<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-10" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-10"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="September" day="09"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 181?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 188?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document describes an approach to how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). The realization of the mapping between customer sites and provider networks is refered to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of such hand-off methods.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control within the provider network, and (4) capacity management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
        <dt>Provider:</dt>
        <dd>
          <t>An entity responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>A provider orchestrates and manages a provider network.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t>The main 5G network building blocks are: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as:</t>
        <blockquote>
          <t>"part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>"The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts." (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>"where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand")."</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>"a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers."</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, Quality of Service (QoS), and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., via Layer 3 VLAN subinterfaces), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/>) and (<xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             v                          |    
  |    +-----------------------------------------------+   |    
  |    |TN Orchestration                               |   |      
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types that are as follows:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+ RFC 9543 Network Slice UP_eMBB  +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+    RFC 9543 Network Slice CP    +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |     RFC 9543 Network     +-----+  5GC CP  | |
|               | | |        Slice ALL         | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deployment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (INS-UP2). In this example, the control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+              
                      Deployment of first 5G slice               
                                  | |                            
                                  | |                            
                                --+ +--                           
                                 \   /                           
                                  \ /                                                      
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
+------------------|------------------------------|-------------+
|  2               |                              |             |
|  n S  +------+   | +--------------------------+ |   +------+  |
|  d l  |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|  |
|    i  +------+   | +--------------------------+ |   +------+  |
|  5 c             |                              |             |
|  G e             |                              |             |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+                 
    Deployment of additional 5G slice with shared Control Plane
]]></artwork>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>).</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
             ..............................................
            :                   Base NRP                   :
      +-----:----+                                    +----:-----+
      | PE  :    |                                    |    :  PE |
-- -- |- -- -- --| - -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
 N    *<---+     |                                    |     +--->*
 S    |    |     |       +-----+        +-----+       |     |    |
 #    *<---+     |       |  P  |        |  P  |       |     +--->*
 1    |    |     |       |     |        |     |       |     |    |
== == |    +---->o<----->o<--->o<------>o---->o<----->o<----|    |
 N    |    |     |       |     |        |     |       |     |    |
 S    *<---+     |       |     |        |     |       |     +--->*
 #    |    |     |       +-----+        +-----+       |     |    |
 2    *<---+     |                                    |     +--->*
-- -- |- -- -- --|-- -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
      |     :    |                                    |    :     |
      +-----:----+                                    +----:-----+
            :                                              :      
            '..............................................'

    * SDP, with fine-grained QoS (dedicated resources per Network Slice)
    o Coarse-grained QoS, with resources shared by all Network Slices
  ... Base NRP
-- -- Network Slice
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do no interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. These section lists few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <section anchor="an-example-of-local-ipv6-addressing-plan-for-network-functions">
          <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
          <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
          <figure anchor="_figure-11">
            <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
            <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
          </figure>
          <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
          <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
          <figure anchor="_figure-s-nssai-deployment">
            <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
            <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the AC there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>PE Underlay Transport Mapping Models</name>
      <t>The PE underlay transport (underlay transport, for short) refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and underlay transport are each related to different engineering objectives.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and two underlay transports (e.g., latency optimized underlay
   transport using link latency metrics for path calculation, and underlay
   transport following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while underlay transport determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple underlay transports within a single NRP. An underlay transport may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, underlay transports may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to underlay transports at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   underlay transports without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different underlay transports (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two underlay transports,
   each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate underlay transports is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Underlay Transport Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Underlay x--------------------------------.      +------+
|  |Transportx-------------.                  '----->| PE-B |
|  |   A     x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Underlay o-------|--------'               .---->>|      |
|  |Transporto-------|-----------------.      |      +------+
|  |   B     o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Underlay Transport A
 o---->>   Tunnels of Underlay Transport B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per underlay transport for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single underlay transport
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware PE underlay transport mapping model, the entire
   slice is mapped to a single underlay transport, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to PEs Underlay Transport Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Underlay | |
   :|  |     NS 2 +------+   +--->Transport| |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Underlay | |
   :|  SDP          |:   +------->Transport| |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to underlay transports at
   the granularity of 5G QoS Class.  Given that the potential number of
   underlay transports is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common underlay transport,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Underlay Transport Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Underlay | |
   S :|  +----------+ |:   +--------->Transport| |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Underlay | |
   4 :|  | 5G QoS E +------+    +---->Transport| |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" may be maintained by the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an underlay transport that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an underlay transport that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId-3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId-3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="June" year="2024"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-03"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="August" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-15"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-13"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="28" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-16"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-02"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-02"/>
        </reference>
      </references>
    </references>
    <?line 2351?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <dl>
        <dt>3GPP:</dt>
        <dd>
          <t>3rd Generation Partnership Project</t>
        </dd>
        <dt>5GC:</dt>
        <dd>
          <t>5G Core</t>
        </dd>
        <dt>5QI:</dt>
        <dd>
          <t>5G QoS Indicator</t>
        </dd>
        <dt>A2A:</dt>
        <dd>
          <t>Any-to-Any</t>
        </dd>
        <dt>AC:</dt>
        <dd>
          <t>Attachment Circuit</t>
        </dd>
        <dt>CE:</dt>
        <dd>
          <t>Customer Edge</t>
        </dd>
        <dt>CIR:</dt>
        <dd>
          <t>Committed Information Rate</t>
        </dd>
        <dt>CN:</dt>
        <dd>
          <t>Core Network</t>
        </dd>
        <dt>CoS:</dt>
        <dd>
          <t>Class of Service</t>
        </dd>
        <dt>CP:</dt>
        <dd>
          <t>Control Plane</t>
        </dd>
        <dt>CU:</dt>
        <dd>
          <t>Centralized Unit</t>
        </dd>
        <dt>CU-CP:</dt>
        <dd>
          <t>Centralized Unit Control Plane</t>
        </dd>
        <dt>CU-UP:</dt>
        <dd>
          <t>Centralized Unit User Plane</t>
        </dd>
        <dt>DC:</dt>
        <dd>
          <t>Data Center</t>
        </dd>
        <dt>DDoS:</dt>
        <dd>
          <t>Distributed Denial of Services</t>
        </dd>
        <dt>DSCP:</dt>
        <dd>
          <t>Differentiated Services Code Point</t>
        </dd>
        <dt>eCPRI:</dt>
        <dd>
          <t>enhanced Common Public Radio Interface</t>
        </dd>
        <dt>FIB:</dt>
        <dd>
          <t>Forwarding Information Base</t>
        </dd>
        <dt>GPRS:</dt>
        <dd>
          <t>Generic Packet Radio Service</t>
        </dd>
        <dt>gNB:</dt>
        <dd>
          <t>gNodeB</t>
        </dd>
        <dt>GTP:</dt>
        <dd>
          <t>GPRS Tunneling Protocol</t>
        </dd>
        <dt>GTP-U:</dt>
        <dd>
          <t>GPRS Tunneling Protocol User plane</t>
        </dd>
        <dt>IGP:</dt>
        <dd>
          <t>Interior Gateway Protocol</t>
        </dd>
        <dt>L2VPN:</dt>
        <dd>
          <t>Layer 2 Virtual Private Network</t>
        </dd>
        <dt>L3VPN:</dt>
        <dd>
          <t>Layer 3 Virtual Private Network</t>
        </dd>
        <dt>LSP:</dt>
        <dd>
          <t>Label Switched Path</t>
        </dd>
        <dt>MIoT:</dt>
        <dd>
          <t>Massive Internet of Things</t>
        </dd>
        <dt>MPLS:</dt>
        <dd>
          <t>Multiprotocol Label Switching</t>
        </dd>
        <dt>NF:</dt>
        <dd>
          <t>Network Function</t>
        </dd>
        <dt>NRP:</dt>
        <dd>
          <t>Network Resource Partition</t>
        </dd>
        <dt>NSC:</dt>
        <dd>
          <t>Network Slice Controller</t>
        </dd>
        <dt>PE:</dt>
        <dd>
          <t>Provider Edge</t>
        </dd>
        <dt>PIR:</dt>
        <dd>
          <t>Peak Information Rate</t>
        </dd>
        <dt>QoS:</dt>
        <dd>
          <t>Quality of Service</t>
        </dd>
        <dt>RAN:</dt>
        <dd>
          <t>Radio Access Network</t>
        </dd>
        <dt>RIB:</dt>
        <dd>
          <t>Routing Information Base</t>
        </dd>
        <dt>RSVP:</dt>
        <dd>
          <t>Resource Reservation Protocol</t>
        </dd>
        <dt>SD:</dt>
        <dd>
          <t>Slice Differentiator</t>
        </dd>
        <dt>SDP:</dt>
        <dd>
          <t>Service Demarcation Point</t>
        </dd>
        <dt>SLA:</dt>
        <dd>
          <t>Service Level Agreement</t>
        </dd>
        <dt>SLO:</dt>
        <dd>
          <t>Service Level Objective</t>
        </dd>
        <dt>S-NSSAI:</dt>
        <dd>
          <t>Single Network Slice Selection Assistance Information</t>
        </dd>
        <dt>SST:</dt>
        <dd>
          <t>Slice/Service Type</t>
        </dd>
        <dt>SR:</dt>
        <dd>
          <t>Segment Routing</t>
        </dd>
        <dt>SRv6:</dt>
        <dd>
          <t>Segment Routing version 6</t>
        </dd>
        <dt>TC:</dt>
        <dd>
          <t>Traffic Class</t>
        </dd>
        <dt>TE:</dt>
        <dd>
          <t>Traffic Engineering</t>
        </dd>
        <dt>TN:</dt>
        <dd>
          <t>Transport Network</t>
        </dd>
        <dt>UE:</dt>
        <dd>
          <t>User Equipment</t>
        </dd>
        <dt>UP:</dt>
        <dd>
          <t>User Plane</t>
        </dd>
        <dt>UPF:</dt>
        <dd>
          <t>User Plane Function</t>
        </dd>
        <dt>URLLC:</dt>
        <dd>
          <t>Ultra Reliable Low Latency Communication</t>
        </dd>
        <dt>VLAN:</dt>
        <dd>
          <t>Virtual Local Area Network</t>
        </dd>
        <dt>VPN:</dt>
        <dd>
          <t>Virtual Private Network</t>
        </dd>
        <dt>VRF:</dt>
        <dd>
          <t>Virtual Routing and Forwarding</t>
        </dd>
        <dt>VXLAN:</dt>
        <dd>
          <t>Virtual Extensible Local Area Network</t>
        </dd>
      </dl>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
