JYyanqj1WZQ8iNnsp+ix89c7zlR+uyWEac
DmWLmNH22vwqbT8PnjiRkJLPDaq9eWInE8dPBz2AJLx2mt2g54/2e7uccU5y
Ykf9qsla2uv2VhnSD1dOkK390nECIknMqdTklC5+1AJiki8VrbK28peEApDj
DXZSWZuqXelWpKWp+vqc5NAnLR91KL2FWsDognYhh/34o1tYCQ3kzlcvJaM2
QtBx1HE6Rneiv5xS+p9NVaKgnxuCD/Dpk2WePiTA72cSD8KrI1cN32+KlbjG
N8jzc3Bd4Yr4E2YKmnFiJPV5j026IZ5MTbL9ou4QoDGbukd9L+puNZ+PKRse
aorJucPIeKXHrF73RnHFS7vjVDpQxDB5Xyg5+20K4oxNnCOZKFMMDOfMVpyN
p6u2AYpakBAB8eapPe9BAnmbcNNkZQ+S2eacVlXdJUexMd7rIZMU5OqcVSRT
kGXR4XCRIF6wa1yg2udwBycHPVWrn3GGUDquDOTRaLkgtBSzBE36kRC947pQ
3OC21ZkdtqrRgKCHgTyXhBsARCdxnRFImu6HieslhEeT18tJ9BJf1ySzb8tu
SJK2ZJYt7+7ZXULG8AwMTi408rmYS1rf3Mvzg05TFMPxESWNSfzENwBpGDSu
6x3Xtf/tO6N8oFklxj+WC9/D9fKBvfKW2pfVVjTL3zGygMCOEFskt0gUOKhJ
0s8BfaQM8pR6GSdinCU1w+/gnD2RFnh6oa0QHSWsMCsgK4sniTHLmQ7k6NNk
LVm+l+jw7XvYNkoatkjg+vyVSQa0mcNMRksOrDGue5pVFmcq+/KIEL/hJGRs
qgom40y+jdFB5BJHzoesk2BIPWHXJo5KTyemjVfHM9g6tvPAI7AWIEs8G0M+
jdsoolzFnlD6cFQQORekjVZLMG1tklDm6ozSW6PDlSiIYACJgJI88hyyJjQK
MJVqFZRSTNjrGXv9gdLzklqHtSvOpSK3hDhpYV2Z8gJyrYmAs59h1u95kU7p
jOvDvsqM3dwolYI2mSbFAgP3eKMwBC+ejLwCgtVdWXc3ChxDpHwDXWIKX7hO
imyELNnlm0FLR0C7pHdnjzFf3dToAcUhmO4NRfOAUcglbTBRbN7rBdKASkaJ
biB2bq7Y+nBwQl+LrLnpWrt1yb65qkh/KbGK+yalIIVwyhkSkAqK6O5kC+uw
SOm9eqZv7Y4aSX0Fo6qsQgHROpqsalfXA4omrFi0+p7TuWZia7pGp0XOQAb0
uIk3N17znFsPD0ZLPRp7sKH5PZ7V6+FPg86Hc4kBPDl+9iPfDMNr++2Pxy+w
5mSxnM2QhI4k5TOHkSqZE8AwpYGLAPEp1ivS8ezsRhf2dm3zPPZ6e5I00hwt
M5oFOO6sYDwjNbc93bYtxs6aa6argLiYJJ87vQnmby/up7rikxfPYMUSwUv0
Cs/TQs5Bp3iaJ8G55VTd2Uz4DHYjRnJBHurcldMRF28p0Btf+nnX68OdyQf7
t98uz8/Pf3h23D3qnQO/Sn0Tizk2PdIweJYM8jjd3yXZ3SKe38M6G1LxQw60
rXNiHLeV0mEavOXM3AZKASZw2Ujievx+T5GyY5ByLxrHRUxVWtzU/Pj025Of
BlfGxfkdO2i8Pbl6p/G4Px79cCxMOj1/XPX8sfP88Y9s4O9N8qxdeZrCI8IU
07hHwOECLDRVwfi8zLww3UlyW2jKRtLSU9pGya+K162EvuQF52Xl7KrJ6H6W
TbK7p6h5/Oz4ufjwDtkOoPIVx15IpArzJBX1tf6Z5ciYIL+EqCsNiHpXXyIi
aSpPODiXkmiuewzC2IinZD7h8TkXKm0bWlvyXN2l254riMEcIzBiH3XkDKEn
go0vuDRLHjstnyZgr7dwL8mhsZd5mHuKIg0omgQjyI3LT7s0T6ePygu4DJRW
kG3z+ARwlGVNyg3phHnHok0w1J+ZsurLnhZH7AojZWwIMVBbJVssOi8MGAd4
/6C3/7JgEJ5L3Hdz0D/Xc/Hi+fNnWgEj7ACvZbrEjO82cScJxoxz7bkur7aG
aTcYmnOOA0yB6sDU61VwiqiT7IPm2a3VqdgafdiDDEb5aW9w+vfZI26inGci
s4sRELWCjnPVjnLg/fqcq2IzKyed2uKlxS2pOKc5cqJJCwI4S6/XK3i206uI
ZV1t7uH1azVJY2vP2qet9ysbdsszt8N/VoVg3dj79LwRrz5vWGLlaEYm+1z1
qPvad+B0yivFufbcubLBAf/rSifu301wkqYrCzX3/8HMS3vkt94XyO0rnDaM
tgGf7COZ9LKi/qu31cCpL3Aye+S0lj0MBq2Ak92jUutwvyrghF+dOjPvlubc
jdbtygqm1PX+v4pMLO7GXVmV/heMznA6qwjSPUDo7gf/DxpbOFVv4YaXmbng
L/qufFA29bZKcdFrMBhfb370tKRwP6kI861oeJ2wiI7a3XMdZEMB1rpUHe3g
tszv8QrnHOck1RD3IutAz9sK4QaJdNPlYRJ92wLuNl10g2KuwvnfOOKVe4m6
IlV5NJZSWY1B1atgAITT4JwUSpI200u0qcnQKzg251mqk+TGAIdOH+EFSLee
hBihzpdUvliAKFtatkfqb3HoE2mAb6vkbdFteD68npJf4OFp82lrNE1/2QcY
teW2OJgp9ROG/3YddheZR4CBC8FqnZrHC7edsa0Ltzf9NRu63i34uesWvH3S
LHL3XXWBHvn/1byIPLzST72+vJFvStk9+fESPXoVVb/48VWY3Gzj434ytY2P
M6m7GkZHQUbBXXovkej1S/2Cx937YwNknJud3m0xd3uTriogc2woukzktaGq
a3v32IyeO5nKpa5q57728S0h4/e8cVfXPm5Bc+Jk/PuC3stz/5aQqdzVMmS0
jy/Z1VN3Mi7OPHdx5gswckvIRFEd3Hd8fO1p2nJX1z5uIPPiK+hM+PoSkrq/
G33f5fYIObPnypn5OQzgZkM70BoD1q5pv2uzflf6oZowqFB1Uq1sEobBi2gK
soN3vdyIxPaY7IYmZ2GdBkkLdqByUrX5pOmpyWlIdgInrWEppyEt12EiJFVg
BROBXQWOBZaJeOHHFu2Se1PihrZnJYyssT07YZtsjf/S5HoHtkKaXOxwKKVJ
X469bF7PJYg1TX5cQ3JrmrzYvclzf2KnW0zsZOMoJXq97vqQnp131OTKn1jf
QzmaXelGG9aM4iSCDm+1tROz/7j8ypE/sbOKiYVr2TxKFcRqr/Pyfiom79qk
DpPXNFmLydVrWYvJwVCrLTB5Vbn7ASafexM7qNz9OkyO/Im5fM3aC7l6LQEm
X5QRpgSxOkyO/AHcfdk8sVKTY39ib8oT222U0stpshOB/QIyvgsrY5rsdouF
DM2LWoZmEzOzLSvjOCANxCZx+M44H0W/fVdttiAm6NRkq7l2DPsSZU5egFwJ
T72XcjGj3WaLqdiys9lD8mSrhAGaXA3fiyKEEHvYl0p2CVrDSUfCigubKsfz
KvBNS8TRdM76RmVGpcWjs74aUbIZphWDOeUFZrYlJaCjODI+nxh4NMkz6mUW
scZF+riPHxI1G2eSZk69YOAh1h9hjWf9ucJE856S3bHxJw9r0zueFW3jgTDo
qJskWXfdjG00PXROoMnKzEkN5vd/1se9WMRcthG9+FKnQjh0h3pHHS+HXUC7
EKdE4qHbOhKpk2gwk2JAdhIdzggTNWXXZ/KuGpkvSt61aq1Oad2aZSx37FgS
XI8r9PreDD7ZFUSq+1ii67D0Iiw1ekiTx6jDfROb6nZd8lUNAKcWdoa/Kj4L
iwH6AKCGqUdYWgAmgoZhlsjEl8FSBHvTlSTMNjkrbOiRkwgzTLPPOZG9x4/1
8caqiitTOmy/048utTcN0fCwiq4ujnrh738YnB/1nFtrcH7c+0M41tXFcY8u
tG81l+peKljV8Nvyik6937frhVZ0unZFu87lG+5Rv2qPTv09Oq3ao/433KMy
igru0vPG7VrhUv14vdGoGrrVr0296A1cnguco5Nd57IBLlv2Ant0UnWOTnqW
l/yvmot+8+17oRWd7rKibzOXb7dHVefopP9fsUeb7oDtztEurwa6/gErLglI
b8P6J7XVTGwC0iHGs5ZyLisvpyxxbxY5Bth3+mvPKYS3obzI2wQ9fo0Llc12
ufe3PebtyMmQyn3XsiupKRZieEsuHE4OMdwfMhvqT+xyq22X6UW3cOyK+EmO
TinuMQjDM1iSxy+VqqBMmhQccnVhGVjsAWv/0g8ADnIIlmTPD9kncde0c+uS
zTWWytzk0kMcH/YD3L5kvdUcvW1/oQ47jL1PHlil58KRVH6SzJkiwjJ6y1Ai
e3eRm+4705iDeCxYmHtLxrknN5C6UsoKiyMTMXM36HUFk1BgKyeGw2FPA4oi
iG/QgqrNudCKcW/F9WVzdjXkpLvxDdrjSV+JM6AVSZyAJLaeZ7BHWBud3rgN
fIYQreDEn8J8lCuM8zwbpXQedNYxpjjQatk4VRDiQNJ7iBcpLx/bsZN6xqmr
OJs253UyhWMoFbMEehBSxbZutmCBI3Ex4uACLWQEiTo8b+FUKUQJw9ClC8BQ
9ZHvGFu3+onC8xJ74RaiNFzw/9fbtXXFkRzpd/2KMi8Dnm5uLSENu+M9CATG
BzFtGnk8Lz6n6C6aGjVVbFc3CI/2n+3b/rGNL26ZWV0gabxnOcceRGVlZUZG
RMY9WugvEQ1XUvBBP+OhbdF3uBR21twibeUakFaXPf4txvCmKa8kKsKWL5lh
TlLB0z4vpvr6E8rZpaiiKexEc7V43hg3v9iQ3HRUdL4u+p8i3RRgox1+wstB
v50Utww4ruARkRZj9M8rNTXcih+zBQ/mYFVNKyybX4Kp6eiw5Grvh7/GqlZ0
QM3y1puMR0hrq2MuhRBtxkUlbg9FX4NWsMaIi1/fruEI1o4Od9YYtBZp0l4Z
TRltp9GXdtcMe0oLRyw+gYC1E7qvws7ZphPo7iuRL0jPagVtMmuerEBaIMTL
xZJ4Cdn6m2xZEffasCoq8/ohzk/hDGotfT1b3lbdi4nOXlaU3zKf17rJOnZa
AypS3F1DpVl7V4vCSs0X9I6d5vMJ2q1jHteQwbIETY8OuQ7eojAfEjRScR2p
n4p7tTPP1i1pPRWiKGJ19P1w9BE11Q89y/y4yptSjSSs68r9xtzlWNjJrPxY
SBGX6PDFo1UiMvtTeUvfRCgqf78EMuRVQaxk9thGsQDCBK/l1DiRzI6T2UuT
7ezIAUY5lsmWbb+it6/s2fZi287WdwYBIwDZp1L3ogD0PFS4AcdkNo3QHw7t
5iygbjuXJmnYK6hIoukgQ/qV3Xtig2IKYfCXFac4eKSwA84YsQV6381pKEiu
Qdz+jK9BFgrGuRSW/nxMgN26rE0Yhd3hs/x3V/87wH8v+TSUu5DK2JeQR//f
fmL93IdSialIyK22pNYHOh9+zrg1jnxsZ2dzm3/RwVxvbIcf2zu7Pjjb3XwV
D+byVC/l8evkHcy87TND6FTmHKpD0W2E879U3DpiPMjeCxGvi1327xsayPfb
b/9x2j/aLIvFdX9R5E2ff1PilG4b/eqq7D/mHAKuBMcJgUQLcrcYvbhxKLpi
OjkJpMQKF3e4s1g8ojNEKowWRWxWu16w5Sp/ilEJbtoXuEgosjnuIIxw4Jlb
A+NEy1b5+YDFnBpDV3abfMuFrzT3Ao60d6NSFVFgSGLch7VCeAunSxOVM7np
ndDF4mU0DbQ7sAkcdMXAtwIkPWE1p/ZsY57pI03khGAkpdoZ44SodpzKrZfn
wVhshdFZMn4opVDovLBdiDDjjQ9ykfx0asLIq0KzV2q6sZvllbKbhLujywut
kCQC2rYIqZiqgtdbkI/XgCTT8rr0tJ7v8Fa/ye/65eQ7YWbXoTADZwy93H7D
bnuQfbt1Q4C8FCmz/uGdAF8X3nj1gJQs462iLIh0a28KLlqifxdz7vFRqF36
yuA/e1QEmzxjiH+HqzU63pjqVKSlXVwvZzYHKIzlwa40bnYhSEa7XF5pVC/r
iX5byl5vWPiPdyWWe+Y2LTFT6wy494TWIq+evrs8zn45OD/JjvIFq3KS7IWF
StLYiPQk4POR5Rxrn8LdHzRH8YvT7D43zcs9JDWOTRPRgydhPp+oZPNtHFJJ
m5his7yz+OJUBA/I1sEpV4Ux4aqxjCV4FTwYKxiq5++tIQWZRV1GeqiQWgmP
kCpl85IklQwJjaz2cBJtWgFhVj/0Te3zhUSiuobV1GwCiNKCgsTHuUcQvUXF
1jnWo4+wwB4nMKZpmb30IUp3SMqULld0LUtFlXJ+lsk52OYEyjyK2lYDREvS
2Uy8QmA5hBO/46bkVCUuTBCDTo8xCnQ3KVmDnK9dto+VmxbO63IC/mpPI0U5
+7CklkUQC0UPcNKShSbZq2GF8PFVhSr1WjojX05v1eTQFJ7bZde/sMAysXuY
RKfyAikdZXEv9I8+GEYK33kWaQKY7zRVeDledDDykCraygVFtFvw9HqpB2XW
z3t7YSeKboHgV27GN/SLe2GJTyivLm6/mM/2HgkFbgzR8h+q8XtZFc4DNCpL
HdBNTpcArYHvQXcXJhc+Swi8RPreSNe6y9AZcGmXy3f/5peTL0QyPeLliK7c
1gEYvK9Q6VM6EukXsp39bIRiF8Buzks8DpUt1kfD4w3JebUh7eIX3vxqTHuJ
ZbvTk6GaTixuUJCLQM+2Tc1ATRUycWsra0LRi15rLu1exoBmkUSxEgzE28tB
UKTlAi9c0NRSDNfuMWVDhvWKIUbaE0OOaXFcSEHNI2XFGqFNIomXYl3jxah0
E9rfGGgxJ2xQWgzBqwgofsV61nSZE8ksisJkTjeuuAe2sRwZvoVhfZhxmR36
Pi7twqpC3JUiC4QuSOEzBFNPZWGzW2L0iRNI6UTndePGlw6SuGADq2Z4WI8/
2iJzjkpruxq3uC/5Ll+RWHpR3QazO5Bei+tlztKylNUhtlfewfQjARLs/3bB
K1UBQmkgr0WbBChAYu2LZSESW4WbyLlh3VU+q6d8kdZulZfaDGAEHFGgJHsF
HggVHrJJ1C5c4Zwvuk85bpfM5ySY6ofNDMXWbGeNEgR2xKhRVU1kzxM9LTvw
1SJneHIQWXNV/gs75pU+VztBKb1V7gFmr9ZbzlnBs5Ro+nLKZkuVQxVe1vW2
dy4gyhczqDCSS8Z/NzbnfBpAfiwjavrY6j9IMEq/oqT6MxciMWplKCDlHzV5
0SedJANm7xr7cb+cVWzHLzxT3tEeVtqpqguKxoSupKFKbMlWHZWKE0EuEtMb
dYQwP62i+lWRMeWq4LpVqI8AdhnuBzPpD9SgJHcZ3Qm9OARcG1dNIDCzT8F0
wkYZO9M4EbReDgaU3X3cLkMuxMKutePyE70eB2EFliE3hb4obqznq5FIgZek
Jon67/CRp3PbSTZ4zNZ41Fove4CNHi4Ttb/KHbNA6RSWPfJKiJ6Jo7wVGIrN
LQiH9e3tsmIXIUwBcpyZt0LrstgqkU+WhdMu6qgwcc0hWUF0zd1L4J4vKMh+
FeK1tXhvaybxo4yRdp9UTSvJc4xMAP0oNqkqCN8blC5b52pgE9SaNsFAdEZr
8sonEJW4oM1ykQtFbllUfHfocpMK3ypid9oLGTO5vAKD1CvGsDsRwrCKQL6R
9XmxMeaqCGKPATpmSvPjQPOaLmh1FgSJzNvllzHDV66c+ZztWl7Ww+z8UJF6
qne2PsFeHqjF0LrlIsX3ipYmxWwH6+BSNh1qldiKgjAhjocOeSLmiD5j0NDj
+ZhzdMgnkZSEKb9oCLbqe1/FURvnpAzvoLF2Hn3bu2NmpcS4Dc/5r8HQ0ASj
o0ekecX41Gp3rVnIsib4StTusfbLml6s7Fhl2aRtFlpZZupiMTv9rloAzeOS
WvNhOXJXmvRDfrk67pdo3CONg43+Z10RvqPMx6reEfTR7VddamZcEd12rAzn
mc2siOAxo4qkQf/GClyrriDWnuiiKC0ZXlUPmLj6FuKUU5kLbvPtzTfZydVd
0wVgZRlPcTNBRd4wuk0DoqghF5ylT/KaLn8Z/43OkhdDf93ZtZVpeMMtMWpt
Hcz8aiIdVAn3Qttqob3/Vx+EOAzYlSAf21NHQeyD2JbH+g5gbm6F1uABz7XH
jwdtH8SrzR0bHHwQj9/mg/jFfBCnLTcPK2pHGvn6IClx16QBQNIRowmOmfXY
a711SijKjJyXauoUnELVH6sPZxVkiEEZVrcOvptEoCJ2aztsfeL4nNHwKbRt
MyGmMakPCgxmyjE7KSPTfA4xYiLmOjHUCXzyq8bikaFOtAqR9mIvSBdW5zMu
DMdxRcT/4J4QN/e0Fh69hljXtV7rgo2u9SaihEQFtPbcrObzp2V2n9Ttx6m5
PJiQn4JINzhslq+EyDPgEFW8DRH4V+t8QvrHDDqpKUq6GYkNQNDp88Da23z5
e2Bl19Lvev3tmoTWeJwCbvaPj3L7z90PIFYPD+mG3OJ9oCMhSARavPSQB/Fk
JveuLMRMx1wBVGPHtYDEx6p+cJm1XASK1HmfJiqRzvxqmkmdvrYPPS78kVcS
hgMebH4Mrf2h5+6CnbQw7sQM7AwbA0xxuHE0mMA5dViq8yaBJRtJdAUJPMxz
jhcAmgAX+t1hI265J0AjQrZWuLTDfxvjzpZhQWKuG7QUMkT9dGpjEmwYVMVs
t+dzpLpZqo51SNwSBvHVQveTEjdj0NcL3U9J3CaMf7XQ3Slxm978lUL3UxJ3
sE58pdD9vMht7pcvSd3mlIFuqofgijd25Sdtlh3/A8rSYBbgLptbW8p2iqYG
EEONU/Gn9aDYkYAuu89hcptwyUgpweyQu4ffS41dFmhQVtekpVfBTR8iPiMX
kPouwKzA1diMKK4GdbXX5syZlKRXllfcPdxQWup8Lgmmvi/2oTNbWXBRd/e2
gvrVN0TqMIwzi/ljfzJnVw7mgBtkHFllGHPu63KSi5hiRmSrNxmV0hcotcAR
xWtxlU0BGfEq8R6xWVu6REEjgD+jualnk/YF1WPWo0ZIyEPcCEG/GE1sH4cL
R3T/GZMKAYG9SpwlBjkN8wCAKUOQ4ouLZVUEROAIy6oQO8fc/ui+IEzEuwgX
PbtRGWjyb7bAi3ErLtPZxKU1Udw9paSRentebg5IaKVFJE6NLI1EhaG0Kc1e
RwvlYFTxXEoKXYiPpl+haIzhq7Uo6+TOEG6hbAG1YpUHtozPuZotA7KYExme
gAJUYryHQ09pKjU2aqwsStoWXhW37XoD/Ly/KnY39eKuuZs2U6CJNZhoBzc7
6qVyFVk+mdgIZYdDUOLaTcLg+jHDbCKzmTkhGCyBqrhse2x7xVw/HbwPbMvN
4xpKhpu+ylXwU27nhb487404/6OvNjdvMU0chcSvixlxjz2IG3wLq2zk1SrV
jmbG8UbK5FoJZc/8aaxdG0Cu2CNFugr+5iJvPrLQlHMKQWJrfiGqFAchsrka
CMHjcYbj2qxea3TFzdZUl/YNa/FyuJJ1IvNj8UUKsya/wI52YgNLWh2tVUqs
h7Jt0X2pZU/bIhei/WSqsCFZIEeY43NPV5vmnz5YCJ9vSKjwAsbSVoKjB4Sn
JTDqfd0kljrAzDTyONqcqCj7DV/iqiKN5C8UTMc8QdnUGiDTVWBE9BMxULhb
y2v0p/nRFpaSmofFw7+yBmESdBhlHuWlonWzZKmkUwfo5NMcNhde+5atzTM0
O1bg5y/k8Xr3Nazs7oBEbsQ9Xise+J71Pg2gWnlxUdezgMtuL+57dAYPMB6F
kIDAeXBbFZ8WOlNIc2Y8RrOAiOiU4bP3ojXMNprf5RyThni9VRpt6PIew7pM
EASdMWoH+zbMcrbk6yJfuJtQbox8MpkrdyvnIsRvrnIGSP0PuVgSiHHhyx4f
I1YwVRh0ybBYjIXZzQuuR6if9nyC5ZWysygDPMvc8pmQbSeS85r0yOnrzSL6
qE6mn/ZkAok+nqmcy7vSkaoCWZcFLwqPixxOFkGE4F+MgmqAKuw9gzHTU7i1
lvHumz1YEvVfr3de4l+0NQ19Gbx6ZVf4CrgVJfjrbAR6rPJbvTURAOQ8VeHY
9v2ptsj2mEIPbWI8l82L5tEeYc06vU/9GNDOgAQDFv2TfUULvtUWRUgHqWit
BON8MfYoAVGvicZ0glXfjop1W1G0ikhvlsOtcl2KJImJxWzL9vHC6oAv2IzZ
k2AT7peR5aGpVJZFpMTOZUkDi1X2Nhb68QvqzQwwy7vaisSfv09jfFSPQOH3
JNZHrHgCDlG4lxKBjHXJgXLw4BbH/kXXg6kT2sCkmxlLApYKH7x/ZfahTGh2
9gmOe0taEZ2wezadi6tX+gGK1LtGohUdWl9ZcL+crGX5QvUSyCYmur7eHLjg
ypDZcLR/bxhO5MqNULKUMySxFeZJx9XHt4ouzi43xpnpvPDWOnY5hKYpDMab
uqo5Qu1Sk53yKlLXwKNGZz+RWFiVi3pujYJImlQ4KqsJwaXtuu9+8/wweP1q
Nepct8oRGt9Bp+g/MMnP8kd7PfljiGAg4W0x3sze1hLejUZPYrfPeXdbd2gr
fG9npkoqExaB7qaeGGt6/Zoj8VgchS5DJMKWYtMEbbhOpL0dOEB1uGxujIPt
vWSxM9qenevKsaKr8ifpdGWpg10nywYsPktcZNKYABY3ve0VsxPK/Ma4RllF
ExANH1HpB5ItJ9QSbCtGGETteCyfGAjtGXRXkkbvWP4fEWtWfpmdQsLRYhoa
vteM8z4E+lIbM5m1wyjSU6Bor5fnphOsN0WhphR9QZu+5aoHkfhWl6pGGKZr
uJUyDfWr564z0FhrlMFuMSthl3q1ZAE9c9LhL8pb+AKDwDZLuhIlUgob5Zcl
mFRVxE0qwuKU+46J6MD7HkNqsF95rFcKVG7L6dyaPyFFaVp2SAkJfyZVTpo/
kIhT34Gt7MDYtOOQL681flisM7737FdCNcCLZMPWpcpMMvWeicZVq2tW3vJg
JrAXOoJkXZxPHFRzluHP05WxiDSdIq0MW95qItQyloPlN/SdXENLxW9oXM9i
2BunNcLR4XJhsTZseyLA0OFiH2buQeB9IFvpUtACwbqkNrn+PQG0zIqVXkKY
pfW27nBDhc/OAxYUkWYOTCpx6y9JblhR9S3dk/5NnKNUf3ECt9CnZrWzlwTY
A2ISse/iM7e1Efrj+DlaivRXwwWWXXCXxUbFgWvg93Vi4a8j482OX4AvB3uv
RDSInm7C6akD9vZQ5Nkk5WgTcuUZtKNc+VhFYcpIZUk5JbHhxmWqxVKwWKgj
i2PkQdfxN+OWR+BzpwfnB2hSGjqhRFWo/By8N+MtyoBDOOT3lJtInzva+5IL
brZni8CyjQ3+gc1dLwdJA49pURUwPzc2S9KdJZKYOBFlbNpSS8XqWW8kbidn
LqHQTyyddB+1DP6I9fq1xQpYtAIFlZsMRqZ7+SgLewj1ngAncx8G47u0/Ors
hgQ1wHKprdCp9lHV400CfjhXraNkuYAIBjAFl0y5yZvkhBTOaVsimmSh95lv
zCL0VroLreZgwz4Z6a2icQrx2hjXg4Www9dj4lchZOW6r5p+sA9b/0ORMP8Y
DiAyeWhXL9/LgTPClRaUnB1Xtt0xnt/X7fb4QsfKXgQN02WiXFG08X2qFpak
LPDK6CJixb0O+n2Tmk2s7dtc+oHKjGmGG8zZGm5NyLu8TY1SGvqGkJBKOpSK
ZGZaOvxsSKLrRYvhTNoQAyj2TkVKEGGjRTfqtHeXNIzkhUKVs1L8xH4Zd4GE
JIj/k6N/F1g8+BpHG2qUoBH4VVlNEtTPCN8n6K0k8UUEaU5Ri0lEhGri6HZd
TQq5wWyppFaOP5od1lPXddN3c5ISZ8WUjcMW20y7YxcyCgtLGsvqcbG3AnHx
IgZzcy97pqqq4DBSwpjrSNZgLpcB7RNhKlMrWkyAErKJ71zD8YMVRDUe+2oT
l89OymjV62ImNmtMJ9lA9KHR2TsTL6sJWwQKEkEe70QjX/3YF5qV8vdWk22i
hm7fzti0OyhJZdKRrq8rtEohBFrOblFSY9WGlrMEio5Lr4WR3GrSApGjx3Nm
CHyE1tBURHI3wMuJSxJAlNgWLB3eyc4ugvN3l4c/nR8TvP7ANn0oV0CQi3ej
+MGbbbTIEpMU3VM4EnuTo1M97BBXTlyxgJ96kIOeXT1nL6yn2q2+RtON5G+j
m2I2y9ZHoz9vhEXuttbiq/XF/Pnycjj6Xd+9PBvZpl++3GNjGYdH6XaVqIwl
ilCj4wcMPTf58oeDcAvn6XhhE0izTb9nbfoY9IRO1hKX+FTEtoMpkzv7uim5
axLvRRiEXNMoF1Kt5DTyq5njUJUMkQcTZqp2EKkPkgnb3oorT5wOX9h9K18S
1v1dYDSj/vlodHDKbW/47rrr39TX3CXOErnipoIP7AUT0XPOO9YJiPEumhds
aySFcqLFD8CT0PrczMzaLa4KjjufmhuF5osFqqTPJTjkIRRcWSm78eLhpmbt
LTDWWL5Nw7BEIbw2i6mHF0jugJYMzbVCO8srLDajlif7+VTGxhb1HTyfIcUW
DH2hOrB4irnBMGg+Zyc9KUyLROwsjBKWjU3xwpR3emG+VC4aUsqttSNaXHPU
tEGJL0FI2GzDmeS3xFtMTJJrbyadua34PISi0RMSc+TZkADGdj9I0+wD40JL
zQ4tjA2wcWshhrpOrxY0F/zoK9HX4g6ftNZ+v59d0dKhMKRFyM5YU2HkOhDk
wgmgri4Til2Cx+4pFTvM/V6/+CRBm0ee4ZugqHqjNOLBkieDSiBhe+xWN6II
2eoTVSggV5mwGCaUGl4SQRxijnd20mL89nN+HJxN/iOhTsXEh65z2qzYOnX0
hpjrYcQU2sTgf+8/8/On8PRPGCwl8L7i/zD48yf62X/y/xaLyWR/Qj+fv3nm
jjXv7L5hMkyXL0LOYsEb72ej0SUC2DFug59M+AdPjrL13Zf6pFX0bmenu9yd
Mbh3ga+J5BEj3/PNxoirs4GgUJUxOXuRtThhnkMbQCOElD/sCb9RKoxx9IV6
dZbsdfLyCMdSX0ZTqTUcrdKEgYBLSZIzblPbYKvkQczHMT/xKkmYilc52OVV
ykQ/7PXpH3yTum9XqUpJxMv4roQltGwntQcLJUqvU5I6VlCZSStpjHVHF8W1
XJ9BxCXxdtPdD9ts+JbLNGrRaXU0ioqEPAG7LdauLN0KJFgCP7vguTetWUbF
7OnLDQWVpfctWHS0fzcImIqZxdEfreLaUHKbvOyHSBLag8SBhrhzuTQT3BJX
0a0YJhYW1KghKmGynt7rPJl0THOkSBCBposRsWisKAaHlB1DJ2wVeuQLbI14
2cGaXNdmdZcGd5mEtmuxDommZA6quB1CNk6H4asSgGNRA7zt3e3tnf3J1Zv9
fH97f3/rhz1z9uLbb9cEWM98nEPyou93f/jJr17pV1XnthPhimMcw/OgxdSb
/WzN9aqDrHj/lhZHEvVlf3unR/ypv00/O5JbEwa+zd6LY0c63FdaOIKkoymp
yO9P68sNm2Xgsww2POp49ZNRuo0CI93nXMzChHEICZxYPFcy6LcI6Ps729v7
tIMIIvKn/2KPluDXb/vb+Bt26Jm1NjNXRQKY6vGiAEdJdk87tLgh3uaAZ/WN
2h6cJJ5e54AWMEjXyX8SZ1jjUVf0eoMFD2TBeP7EQs9IiAM9/bOY1yHh2tu4
Bw4a8l1bRJSL50njBH54tWsSAYkE8doJwbJ10NJG1vkTb8rGvt14pt7yN/yk
K+Gj3cJt/MwSwiBZwdMVob/w81lXsDJJd81dYDijyY87G18xyZOlqzvWq5Ow
jHLvhYa/Z6nl+1BF+3uWY/jxvVUPDoPvRcLhueofo58//tj6WflD+Kl5OS9Q
3zgLvS++52ZKn+MF4w/++Gx362zw/ab8YEX09uf/m5XwN/6xAhMXxSOY/GMV
Jv9wqe9fP53Vx114Ap4iWDLY+KpJvuXHJlnhPB00s8KKIpL5135eZLV2w83W
T4ckcfSyk8th/wMbPDdW7974Ta4svVIZelUQMaH5KPzFhGe+SLvF51h2Lp6T
nknvG8/r6vFWxKuDqyuE9bpvvfi06Of0N5GzByfD4T5+2c8G80l2Ah+RbG9I
H6B/NDflHagUwSD8xquTQ33h1Ul2iCQX/utfT8NfUR/ytOJC2vVcKkrsHujj
A0lhoP/IA5vsABr6DQPjsJyPl6V87fCdPj+0q+3dZCqfPDy9sGf17W25wLVx
GgnkFyjMyQPPfdzc3bPypB7ZIy5nCd1FQ3j48dBfFHMZlGV99MEeFagYOGND
+4fKVv2hH95tDeicrP/hyeEfSFiOxh4ZwMTEzacuD458M0dRpsNRUaHvXtiZ
OB+PRr7AozQu0Z3Rh/WkyIZAcn6jOBxe2BkX1Y0kyR1KM73h8ooEDYL4pKxF
3kLZQ+kaffpWX4rqBcXH9DZvZOTJ8MI2cKKuyqGYhmTe+GSm5zbr9JyW+VYm
uLQtYSolY7ZxqH3ERvU/PD9OYH7nMD89sYl5byWJhycEKwQbJVOzV1xHnrEp
dzf7WznngLwhCYXQJ2L0Y995Mn7w/PjR0EdfEYcaSdubCad58QhwaB3ytPgr
I4dnBm2uTu+G1nhqhNSKnqJD20YieXoxbD2+UIcYM5EyDBwdtgZK/MNhSKbE
46HRvAsHTvNDp/lhkX/sJve/Oh38dZmb2y5GnosDA7og1oHYQ2NIXzjWXqib
uRNlkQVj42zLUWpdih2jIx0qm47JTrkkXR82xEsX3uZzVeADKY7ODlrjzop7
OrQDxPFxlruM+qlz1E8W2Cej5LKxkZK9145qnKlZ4KBB1D+78SN4yDyjy3h7
W/bNy8c7/dCFr0Yqyylk9eH9XvfjDHVD8e09CZowDLI0c2bc8uhd69G7EGwl
A87DADWNx2f+wd5n6n/3n8vyzmHp7LnFjT8Mj1cepMTx4eLszNb8YUasnRBk
VrIr4qx+IGqTxJlDrytjL/7tzNHUeIJYcA/mRZ4sPDCR55jH3y6OW6MMwpAS
AnOWwX9f/fq7T7RUqQ/TtRCIHUg0mxWTqbRa+21fQuWKyY9r1/msKdasIB9r
yjdwVktYE1cqklyu6iMJOfMyr7LjHGG4vewvNSHtn/MZ6XtVL7skbZHDmkc5
0gtP5sU0e1/Om4+Pvezif/57Uk7pHE6K8qqXnZfjjzOkMx1tZu/r+bxsei6t
HeVVSWhNF+gYAXWzWdnL3tbZz8te9vclkTKBhS6hqTgejoqrep7fZG/nywqF
y2GdYhMFpwBAupKsiNT3iTevvYgbo7L1PEBAXEi64IALZP9h9+xl+UtJpF/r
0STg8ERL6ScGY0DlMYG6FE//tOkOZvf5vCbEI9LNfYb5Ytqf+Pp72S81yXrX
y9uSAEe/TfJom9miue/nXGZSBuOrl+Vtvbh5zH4uJZveJka7iTBxezF/KW+z
k2WJLJqJv3Jw5KP/F3rfVDD2JQIA

-->

</rfc>
