<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-13" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-13"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="October" day="11"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 174?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 181?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document describes an approach to how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). Passing information between customer sites and provider networks is referred to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of hand-off methods for slice mapping purposes.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control within the provider network, and (4) capacity planning/management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. Specifically, the use of "Customer" is consistent with <xref target="RFC9543"/> but with the following contextualization (see also <xref target="sec-ref-design"/>):</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
      </dl>
      <t>This document makes use of the following term:</t>
      <dl>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location. A provider is responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
        <dt>Resource Control:</dt>
        <dd>
          <t>In the context of this document, resource control is used mainly to refer to buffer management and relevant Quality of Service (QoS) functions.</t>
        </dd>
      </dl>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t>The main 5G network building blocks are: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as (Section 1 of <xref target="TS-28.530"/>):</t>
        <blockquote>
          <t>part supporting connectivity within and between CN and RAN parts.</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand").</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers.</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture. The following further elaborates on how Transport Network Slicing is
defined in the context of this document. It draws on the 3GPP definitions
of Transport Network and Network Slicing as described in <xref target="TS-28.530"/>.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices (<xref section="8" sectionFormat="of" target="RFC9543"/>). For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, QoS, and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., via Layer 3 VLAN subinterfaces), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/> and <xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             v                          |    
  |    +-----------------------------------------------+   |    
  |    |TN Orchestration                               |   |      
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on RFC9543 Network Slice deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a RFC9543 Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (TN Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+         TN Slice UP_eMBB        +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+            TN Slice CP          +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (TN Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |       TN Slice ALL       +-----+  5GC CP  | |
|               | | |                          | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, in some deployments, in the case of a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) may need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deployment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (TNS-CP and TNS-UP1). Next, in many cases, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (TNS-UP2). The control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (TNS-CP) and Network Functions (NF-CP) are shared.</t>
        <ul empty="true">
          <li>
            <t>The model described here in which the control plane is shared among multiple slices is likely to be common; it is not mandatory, though. Deployment models with a separate control plane for each slice are also possible.</t>
          </li>
        </ul>
        <t>Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
(1) Deployment of first 5G slice
 
+---------------------------------------------------------------+
|                         First 5G Slice                        |
|                                                               |
|                +------------------------------+               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
|                |                              |               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
+----------------|------------------------------|---------------+
                 |                              |
                 |      Transport Network       | 
                 +------------------------------+             
 
(2) Deployment of additional 5G slice with shared Control Plane
 
+---------------------------------------------------------------+
|                         First 5G Slice                        |
|                                                               |
|                +------------------------------+               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
|     (SHARED)   |           (SHARED)           |    (SHARED)   |
|                |                              |               |
|     +-----+    | +--------------------------+ |    +-----+    |
|     |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|    |
|     +-----+    | +--------------------------+ |    +-----+    |
+----------------|------------------------------|---------------+
                 |                              |
                 |      Transport Network       |
                 |                              |
+----------------|------------------------------|---------------+
|                |                              |               |
|     +------+   | +--------------------------+ |   +------+    |
|     |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|    |
|     +------+   | +--------------------------+ |   +------+    |
|                |                              |               |
|                +------------------------------+               |
|                                                               |
|                         Second 5G Slice                       |
+---------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>TN slice mapping policies can be enforced by an operator (e.g., provided to a TN Orchestration or 5G NSO) to instruct whether existing TN slices can be reused for handling a new slice service creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity planning/management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>.</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
             ..............................................
            :                   Base NRP                   :
      +-----:----+                                    +----:-----+
      | PE  :    |                                    |    :  PE |
-- -- |- -- -- --| - -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
 N    *<---+     |                                    |     +--->*
 S    |    |     |       +-----+        +-----+       |     |    |
 #    *<---+     |       |  P  |        |  P  |       |     +--->*
 1    |    |     |       |     |        |     |       |     |    |
== == |    +---->o<----->o<--->o<------>o<--->o<----->o<----+    |
 N    |    |     |       |     |        |     |       |     |    |
 S    *<---+     |       |     |        |     |       |     +--->*
 #    |    |     |       +-----+        +-----+       |     |    |
 2    *<---+     |                                    |     +--->*
-- -- |- -- -- --|-- -- -- -- -- -- -- -- -- -- -- -- | -- -- -- |
      |     :    |                                    |    :     |
      +-----:----+                                    +----:-----+
            :                                              :      
            '..............................................'

    * SDP, with fine-grained QoS (dedicated resources per Network Slice)
    o Coarse-grained QoS, with resources shared by all Network Slices
  ... Base NRP
-- -- Network Slice
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do no interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. The following sections list few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <t>An Example of local IPv6 addressing plan for NFs is provided in <xref target="sec-v6-ex"/></t>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
There is no additional 'labeled transport' protocol on the AC (e.g., no LDP, RSVP, or SR).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>PE Underlay Transport Mapping Models</name>
      <t>The PE underlay transport (underlay transport, for short) refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and underlay transport are each related to different engineering objectives.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and two underlay transports (e.g., latency optimized underlay
   transport using link latency metrics for path calculation, and underlay
   transport following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while underlay transport determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple underlay transports within a single NRP. An underlay transport may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, underlay transports may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to underlay transports at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   underlay transports without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different underlay transports (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two underlay transports,
   each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without per-path bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate underlay transports is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Underlay Transport Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Underlay x--------------------------------.      +------+
|  |Transportx-------------.                  '----->| PE-B |
|  |   A     x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Underlay o-------|--------'               .---->>|      |
|  |Transporto-------|-----------------.      |      +------+
|  |   B     o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Underlay Transport A
 o---->>   Tunnels of Underlay Transport B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per underlay transport for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single underlay transport
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware PE underlay transport mapping model, the entire
   slice is mapped to a single underlay transport, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to PEs Underlay Transport Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Underlay | |
   :|  |     NS 2 +------+   +--->Transport| |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Underlay | |
   :|  SDP          |:   +------->Transport| |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to underlay transports at
   the granularity of 5G QoS Class.  Given that the potential number of
   underlay transports is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common underlay transport,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Underlay Transport Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Underlay | |
   S :|  +----------+ |:   +--------->Transport| |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Underlay | |
   4 :|  | 5G QoS E +------+    +---->Transport| |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" may be maintained by the transport
   controller - it is not necessary (or indeed possible for current SR-TE technology in 2024) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an underlay transport that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an underlay transport that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 28.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="June" year="2024"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-03"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-17"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-13"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="28" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-16"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-02"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-02"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
      </references>
    </references>
    <?line 2294?>

<section anchor="sec-v6-ex">
      <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
      <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
      <figure anchor="_figure-11">
        <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
        <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
      </figure>
      <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
      <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
      <figure anchor="_figure-s-nssai-deployment">
        <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
        <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
      </figure>
    </section>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <dl>
        <dt>3GPP:</dt>
        <dd>
          <t>3rd Generation Partnership Project</t>
        </dd>
        <dt>5GC:</dt>
        <dd>
          <t>5G Core</t>
        </dd>
        <dt>5QI:</dt>
        <dd>
          <t>5G QoS Indicator</t>
        </dd>
        <dt>A2A:</dt>
        <dd>
          <t>Any-to-Any</t>
        </dd>
        <dt>AC:</dt>
        <dd>
          <t>Attachment Circuit</t>
        </dd>
        <dt>CE:</dt>
        <dd>
          <t>Customer Edge</t>
        </dd>
        <dt>CIR:</dt>
        <dd>
          <t>Committed Information Rate</t>
        </dd>
        <dt>CN:</dt>
        <dd>
          <t>Core Network</t>
        </dd>
        <dt>CoS:</dt>
        <dd>
          <t>Class of Service</t>
        </dd>
        <dt>CP:</dt>
        <dd>
          <t>Control Plane</t>
        </dd>
        <dt>CU:</dt>
        <dd>
          <t>Centralized Unit</t>
        </dd>
        <dt>CU-CP:</dt>
        <dd>
          <t>Centralized Unit Control Plane</t>
        </dd>
        <dt>CU-UP:</dt>
        <dd>
          <t>Centralized Unit User Plane</t>
        </dd>
        <dt>DC:</dt>
        <dd>
          <t>Data Center</t>
        </dd>
        <dt>DDoS:</dt>
        <dd>
          <t>Distributed Denial of Services</t>
        </dd>
        <dt>DSCP:</dt>
        <dd>
          <t>Differentiated Services Code Point</t>
        </dd>
        <dt>eCPRI:</dt>
        <dd>
          <t>enhanced Common Public Radio Interface</t>
        </dd>
        <dt>FIB:</dt>
        <dd>
          <t>Forwarding Information Base</t>
        </dd>
        <dt>GPRS:</dt>
        <dd>
          <t>Generic Packet Radio Service</t>
        </dd>
        <dt>gNB:</dt>
        <dd>
          <t>gNodeB</t>
        </dd>
        <dt>GTP:</dt>
        <dd>
          <t>GPRS Tunneling Protocol</t>
        </dd>
        <dt>GTP-U:</dt>
        <dd>
          <t>GPRS Tunneling Protocol User plane</t>
        </dd>
        <dt>IGP:</dt>
        <dd>
          <t>Interior Gateway Protocol</t>
        </dd>
        <dt>L2VPN:</dt>
        <dd>
          <t>Layer 2 Virtual Private Network</t>
        </dd>
        <dt>L3VPN:</dt>
        <dd>
          <t>Layer 3 Virtual Private Network</t>
        </dd>
        <dt>LSP:</dt>
        <dd>
          <t>Label Switched Path</t>
        </dd>
        <dt>MIoT:</dt>
        <dd>
          <t>Massive Internet of Things</t>
        </dd>
        <dt>MPLS:</dt>
        <dd>
          <t>Multiprotocol Label Switching</t>
        </dd>
        <dt>NF:</dt>
        <dd>
          <t>Network Function</t>
        </dd>
        <dt>NRP:</dt>
        <dd>
          <t>Network Resource Partition</t>
        </dd>
        <dt>NSC:</dt>
        <dd>
          <t>Network Slice Controller</t>
        </dd>
        <dt>PE:</dt>
        <dd>
          <t>Provider Edge</t>
        </dd>
        <dt>PIR:</dt>
        <dd>
          <t>Peak Information Rate</t>
        </dd>
        <dt>QoS:</dt>
        <dd>
          <t>Quality of Service</t>
        </dd>
        <dt>RAN:</dt>
        <dd>
          <t>Radio Access Network</t>
        </dd>
        <dt>RIB:</dt>
        <dd>
          <t>Routing Information Base</t>
        </dd>
        <dt>RSVP:</dt>
        <dd>
          <t>Resource Reservation Protocol</t>
        </dd>
        <dt>SD:</dt>
        <dd>
          <t>Slice Differentiator</t>
        </dd>
        <dt>SDP:</dt>
        <dd>
          <t>Service Demarcation Point</t>
        </dd>
        <dt>SLA:</dt>
        <dd>
          <t>Service Level Agreement</t>
        </dd>
        <dt>SLO:</dt>
        <dd>
          <t>Service Level Objective</t>
        </dd>
        <dt>S-NSSAI:</dt>
        <dd>
          <t>Single Network Slice Selection Assistance Information</t>
        </dd>
        <dt>SST:</dt>
        <dd>
          <t>Slice/Service Type</t>
        </dd>
        <dt>SR:</dt>
        <dd>
          <t>Segment Routing</t>
        </dd>
        <dt>SRv6:</dt>
        <dd>
          <t>Segment Routing version 6</t>
        </dd>
        <dt>TC:</dt>
        <dd>
          <t>Traffic Class</t>
        </dd>
        <dt>TE:</dt>
        <dd>
          <t>Traffic Engineering</t>
        </dd>
        <dt>TN:</dt>
        <dd>
          <t>Transport Network</t>
        </dd>
        <dt>UE:</dt>
        <dd>
          <t>User Equipment</t>
        </dd>
        <dt>UP:</dt>
        <dd>
          <t>User Plane</t>
        </dd>
        <dt>UPF:</dt>
        <dd>
          <t>User Plane Function</t>
        </dd>
        <dt>URLLC:</dt>
        <dd>
          <t>Ultra Reliable Low Latency Communication</t>
        </dd>
        <dt>VLAN:</dt>
        <dd>
          <t>Virtual Local Area Network</t>
        </dd>
        <dt>VPN:</dt>
        <dd>
          <t>Virtual Private Network</t>
        </dd>
        <dt>VRF:</dt>
        <dd>
          <t>Virtual Routing and Forwarding</t>
        </dd>
        <dt>VXLAN:</dt>
        <dd>
          <t>Virtual Extensible Local Area Network</t>
        </dd>
      </dl>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
