<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-boucadair-teas-ietf-slicing-overview-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="IETF Network Slicing">An Overview of IETF Network Slicing Efforts</title>
    <seriesInfo name="Internet-Draft" value="draft-boucadair-teas-ietf-slicing-overview-02"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="06"/>
    <workgroup>Traffic Engineering Architecture and Signaling</workgroup>
    <keyword>slice specifications</keyword>
    <keyword>slice coordination</keyword>
    <abstract>
      <?line 31?>

<t>This document lists a set of slicing-related specifications that are being development within the IETF. This document is meant to provide an overview of slicing activities in the IETF to hopefully ease coordination and ensure that specifications that are developed in many WGs are consistent.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/ietf-slice-overview"/>.</t>
    </note>
  </front>
  <middle>
    <?line 35?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Various slicing efforts are being conduced within various IETF WGs (e.g., teas, idr, spring, ccamp, mpls, opsawg, 6man, and ippm) and areas (e.g., rtg, int, tsv, and ops). All these efforts are referring to the IETF framework that is developed by the teas WG (<xref target="slice-fr"/>), however there is a lack of a global visibility about these efforts and their interdependency.</t>
      <t>Also, there is a lack of cross-WG communications in some cases when a slicing-related specification is candidate for adoption or adopted by a WG. This lack of global view at the IETF level and lack of early cross-WG communications may induce some inconsistency. For example, some proposals argue in favor of specifying extensions to convey specific identifiers in packets. However, distinct identifiers are being proposed: slice identifier, NRP Selector, NRP identifier, VTN identifier, VTN resource identifier, etc. The need and relationship between these identifiers are worth to be discussed independent of the channels that are used to convey these identifiers.</t>
      <t>This document provides an overview of slicing activities in the IETF to hopefully ease coordination and ensure that specifications that are developed in many WGs are consistent, e.g.:</t>
      <ul spacing="normal">
        <li>Position the various concepts: network slice, network resource partition, virtual transport network, etc.</li>
        <li>Clarify the need of the various identifiers introduced so far and soften redundant/duplicate uses.</li>
        <li>Harmonize the definition of relevant identifiers (length, encoding, usage, etc.) rather than having the specification of the same identifier repeated in many places. For example, current specifications  use distinct encoding length of the same attribute (variable, 16-bit, 32-bit).</li>
        <li>Clarify the relationship and co-existence of identifiers if more than one is needed.</li>
      </ul>
      <t>Future versions of this document many include recommendations.</t>
    </section>
    <section anchor="slice-fr">
      <name>Reference Framework and Architecture</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> is the authoritative IETF framework for Network Slices. It provides definitions for a slice-related core terms and specifies a framework for the provision
of Network Slice services over networks that are deployed using technologies that are owned by the IETF (IP, MPLS, etc.). The document refers to such slices as IETF Network Slice.</t>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> provides a clear distinction between:</t>
      <ul spacing="normal">
        <li>the "IETF Network Slice service" which is the service delivered to the customer and which is agnostic to the technologies and mechanisms
 used by the service provider, and</li>
        <li>the "IETF Network Slice" which is the realization of the service in the service provider's network achieved by partitioning network resources and by applying a set of mechanisms within the network.</li>
      </ul>
      <t>The IETF Network Slice service is specified in terms of:</t>
      <ul spacing="normal">
        <li>a set of Service Demarcation Point (SDP),</li>
        <li>a set of one or more connectivity constructs between subsets of these SDPs, and</li>
        <li>a set of service objectives for each SDP sending to each connectivity construct.</li>
      </ul>
      <t>The service objectives can be expressed as Service Level Objectives (SLOs) or Service Level Expectations (SLEs).</t>
      <t>In some deploymenets, the underlying network can be customized to select a subset of resources that are suitable for the delivery of an IETF Network Slice service. Such a customization can be achieved by creating a set of Network Resource Partitions (NRPs).</t>
      <t>In other deployments, IETF Network Slices can be hosted directly on the underlay network (i.e., without requiring any NRP).</t>
      <t>IETF Network Slices can be realized using existing tools (<xref target="no-extension"/>). The extensions listed in <xref target="cp-ext"/> or <xref target="dp-ext"/> are not required in such a case.</t>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> does not provide any recommendation about the technological means to realize an IETF Network Slice service. These considerations are deployment specific.</t>
    </section>
    <section anchor="models-for-realizing-network-slices">
      <name>Models for Realizing Network Slices</name>
      <section anchor="no-extension">
        <name>Using Current IP/MPLS Technologies</name>
        <t><xref target="I-D.srld-teas-5g-slicing"/> describes a model for the realization of IETF Network Slices for 5G networks. This realization model reuses many building blocks that are commonly used in service provider networks, specifically:</t>
        <ul spacing="normal">
          <li>L2VPN/L3VPN service instances for logical separation,</li>
          <li>Fine-grained resource control at the PE,</li>
          <li>Coarse resource control at the transit, and</li>
          <li>Capacity planning/management for efficient usage of provider network resources.</li>
        </ul>
      </section>
      <section anchor="flow-agg">
        <name>Using Network Resource Partitions and Slice-Flow Aggregates</name>
        <t><xref target="I-D.ietf-teas-ns-ip-mpls"/> proposes a model that is inspired from the Diffserv model for the realization of Network Slices over IP/MPLS networks. Specifically, this model introduces the concept of Slice-Flow Aggregate which is defined as a collection of packets that are mapped to an NRP and are given the same forwarding treatment in a shared network. An aggregate can group flows from of one or more IETF Network Slice services.</t>
        <t><xref target="I-D.ietf-teas-ns-ip-mpls"/> also introduces the notion of NRP Policy that is used to trigger the creation of NRPs that will support a given Slice-Flow Aggregate. In some deployment schemes, packets that belong to a Slice-Flow Aggregate are forwarded by intermediate node along the appropriate NRP by processing an NRP Selector that is carried by these packets.</t>
      </section>
      <section anchor="optical-transport-networks-otn-slicing">
        <name>Optical Transport Networks (OTN) Slicing</name>
        <t><xref target="I-D.ietf-ccamp-yang-otn-slicing"/> defines Optical Transport Networks (OTN) slice as an OTN virtual network topology connecting a number of OTN endpoints using a set of shared or dedicated OTN network resources to satisfy specific SLOs. OTN slices are considered as a technology-specific realization of an IETF Network Slice in the OTN domain.</t>
      </section>
      <section anchor="vpn">
        <name>VPN+</name>
        <t><xref target="I-D.ietf-teas-enhanced-vpn"/> describes a framework for providing enhanced VPN services based upon VPN and Traffic Engineering (TE) technologies. Enhanced VPN (VPN+) can be used for the realization of IETF network slices. This document introduces the concept of Virtual Transport Network (VTN), which is a virtual underlay network consisting of a subset of network resources allocated from the physical underlay network, and is associated with a customized network topology.</t>
      </section>
      <section anchor="instantiation-in-service-providers-networks">
        <name>Instantiation in Service Providers Networks</name>
        <t><xref target="I-D.barguil-teas-network-slices-instantation"/> focuses on the instantiation of the IETF Network Slice services in service provider networks using available data models. In particular, this document describes the relationship between service models for managing the IETF Network Slice services and Network Models (e.g., the Layer-3 Network Model (L3NPM, <xref target="RFC9182"/>), the Layer-2 Network Model (L2NM <xref target="RFC9291"/>)) used for the realization of the slices.</t>
      </section>
      <section anchor="structuring-network-slice-controllers">
        <name>Structuring Network Slice Controllers</name>
        <t><xref target="I-D.contreras-teas-slice-controller-models"/> proposes an approach for structuring the IETF Network Slice Controller as well as how to use different data models being defined for IETF Network Slice Service provision.</t>
      </section>
      <section anchor="sr-based-hierarchical-network-slices">
        <name>SR-based Hierarchical Network Slices</name>
        <t><xref target="I-D.gong-teas-hierarchical-slice-solution"/> proposes a hierarchical approach for realizing IETF Network Slices in Segment Routing domain. The approach involves two levels:</t>
        <ul spacing="normal">
          <li>Level 1 Network Slices are realized using Flex-Algo.</li>
          <li>Level 2 forwarding paths are restricted in the Level 1 topology by using SR Policy and NRP-ID in the data plane.</li>
        </ul>
      </section>
      <section anchor="realization-of-composite-network-slices">
        <name>Realization of Composite Network Slices</name>
        <t><xref target="I-D.li-teas-composite-network-slices"/> investigates a set of scenarios for realizing composite IETF Network Slices (that basically involve other slices).  The document defines a new identifier, called Inter-Domain Network Resource Partition Identifier (Inter-domain NRP ID).</t>
      </section>
    </section>
    <section anchor="applicability-and-mapping-scenarios">
      <name>Applicability and Mapping Scenarios</name>
      <section anchor="gpp-5g-end-to-end-network-slices">
        <name>3GPP 5G End-to-End Network Slices</name>
        <t><xref target="I-D.ietf-teas-5g-network-slice-application"/> focuses on the application of IETF Network Slices in the context of the 3GPP 5G slices.</t>
      </section>
      <section anchor="abstraction-and-control-of-traffic-engineered-networks-actn">
        <name>Abstraction and Control of Traffic Engineered Networks (ACTN)</name>
        <t><xref target="I-D.ietf-teas-applicability-actn-slicing"/> describes the applicability of ACTN to Network Slicing.</t>
      </section>
      <section anchor="mobility-aware-transport-network-slicing">
        <name>Mobility-Aware Transport Network Slicing</name>
        <t><xref target="I-D.ietf-dmm-tn-aware-mobility"/> discusses a mapping of 5G slices to IETF Network Slices when the transport network is separated from the networks in which the 5G network functions are deployed (e.g., 5G functions distributed across data centers). This document zooms into the use of UDP source port number in GTP-U outer header and LAN to map between a 5G slice and corresponding IETF Network Slice segments that is listed in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      </section>
      <section anchor="detnet">
        <name>DetNet</name>
        <t><xref target="I-D.sw-detnet-network-slice-mapping-yang"/> describes the applicability of DetNet to IETF Network Slice, particularly to provide deterministic services. The document describes how to use DetNet flow aggregation as the Slice-Flow Aggregates over an underlying NRP following the approach in <xref target="flow-agg"/>.</t>
      </section>
    </section>
    <section anchor="orchestration-and-data-models">
      <name>Orchestration and Data Models</name>
      <t><xref target="model-overview"/> provides an example of the various data models that can be invoked in the context of Network Slicing.</t>
      <figure anchor="model-overview">
        <name>Overview of Data Models used for Network Slicing</name>
        <artwork align="center"><![CDATA[
                              +---------------+
                               |   Customer    |
                               +-------+-------+
               Customer Service Model  |
               e.g., slice-svc, ac-svc,| and bearer-svc
                               +-------+-------+
                               |    Service    |
                               | Orchestration |
                               +-------+-------+
                Network Model          |
  e.g., l2vpn-ntw, l3vpn-ntw, sap, and | ac-ntw
                               +-------+-------+
                               |   Network     |
                               | Orchestration |
                               +-------+-------+
         Network Configuration Model   |
                           +-----------+-----------+
                           |                       |
                  +--------+------+       +--------+------+
                  |    Domain     |       |     Domain    |
                  | Orchestration |       | Orchestration |
                  +---+-----------+       +--------+------+
       Device         |        |                   |
       Configuration  |        |                   |
       Model          |        |                   |
                 +----+----+   |                   |
                 | Config  |   |                   |
                 | Manager |   |                   |
                 +----+----+   |                   |
                      |        |                   |
                      | NETCONF/CLI..................
                      |        |                   |
                    +--------------------------------+
      +----+ Bearer |                                | Bearer +----+
      |CE#1+--------+            Network             +--------+CE#2|
      +----+   AC   |                                |   AC   +----+
                    +--------------------------------+
       Site A                                                  Site B
]]></artwork>
      </figure>
      <section anchor="common-models">
        <name>Common Models</name>
        <t><xref target="RFC9181"/> specifies a set of reusable types and groupings to manage VPN services. Note that VPNs are used for the realization of Network Slices.</t>
        <t><xref target="I-D.boro-opsawg-teas-common-ac"/> specifies a set of reusable types and groupings to manage Attachment Circuits (ACs).</t>
      </section>
      <section anchor="service-models">
        <name>Service Models</name>
        <section anchor="attachment-circuit-as-a-service-acaas-data-model">
          <name>Attachment Circuit as a Service (ACaaS) Data Model</name>
          <t><xref target="I-D.boro-opsawg-teas-attachment-circuit"/> specifies YANG data models for managing 'Attachment Circuits'-as-a-Service (ACaaS) and also bearers. These ACs and bearers are used to identify where to deliver a slice service.</t>
        </section>
        <section anchor="network-slice-service-data-model">
          <name>Network Slice Service Data Model</name>
          <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> defines a YANG data model for manaing IETF Network Slice Services.</t>
        </section>
      </section>
      <section anchor="network-models">
        <name>Network Models</name>
        <section anchor="sap">
          <name>Service Attachment Points (SAPs)</name>
          <t><xref target="I-D.ietf-opsawg-sap"/> defines a YANG data model for representing an abstract
   view of the provider network topology that contains the points from
   which its services can be attached (e.g., basic connectivity, VPN,
   network slices).  Also, the model can be used to retrieve the points
   where the services are actually being delivered to customers
   (including peer networks).</t>
          <t>A SAP network topology can be used for one or multiple service types ('service-type'). Setting this data node to 'network-slice' allows a controller to expose where IETF Network Slices services are being delivered. It can also be used to check where IETF Network Slice services can be delivered.</t>
        </section>
        <section anchor="ac-augmented-saps">
          <name>AC-augmented SAPs</name>
          <t><xref target="I-D.boro-opsawg-ntw-attachment-circuit"/> augments the SAP model with more details for managing ACs at the network level.</t>
        </section>
        <section anchor="network-slice-topology">
          <name>Network Slice Topology</name>
          <t><xref target="I-D.liu-teas-transport-network-slice-yang"/> specifies a YANG model for IETF Network Slice Topology.</t>
          <t>The need for such a model is yet to be justified as the current scope is redundant with what can be already achieved using the SAP model (<xref target="sap"/>).</t>
        </section>
        <section anchor="nrp">
          <name>NRP</name>
          <t><xref target="I-D.wdbsp-teas-nrp-yang"/> specifies a YANG data model for managing NRPs.</t>
        </section>
        <section anchor="network-slice-mapping">
          <name>Network Slice Mapping</name>
          <t><xref target="I-D.dhody-teas-ietf-network-slice-mapping"/> specifies an IETF Network Slice Service mapping YANG model. The model supports the following mappings:</t>
          <ul spacing="normal">
            <li>L3NM <xref target="RFC9182"/></li>
            <li>L2NM <xref target="RFC9291"/></li>
            <li>TE <xref target="I-D.ietf-teas-te-service-mapping-yang"/></li>
            <li>NRP</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="cp-ext">
      <name>Control Plane Extensions</name>
      <section anchor="bgp-classful-transport-planes">
        <name>BGP Classful Transport Planes</name>
        <t><xref target="I-D.ietf-idr-bgp-ct"/> specifies mechanisms for classifying underlay routes into a set of classes, called Transport Classes, and mapping service-specific routes to a specific Transport Class. For example, <xref target="I-D.ietf-idr-bgp-ct"/> can be used to create a customized topology for Network Slices. These topologies (Transport Classes) will be typically created to satisfy certain TE characteristics. A new Transport Class Route Target Extended Community is defined for this purpose. A Transport Class is identified by a 4-octet identifier: Transport Class ID.</t>
      </section>
      <section anchor="bgp-color-aware-routing-car">
        <name>BGP Color-Aware Routing (CAR)</name>
        <t><xref target="I-D.ietf-idr-bgp-car"/> specifies a new BGP SAFI called BGP Color-Aware Routing (BGP CAR). Colors are defined to characterize an objective (e.g., low latency). To satisfy Network Slice requirements, CAR may be used to establish paths that address specific objectives. These paths will be associated with a Color.</t>
        <t>The proposal leverages the BGP Color Extended Community defined in <xref target="RFC5512"/> and builds upon the Color concept defined in <xref target="RFC9256"/>. In addition, a new Extended Community, called Local-Color-Mapping (LCM) Extended Community, is defined to address cases where the granularity of the exposed colors differs when crossing domains.</t>
      </section>
      <section anchor="nrp-1">
        <name>NRP</name>
        <section anchor="bgp-flowspec">
          <name>BGP Flowspec</name>
          <t><xref target="I-D.ietf-idr-flowspec-network-slice-ts"/> specifies a BGP Flowspec extension for NRP traffic steering.</t>
        </section>
        <section anchor="bgp-ls-filters-in-sr">
          <name>BGP-LS Filters in SR</name>
          <t><xref target="I-D.drake-teas-bgp-ls-filter-nrp"/> specifies new BGP-LS attributes, called BGP-LS Filters, for NRPs in SR networks. A BGP-LS Filter provides a description of a subset of the links and nodes in an underlay network. Ingress PE selects a path to an egress PE from the topology defined by the BGP-LS Filters it has imported for a given VPN.</t>
        </section>
        <section anchor="sr-policies-extensions">
          <name>SR Policies Extensions</name>
          <section anchor="bgp">
            <name>BGP</name>
            <t><xref target="I-D.dong-idr-sr-policy-nrp"/> and <xref target="I-D.liu-idr-bgp-network-slicing"/> define extensions to BGP in order to advertise NRP ID in an SR Policy. The NRP ID is encoded in 4 octets.</t>
          </section>
          <section anchor="bgp-ls">
            <name>BGP-LS</name>
            <t><xref target="I-D.chen-idr-bgp-ls-sr-policy-nrp"/> specifies SR Policy extensions for NRP in BGP-LS. The NRP ID is encoded in 4 octets.</t>
          </section>
        </section>
        <section anchor="pcep-extensions">
          <name>PCEP Extensions</name>
          <t><xref target="I-D.dong-pce-pcep-nrp"/> specifie Path Computation Element Communication Protocol (PCEP) extensions for NRP. The NRP ID is encoded in 4 octets.</t>
        </section>
      </section>
      <section anchor="virtual-transport-networks-vtns">
        <name>Virtual Transport Networks (VTNs)</name>
        <section anchor="is-is-mt">
          <name>IS-IS MT</name>
          <t><xref target="I-D.ietf-lsr-isis-sr-vtn-mt"/> specifies how to use IS-IS Multi-Topology (MT) for SR-based VTNs.</t>
        </section>
        <section anchor="bgp-ls-1">
          <name>BGP-LS</name>
          <t><xref target="I-D.ietf-idr-bgpls-sr-vtn-mt"/> describes a mechanism to distribute the information of SR-based VTNs to the  network controller using BGP-LS with Multi-Topology.</t>
        </section>
      </section>
    </section>
    <section anchor="dp-ext">
      <name>Data Plane Extensions</name>
      <section anchor="slice-identifier-in-the-mpls-entropy-label">
        <name>Slice Identifier in the MPLS Entropy Label</name>
        <t><xref target="I-D.decraene-mpls-slid-encoded-entropy-label-id"/> proposes an approach to encode slice identifiers in a portion of the MPLS Entropy Label (EL). The number of bits to be used for encoding the slice identifier in the EL is policy-based. Transit LSRs uses the slice identifier in the EL to apply per-slice policies.</t>
      </section>
      <section anchor="slice-identifier-in-ipv6-flow-label">
        <name>Slice Identifier in IPv6 Flow Label</name>
        <t><xref target="I-D.filsfils-spring-srv6-stateless-slice-id"/> proposes to encode slice identifers in a portion of the IPv6 Flow Label. Slice identifiers are used by intermediate IPv6 routers to process the packet according to
a network slice policy.</t>
      </section>
      <section anchor="slice-identifier-in-the-source-address-of-encapsulated-srh">
        <name>Slice Identifier in the Source Address of Encapsulated SRH</name>
        <t>When an ingress SR router encapsulates a packet in an IPv6 packet with an SRH, <xref target="I-D.cheng-spring-srv6-encoding-network-sliceid"/> suggests to use the least significant bits of the outer IPv6 source address to encode a slide identifier. SLID Presence Indicator (SPI) is used to indicate the presence of a slice identifier. The number of bits used to encode slice identifiers is local to an SR domain.</t>
      </section>
      <section anchor="vtn-resource-id-in-an-ipv6-extension-header">
        <name>VTN Resource ID in an IPv6 Extension Header</name>
        <t><xref target="I-D.ietf-6man-enhanced-vpn-vtn-id"/> describes a mechanism to carry an identifier, called VTN resource ID, in the IPv6 Hop-by-Hop extension header. The document claims that "VTN resource ID" is equivalent to NRP-ID, but does motivate why another yet ID is thus needed rather than using "NRP-ID".</t>
        <t>The length of the VTN ID depends on the context type. When CT=0, the VTN ID is a 4-octet ID.</t>
      </section>
      <section anchor="nrp-2">
        <name>NRP</name>
        <section anchor="resource-aware-segments">
          <name>Resource-aware Segments</name>
          <t>An NRP can be represented in SR networks using a set of NRP-specific resource-aware segments <xref target="I-D.ietf-spring-resource-aware-segments"/>
            <xref target="I-D.ietf-spring-sr-for-enhanced-vpn"/>.</t>
        </section>
        <section anchor="nrp-id-in-srv6">
          <name>NRP ID in SRv6</name>
          <t><xref target="I-D.liu-spring-nrp-id-in-srv6-segment"/> specifies an approach to encode the NRP ID in the SRH. This ID is used by intermediate IPv6 routers to identify the NRP to be used for forwarding. The encoding of the NRP ID in an IPv6 address is variable; an instruction is thus needed to help identifyint the NRP-ID position (e.g., low 16 bits).</t>
        </section>
        <section anchor="nrp-selector-in-mpls-network-actions">
          <name>NRP Selector in MPLS Network Actions</name>
          <t>As mentioned in <xref target="flow-agg"/>, packets that are associated with a Slice-Flow Aggregate may carry an NRP Selector (NRPS). This selector is intended to be conveyed in the packet's network layer header to identify the flow aggregate to which a packet belongs. <xref target="I-D.li-mpls-mna-nrp-selector"/> investigates a set of options to use MPLS Network Actions (MNA) to carry the NRPS:</t>
          <ul spacing="normal">
            <li>13-bit NRP Selector (NRPS13) Action</li>
            <li>20-bit NRP Selector (NRPS20) Action</li>
            <li>20-bit Entropy and NRP Selector (ENRPS20) Action</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="oam">
      <name>OAM</name>
      <section anchor="lsp-pingtraceroute-extensions">
        <name>LSP Ping/Traceroute Extensions</name>
        <t><xref target="I-D.liu-mpls-lsp-ping-nrp"/> specifies extenstions to the LSP Ping/Traceroute to convey NRP-ID in SR domains.</t>
        <t>The NRP-ID is a encoded as a 4-octet field.</t>
      </section>
      <section anchor="precision-availability-metrics-for-slo-governed-end-to-end-services">
        <name>Precision Availability Metrics for SLO-Governed End-to-End Services</name>
        <t><xref target="I-D.ietf-ippm-pam"/> introduces a new set of metrics, called Precision Availability Metrics (PAM). These metrics are used to assess whether a service (e.g., Network Slice service) is provided in compliance with its
specified SLOs.</t>
      </section>
      <section anchor="ipfix-information-elements-for-nrp">
        <name>IPFIX Information Elements for NRP</name>
        <t><xref target="I-D.liu-opsawg-ipfix-network-slice"/> explores how to use IPFIX to export NRP IDs. However, there is currently no one single stable/authoritative specification of NRP-ID. This identifier is being proposed as data plane and control plane extensions. These proposals do not share the same ID format.</t>
        <t>The initial version of <xref target="I-D.liu-opsawg-ipfix-network-slice"/> does explain which plan is used, in which layer the ID was exported, etc. Defining an IPFIX IE is useful for network observability, however there is no stable specification yet of the ID to be exported.</t>
      </section>
    </section>
    <section anchor="misc">
      <name>Misc</name>
      <section anchor="scalability-considerations-for-nrp">
        <name>Scalability Considerations for NRP</name>
        <t><xref target="I-D.ietf-teas-nrp-scalability"/> discusses a set of scenarios for the deployment of NRP with a focus on scalability implications. The document reasons about the increase of requested IETF Network Slice services that would require NRPs. Such an increase of slices is speculative at this stage.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of the mechanisms listed in the document are discussed in the relevant documents that specify these mechanisms.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not make any request to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.ietf-teas-ietf-network-slices">
        <front>
          <title>A Framework for IETF Network Slices</title>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Shunsuke Homma" initials="S." surname="Homma">
            <organization>NTT</organization>
          </author>
          <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Nvidia</organization>
          </author>
          <date day="15" month="June" year="2023"/>
          <abstract>
            <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-21"/>
      </reference>
      <reference anchor="I-D.srld-teas-5g-slicing">
        <front>
          <title>A Realization of IETF Network Slices for 5G Networks Using Current IP/ MPLS Technologies</title>
          <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Julian Lucek" initials="J." surname="Lucek">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <date day="23" month="May" year="2023"/>
          <abstract>
            <t>   5G slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks.  This feature covers
   slicing requirements for all mobile domains, including the Radio
   Access Network (RAN), Core Network (CN), and Transport Network (TN).

   This document describes a basic IETF Network Slice realization model
   in IP/MPLS networks with a focus on the Transport Network fulfilling
   5G slicing connectivity requirements.  This realization model reuses
   many building blocks currently commonly used in service provider
   networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-srld-teas-5g-slicing-09"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ns-ip-mpls">
        <front>
          <title>Realizing Network Slices in IP/MPLS Networks</title>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems Inc.</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Bin Wen" initials="B." surname="Wen">
            <organization>Comcast</organization>
          </author>
          <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
            <organization>Cisco Systems Inc.</organization>
          </author>
          <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
            <organization>IBM Corporation</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Luay Jalil" initials="L." surname="Jalil">
            <organization>Verizon</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-02"/>
      </reference>
      <reference anchor="I-D.ietf-ccamp-yang-otn-slicing">
        <front>
          <title>Framework and Data Model for OTN Network Slicing</title>
          <author fullname="Aihua Guo" initials="A." surname="Guo">
            <organization>Futurewei Technologies</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Sergio Belotti" initials="S." surname="Belotti">
            <organization>Nokia</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Yunbin Xu" initials="Y." surname="Xu">
            <organization>CAICT</organization>
          </author>
          <author fullname="Yang Zhao" initials="Y." surname="Zhao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
            <organization>IBM Corporation</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and
   defines YANG data models with OTN technology-specific augments
   deployed at both the north and south bound of the OTN network slice
   controller.  Additional YANG data model augmentations will be defined
   in a future version of this draft.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-yang-otn-slicing-04"/>
      </reference>
      <reference anchor="I-D.ietf-teas-enhanced-vpn">
        <front>
          <title>A Framework for Enhanced Virtual Private Network (VPN+)</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei</organization>
          </author>
          <author fullname="Stewart Bryant" initials="S." surname="Bryant">
            <organization>University of Surrey</organization>
          </author>
          <author fullname="Zhenqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Takuya Miyasaka" initials="T." surname="Miyasaka">
            <organization>KDDI Corporation</organization>
          </author>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung</organization>
          </author>
          <date day="23" month="January" year="2023"/>
          <abstract>
            <t>   This document describes the framework for Enhanced Virtual Private
   Network (VPN+) to support the needs of applications with specific
   traffic performance requirements (e.g., low latency, bounded jitter).
   VPN+ leverages the VPN and Traffic Engineering (TE) technologies and
   adds characteristics that specific services require beyond those
   provided by conventional VPNs.  Typically, VPN+ will be used to
   underpin network slicing, but could also be of use in its own right
   providing enhanced connectivity services between customer sites.
   This document also provides an overview of relevant technologies in
   different network layers, and identifies some areas for potential new
   work.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-enhanced-vpn-12"/>
      </reference>
      <reference anchor="I-D.barguil-teas-network-slices-instantation">
        <front>
          <title>Instantiation of IETF Network Slices in Service Providers Network</title>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Victor Lopez" initials="V." surname="Lopez">
            <organization>Nokia</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Daniel King" initials="D." surname="King">
            <organization>Old Dog Consulting</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   Network Slicing (NS) is an integral part of Service Provider
   networks.

   The IETF has produced several YANG data models to support the
   Software-Defined Networking and network slice architecture and YANG-
   based service models for network slice (NS) instantiation.

   This document describes the relationship between IETF Network Slice
   models for requesting the IETF Network Slices and (e.g., Layer-3
   Service Model, Layer-2 Service Model) and Network Models (e.g.,
   Layer-3 Network Model, Layer-2 Network Model) used during their
   realizations.

   In addition, this document describes the communication between the
   IETF Network Slice Controller and the network controllers for the
   realization of IETF network slices.

   The IETF Network Slice YANG model provides the customer-oriented view
   of the network slice.  Thus, once the IETF Network Slice controller
   (NSC) receives a request, it needs to map it to accomplish the
   specific parameters expected by the network controllers.  The network
   models are analyzed to satisfy the IETF Network Slice requirements,
   and the gaps in existing models are reported.

   The document also provides operational and security considerations
   when deploying network slices in Service Provider networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-barguil-teas-network-slices-instantation-06"/>
      </reference>
      <reference anchor="RFC9182">
        <front>
          <title>A YANG Network Data Model for Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <author fullname="A. Aguado" initials="A." surname="Aguado"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
            <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9182"/>
        <seriesInfo name="DOI" value="10.17487/RFC9182"/>
      </reference>
      <reference anchor="RFC9291">
        <front>
          <title>A YANG Network Data Model for Layer 2 VPNs</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <date month="September" year="2022"/>
          <abstract>
            <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
            <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9291"/>
        <seriesInfo name="DOI" value="10.17487/RFC9291"/>
      </reference>
      <reference anchor="I-D.contreras-teas-slice-controller-models">
        <front>
          <title>IETF Network Slice Controller and its associated data models</title>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
            <organization>IBM Corporation</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei</organization>
          </author>
          <author fullname="Sergio Belotti" initials="S." surname="Belotti">
            <organization>Nokia</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-contreras-teas-slice-controller-models-05"/>
      </reference>
      <reference anchor="I-D.gong-teas-hierarchical-slice-solution">
        <front>
          <title>Segment Routing based Solution for Hierarchical IETF Network Slices</title>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Mengxiao Chen" initials="M." surname="Chen">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Yanrong Liang" initials="Y." surname="Liang">
            <organization>Ruijie Networks Co., Ltd.</organization>
          </author>
          <date day="8" month="January" year="2023"/>
          <abstract>
            <t>   This document describes a Segment Routing based solution for two-
   level hierarchical IETF network slices. Level-1 network slice is
   realized by associating Flex-Algo with dedicated sub-interfaces, and
   level-2 network slice is realized by using SR Policy with additional
   NRP-ID on data plane.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-gong-teas-hierarchical-slice-solution-01"/>
      </reference>
      <reference anchor="I-D.li-teas-composite-network-slices">
        <front>
          <title>Realization of Composite IETF Network Slices</title>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Pang" initials="R." surname="Pang">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   Network slicing can be used to meet the connectivity and performance
   requirement of different applications or customers in a shared
   network.  An IETF network slice may be used for 5G or other network
   scenarios.  In the context of 5G, a 5G end-to-end network slice
   consists of three different types of network technology segments:
   Radio Access Network (RAN), Transport Network (TN) and Core Network
   (CN).  The transport segments of the 5G end-to-end network slice can
   be provided using IETF network slices.  In some scenarios, IETF
   network slices may span multiple network domains, and IETF network
   slices may be composed hierarchically, which means a network slice
   may itself be further sliced.

   This document first describes the possible use cases of composite
   IETF network slices, then it provides considerations about the
   realization of composite IETF network slices.  For the interaction
   between IETF network slices with 5G network slices, the identifiers
   of the 5G network slice may be introduced into IETF networks.  For
   the multi-domain IETF network slices, the Inter-Domain Network
   Resource Partition Identifier (Inter-domain NRP ID) is defined.  For
   the hierarchical IETF network slices, the structure of the NRP ID is
   discussed.  These network slice-related identifiers may be used in
   the data plane, control plane and management plane of the network for
   the instantiation and management of composite IETF network slices.
   This document also describes the management considerations of
   composite network slices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-teas-composite-network-slices-00"/>
      </reference>
      <reference anchor="I-D.ietf-teas-5g-network-slice-application">
        <front>
          <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
          <author fullname="Xuesong Geng" initials="X." surname="Geng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ivan Bykov" initials="I." surname="Bykov">
            <organization>Ribbon Communications</organization>
          </author>
          <date day="4" month="May" year="2023"/>
          <abstract>
            <t>   Network Slicing is one of the core features in 5G, which provides
   different network service as independent logical networks.  To
   provide 5G network slices service, an end-to-end network slice needs
   to consists of 3 major types of network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of IETF network slice in
   providing 5G end-to-end network slices, including the network slice
   identification mapping, network slice parameter mapping and 5G IETF
   Network Slice NBI.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-00"/>
      </reference>
      <reference anchor="I-D.ietf-teas-applicability-actn-slicing">
        <front>
          <title>Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Network Slicing</title>
          <author fullname="Daniel King" initials="D." surname="King">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Haomian Zheng" initials="H." surname="Zheng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <date day="6" month="March" year="2023"/>
          <abstract>
            <t>   Network abstraction is a technique that can be applied to a network
   domain to obtain a view of potential connectivity across the network
   by utilizing a set of policies to select network resources.

   Network slicing is an approach to network operations that builds on
   the concept of network abstraction to provide programmability,
   flexibility, and modularity.  It may use techniques such as Software
   Defined Networking (SDN) and Network Function Virtualization (NFV) to
   create multiple logical or virtual networks, each tailored for a set
   of services that share the same set of requirements.

   Abstraction and Control of Traffic Engineered Networks (ACTN) is
   described in RFC 8453.  It defines an SDN-based architecture that
   relies on the concept of network and service abstraction to detach
   network and service control from the underlying data plane.

   This document outlines the applicability of ACTN to network slicing
   in a Traffic Engineered (TE) network that utilizes IETF technologies.
   It also identifies the features of network slicing not currently
   within the scope of ACTN, and indicates where ACTN might be extended.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-applicability-actn-slicing-03"/>
      </reference>
      <reference anchor="I-D.ietf-dmm-tn-aware-mobility">
        <front>
          <title>Mobility aware Transport Network Slicing for 5G</title>
          <author fullname="Uma Chunduri" initials="U." surname="Chunduri">
            <organization>Intel Corporation</organization>
          </author>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sridhar Bhaskaran" initials="S." surname="Bhaskaran">
            <organization>Rakuten Symphony</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Praveen Muley" initials="P." surname="Muley">
            <organization>Nokia</organization>
          </author>
          <date day="5" month="July" year="2023"/>
          <abstract>
            <t>   Network slicing in 5G supports logical networks for communication
   services of multiple 5G customers to be multiplexed over the same
   infrastructure.  While 5G slicing covers logical separation of
   various aspects of 5G services, user's data plane packets over the
   radio access network (RAN) and mobile core network (5GC) use IP
   transport in many segments of the end-to-end 5G slice.  When end-to-
   end slices in a 5G system use IP network resources, they are mapped
   to corresponding IP transport network slice(s) which in turn provide
   the bandwidth, latency, isolation and other criteria requested by the
   5G slice.

   This document describes mapping of 5G slices to IP or Layer 2
   transport network slices when the IP transport network (slice
   provider) is separated from the networks in which the 5G network
   functions are deployed, for example, 5G functions that are
   distributed across data centers.  The slice mapping proposed here is
   supported transparently when a 5G user device moves across 5G
   attachment points and session anchors.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dmm-tn-aware-mobility-07"/>
      </reference>
      <reference anchor="I-D.sw-detnet-network-slice-mapping-yang">
        <front>
          <title>YANG Data Model for DetNet Mapping with Network Slice</title>
          <author fullname="Xueyan Song" initials="X." surname="Song">
            <organization>ZTE Corp.</organization>
          </author>
          <author fullname="Haisheng Wu" initials="H." surname="Wu">
            <organization>ZTE Corp.</organization>
          </author>
          <date day="8" month="March" year="2023"/>
          <abstract>
            <t>   The convergence of IETF Network Slicing with DetNet achieves adequate
   network resource allocation and reservation to each node along the
   way of DetNet flows for latency-sensitive services.  This document
   introduces the applicability of DetNet to network slice , DetNet
   mapping with Network Slice requirements and YANG data models
   extensions in the context of IP/ MPLS network.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-sw-detnet-network-slice-mapping-yang-02"/>
      </reference>
      <reference anchor="RFC9181">
        <front>
          <title>A Common YANG Data Model for Layer 2 and Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>This document defines a common YANG module that is meant to be reused by various VPN-related modules such as Layer 3 VPN and Layer 2 VPN network models.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9181"/>
        <seriesInfo name="DOI" value="10.17487/RFC9181"/>
      </reference>
      <reference anchor="I-D.boro-opsawg-teas-common-ac">
        <front>
          <title>A Common YANG Data Model for Attachment Circuits</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="3" month="May" year="2023"/>
          <abstract>
            <t>   The document specifies a common Attachment Circuits (ACs) YANG
   module, which is designed with the intent to be reusable by other
   models.  For example, this common model can be reused by service
   models to expose ACs as a service, service models that require
   binding a service to a set of ACs, network and device models to
   provision ACs, etc.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-boro-opsawg-teas-common-ac-02"/>
      </reference>
      <reference anchor="I-D.boro-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="3" month="May" year="2023"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   prior or during service provisioning (e.g., Network Slice Service).
   The document specifies also a module that updates other service and
   network modules with the required information to bind specific
   services to ACs that are created using the AC service model.

   Also, the document specifies a set of reusable groupings.  Whether a
   service model reuses structures defined in the AC models or simply
   include an AC reference is a design choice of these service models.
   Relying upon the AC service model to manage ACs over which a service
   is delivered has the merit to decorrelate the management of a service
   vs. upgrade the AC components to reflect recent AC technologies or
   features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-boro-opsawg-teas-attachment-circuit-06"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
        <front>
          <title>A YANG Data Model for the IETF Network Slice Service</title>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems, Inc</organization>
          </author>
          <author fullname="Liuyan Han" initials="L." surname="Han">
            <organization>China Mobile</organization>
          </author>
          <author fullname="John Mullooly" initials="J." surname="Mullooly">
            <organization>Cisco Systems, Inc</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-04"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-sap">
        <front>
          <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Victor Lopez" initials="V." surname="Lopez">
            <organization>Nokia</organization>
          </author>
          <date day="18" month="January" year="2023"/>
          <abstract>
            <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).

 This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-sap-15"/>
      </reference>
      <reference anchor="I-D.boro-opsawg-ntw-attachment-circuit">
        <front>
          <title>A Network YANG Data Model for Attachment Circuits</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="9" month="March" year="2023"/>
          <abstract>
            <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in
   [I-D.boro-opsawg-teas-attachment-circuit].

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-boro-opsawg-ntw-attachment-circuit-02"/>
      </reference>
      <reference anchor="I-D.liu-teas-transport-network-slice-yang">
        <front>
          <title>IETF Network Slice Topology YANG Data Model</title>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
            <organization>IBM Corporation</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Microsoft</organization>
          </author>
          <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
            <organization>Individual</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Sergio Belotti" initials="S." surname="Belotti">
            <organization>Nokia</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Aihua Guo" initials="A." surname="Guo">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Italo Busi" initials="I." surname="Busi">
            <organization>Huawei</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   An IETF network slice may use an abstract topology to describe
   intended underlay for connectivities between slice endpoints.
   Abstract topologies help the customer to request network slices with
   shared resources amongst connections, and connections can be
   activated within the slice as needed.

   This document describes a YANG data model for managing and
   controlling abstract topologies for IETF network slices defined in
   RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-ietf-network-slices once it has been published.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-teas-transport-network-slice-yang-06"/>
      </reference>
      <reference anchor="I-D.wdbsp-teas-nrp-yang">
        <front>
          <title>A YANG Data Model for Network Resource Partitions (NRPs)</title>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="7" month="April" year="2023"/>
          <abstract>
            <t>   This document defines a YANG data model for Network Resource
   Partitions (NRPs).  The model can be used, in particular, for the
   realization of the IETF Network Slice Services.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-wdbsp-teas-nrp-yang-00"/>
      </reference>
      <reference anchor="I-D.dhody-teas-ietf-network-slice-mapping">
        <front>
          <title>IETF Network Slice Service Mapping YANG Model</title>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="12" month="March" year="2023"/>
          <abstract>
            <t>   This document provides a YANG data model to map IETF network slice
   service to Traffic Engineering (TE) models (e.g., the Virtual Network
   (VN) model or the TE Tunnel etc).  It also supports mapping to the
   VPN Network models and Network Resource Partition (NRP) models.
   These models are referred to as IETF network slice service mapping
   model and are applicable generically for the seamless control and
   management of the IETF network slice service with underlying TE/VPN
   support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the IETF network slice service
   requests are mapped onto underlying network resource and TE/VPN
   models.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dhody-teas-ietf-network-slice-mapping-03"/>
      </reference>
      <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
        <front>
          <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung Electronics</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Microsoft</organization>
          </author>
          <date day="11" month="March" year="2023"/>
          <abstract>
            <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resource and TE models.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-13"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgp-ct">
        <front>
          <title>BGP Classful Transport Planes</title>
          <author fullname="Kaliraj Vairavakkalai" initials="K." surname="Vairavakkalai">
            <organization>Juniper Networks, Inc.</organization>
          </author>
          <author fullname="Natrajan Venkataraman" initials="N." surname="Venkataraman">
            <organization>Juniper Networks, Inc.</organization>
          </author>
          <date day="5" month="July" year="2023"/>
          <abstract>
            <t>   This document specifies a mechanism, referred to as "Intent Driven
   Service Mapping", that uses BGP to express intent based association
   of overlay routes, with underlay routes having specific Traffic
   Engineering (TE) characteristics, that satisfy a certain Service
   Level Agreement (SLA).  The document achieves this by defining new
   constructs, to group underlay routes with sufficienty similar TE
   characteristics into identifiable classes (Transport Class), that
   overlay routes use as an ordered set to resolve reachability
   (Resolution Scheme) towards service endpoints.  These constructs can
   be used to realize the "IETF Network Slice" defined in TEAS Network
   Slices framework.

   This document specifies protocol procedures for BGP that enable
   dissemination of such service mapping information in a network that
   may span multiple cooperating administrative domains.  These domains
   may be administered either by the same provider or by closely
   coordinating providers.  A new BGP address family that leverages
   RFC-4364 procedures and follows RFC-8277 NLRI encoding, is defined to
   advertise underlay routes with its identified class.  This new
   address family is called "BGP Classful Transport", a.k.a., BGP CT.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-ct-11"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgp-car">
        <front>
          <title>BGP Color-Aware Routing (CAR)</title>
          <author fullname="Dhananjaya Rao" initials="D." surname="Rao">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Swadesh Agrawal" initials="S." surname="Agrawal">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Co-authors" initials="" surname="Co-authors">
         </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   This document describes a BGP based routing solution to establish
   end-to-end intent-aware paths across a multi-domain service provider
   transport network.  This solution is called BGP Color-Aware Routing
   (BGP CAR).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-car-01"/>
      </reference>
      <reference anchor="RFC5512">
        <front>
          <title>The BGP Encapsulation Subsequent Address Family Identifier (SAFI) and the BGP Tunnel Encapsulation Attribute</title>
          <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
          <author fullname="E. Rosen" initials="E." surname="Rosen"/>
          <date month="April" year="2009"/>
          <abstract>
            <t>In certain situations, transporting a packet from one Border Gateway Protocol (BGP) speaker to another (the BGP next hop) requires that the packet be encapsulated by the first BGP speaker and decapsulated by the second. To support these situations, there needs to be some agreement between the two BGP speakers with regard to the "encapsulation information", i.e., the format of the encapsulation header as well as the contents of various fields of the header.</t>
            <t>The encapsulation information need not be signaled for all encapsulation types. In cases where signaling is required (such as Layer Two Tunneling Protocol - Version 3 (L2TPv3) or Generic Routing Encapsulation (GRE) with key), this document specifies a method by which BGP speakers can signal encapsulation information to each other. The signaling is done by sending BGP updates using the Encapsulation Subsequent Address Family Identifier (SAFI) and the IPv4 or IPv6 Address Family Identifier (AFI). In cases where no encapsulation information needs to be signaled (such as GRE without key), this document specifies a BGP extended community that can be attached to BGP UPDATE messages that carry payload prefixes in order to indicate the encapsulation protocol type to be used. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5512"/>
        <seriesInfo name="DOI" value="10.17487/RFC5512"/>
      </reference>
      <reference anchor="RFC9256">
        <front>
          <title>Segment Routing Policy Architecture</title>
          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
          <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
          <author fullname="D. Voyer" initials="D." surname="Voyer"/>
          <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
          <author fullname="P. Mattes" initials="P." surname="Mattes"/>
          <date month="July" year="2022"/>
          <abstract>
            <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
            <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9256"/>
        <seriesInfo name="DOI" value="10.17487/RFC9256"/>
      </reference>
      <reference anchor="I-D.ietf-idr-flowspec-network-slice-ts">
        <front>
          <title>BGP Flowspec for IETF Network Slice Traffic Steering</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Subin Wang" initials="S." surname="Wang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jiang Wenying" initials="J." surname="Wenying">
            <organization>China Mobile</organization>
          </author>
          <date day="6" month="March" year="2023"/>
          <abstract>
            <t>   BGP Flow Specification (Flowspec) provides a mechanism to distribute
   traffic flow specifications and the forwarding actions to be
   performed to the specific traffic flows.  A set of Flowspec
   components are defined to specify the matching criteria that can be
   applied to the packet, and a set of BGP extended communities are
   defined to encode the actions a routing system can take on a packet
   which matches the flow specification.

   An IETF Network Slice enables connectivity between a set of Service
   Demarcation Points (SDPs) with specific Service Level Objectives
   (SLOs) and Service Level Expectations (SLEs) over a common underlay
   network.  To meet the connectivity and performance requirements of
   network slice services, network slice service traffic needs to be
   mapped to a corresponding Network Resource Partition (NRP).  The edge
   nodes of the NRP needs to identify the traffic flows which belong to
   a network slice and steer the matched traffic into the corresponding
   NRP, or a specific path within the corresponding NRP.

   BGP Flowspec can be used to distribute the matching criteria and the
   forwarding actions to be preformed on network slice service traffic.
   The existing Flowspec components can be reused for the matching of
   network slice services flows at the edge of an NRP.  New components
   and traffic action may need to be defined for steering network slice
   service flows into the corresponding NRP.  This document defines the
   extensions to BGP Flowspec for IETF network slice traffic steering
   (NS-TS).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-network-slice-ts-00"/>
      </reference>
      <reference anchor="I-D.drake-teas-bgp-ls-filter-nrp">
        <front>
          <title>Using BGP-LS Filters to Instanted Network Resource Partitions</title>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Luay Jalil" initials="L." surname="Jalil">
            <organization>Verizon</organization>
          </author>
          <author fullname="Avinash Lingala" initials="A." surname="Lingala">
            <organization>AT&amp;T</organization>
          </author>
          <date day="16" month="December" year="2022"/>
          <abstract>
            <t>   Future networks that support advanced services, such as those enabled
   by 5G mobile networks, envision a set of overlay networks each with
   different performance and scaling properties.  These overlays are
   known as network slices and are realized over a common underlay
   network.  In the context of IETF technologies, they are known as IETF
   network slices.

   In order to support IETF network slicing, as well as to offer
   enhanced VPN services in general, it is necessary to define a
   mechanism by which specific resources (buffers, queues, scheduling
   policies, etc.) of specific network topology components (links and/or
   nodes) of an underlay network can be used by a specific network
   slice, VPN, or set of VPNs.  These collections of resources are known
   as Network Resource Partitions (NRPs).

   This document sets out such a mechanism for use of BGP-LS to
   construct and operate NRPs in Segment Routing networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-drake-teas-bgp-ls-filter-nrp-00"/>
      </reference>
      <reference anchor="I-D.dong-idr-sr-policy-nrp">
        <front>
          <title>BGP SR Policy Extensions for Network Resource Partition</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhibo Hu" initials="Z." surname="Hu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Pang" initials="R." surname="Pang">
            <organization>China Unicom</organization>
          </author>
          <date day="30" month="January" year="2023"/>
          <abstract>
            <t>   Segment Routing (SR) Policy is a set of candidate paths, each
   consisting of one or more segment lists and the associated
   information.  The header of a packet steered in an SR Policy is
   augmented with an ordered list of segments associated with that SR
   Policy.  A Network Resource Partition (NRP) is a subset of network
   resources allocated in the underlay network which can be used to
   support one or a group of IETF network slice services.

   In networks where there are multiple NRPs, an SR Policy may be
   associated with a particular NRP.  The association between SR Policy
   and NRP needs to be specified, so that for service traffic which is
   steered into the SR Policy, the header of the packets can be
   augmented with the information associated with the NRP.  An SR Policy
   candidate path can be distributed using BGP SR Policy.  This document
   defines the extensions to BGP SR policy to specify the NRP which the
   SR Policy candidate path is associated with.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dong-idr-sr-policy-nrp-02"/>
      </reference>
      <reference anchor="I-D.liu-idr-bgp-network-slicing">
        <front>
          <title>BGP Extensions to Support Packet Network Slicing in SR Policy</title>
          <author fullname="Liu Yao" initials="L." surname="Yao">
            <organization>ZTE</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE</organization>
          </author>
          <date day="31" month="March" year="2023"/>
          <abstract>
            <t>   This document defines extensions to BGP in order to advertise Network
   Resource Partition (NRP) in SR policy.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-idr-bgp-network-slicing-02"/>
      </reference>
      <reference anchor="I-D.chen-idr-bgp-ls-sr-policy-nrp">
        <front>
          <title>SR Policies Extensions for NRP in BGP-LS</title>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Detao Zhao" initials="D." surname="Zhao">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China mobile</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <date day="15" month="April" year="2023"/>
          <abstract>
            <t>   This document defines a new TLV which enable the headed to report the
   configuration and the states of SR policies carrying NRP information
   by using BGP-LS.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-chen-idr-bgp-ls-sr-policy-nrp-02"/>
      </reference>
      <reference anchor="I-D.dong-pce-pcep-nrp">
        <front>
          <title>Path Computation Element Communication Protocol (PCEP) Extensions for Network Resource Partition (NRP)</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Sheng Fang" initials="S." surname="Fang">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Quan Xiong" initials="Q." surname="Xiong">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Liuyan Han" initials="L." surname="Han">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Minxue Wang" initials="M." surname="Wang">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems</organization>
          </author>
          <date day="10" month="March" year="2023"/>
          <abstract>
            <t>   This document specifies the extensions to Path Computation Element
   Communication Protocol (PCEP) to carry Network Resource Partition
   (NRP) related information in the PCEP messages.  The extensions in
   this document can be used to indicate the NRP-specific constraints
   and information needed in path computation, path status report and
   path initialization.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dong-pce-pcep-nrp-00"/>
      </reference>
      <reference anchor="I-D.ietf-lsr-isis-sr-vtn-mt">
        <front>
          <title>Using IS-IS Multi-Topology (MT) for Segment Routing based Virtual Transport Network</title>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Chenhao Ma" initials="C." surname="Ma">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   Enhanced VPN (VPN+) aims to provide enhanced VPN service to support
   some application's needs of enhanced isolation and stringent
   performance requirements.  VPN+ requires integration between the
   overlay VPN connectivity and the characteristics provided by the
   underlay network.  A Virtual Transport Network (VTN) is a virtual
   underlay network which consists of a subset of network resources
   allocated on network nodes and links in a customized topology of the
   physical network.  A VTN could be used as the underlay to support one
   or a group of VPN+ services.

   In some network scenarios, each VTN can be associated with a unique
   logical network topology.  This document describes a mechanism to
   build the SR based VTNs using IS-IS Multi-Topology together with
   other well-defined IS-IS extensions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-isis-sr-vtn-mt-04"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgpls-sr-vtn-mt">
        <front>
          <title>BGP-LS with Multi-topology for Segment Routing based Virtual Transport Networks</title>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Cong Li" initials="C." surname="Li">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="13" month="March" year="2023"/>
          <abstract>
            <t>   Enhanced VPN (VPN+) aims to provide enhanced VPN service to support
   some applications' needs of enhanced isolation and stringent
   performance requirements.  VPN+ requires integration between the
   overlay VPN and the underlay network.  A Virtual Transport Network
   (VTN) is a virtual underlay network which consists of a subset of the
   network topology and network resources allocated from the physical
   network.  A VTN could be used as the underlay for one or a group of
   VPN+ services.

   When Segment Routing is used as the data plane of VTNs, each VTN can
   be allocated with a group of Segment Identifiers (SIDs) to identify
   the topology and resource attributes of network segments in the VTN.
   The association between the network topology, the network resource
   attributes and the SR SIDs may need to be distributed to a
   centralized network controller.  In network scenarios where each VTN
   can be associated with a unique logical network topology, this
   document describes a mechanism to distribute the information of SR
   based VTNs using BGP-LS with Multi-Topology.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgpls-sr-vtn-mt-02"/>
      </reference>
      <reference anchor="I-D.decraene-mpls-slid-encoded-entropy-label-id">
        <front>
          <title>Using Entropy Label for Network Slice Identification in MPLS networks.</title>
          <author fullname="Bruno Decraene" initials="B." surname="Decraene">
            <organization>Orange</organization>
          </author>
          <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
            <organization>Nokia</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Luay Jalil" initials="L." surname="Jalil">
            <organization>Verizon</organization>
          </author>
          <date day="12" month="December" year="2022"/>
          <abstract>
            <t>   This document updates [RFC6790] to extend the use of the TTL field of
   the Entropy Label in order to provide a flexible set of flags called
   the Entropy Label Control field.

   This document also defines a solution to encode a slice identifier in
   MPLS in order to distinguish packets that belong to different slices,
   to allow enforcing per network slice policies (.e.g, Qos).

   The slice identification is independent of the topology.  It allows
   for QoS/DiffServ policy on a per slice basis in addition to the per
   packet QoS/DiffServ policy provided by the MPLS Traffic Class field.

   In order to minimize the size of the MPLS stack and to ease
   incremental deployment the slice identifier is encoded as part of the
   Entropy Label.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-decraene-mpls-slid-encoded-entropy-label-id-05"/>
      </reference>
      <reference anchor="I-D.filsfils-spring-srv6-stateless-slice-id">
        <front>
          <title>Stateless and Scalable Network Slice Identification for SRv6</title>
          <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Francois Clad" initials="F." surname="Clad">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Pablo Camarillo" initials="P." surname="Camarillo">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Syed Raza" initials="S." surname="Raza">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Daniel Voyer" initials="D." surname="Voyer">
            <organization>Bell Canada</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <date day="29" month="January" year="2023"/>
          <abstract>
            <t>   This document defines a stateless and scalable solution to achieve
   network slicing with SRv6.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-filsfils-spring-srv6-stateless-slice-id-07"/>
      </reference>
      <reference anchor="I-D.cheng-spring-srv6-encoding-network-sliceid">
        <front>
          <title>Encoding Network Slice Identification for SRv6</title>
          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Guangming Yang" initials="G." surname="Yang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Shay Zadok" initials="S." surname="Zadok">
            <organization>Broadcom</organization>
          </author>
          <author fullname="Mingyu Wu" initials="M." surname="Wu">
            <organization>CentecNetworks</organization>
          </author>
          <author fullname="xuewei wang" initials="X." surname="wang">
            <organization>Ruijie Networks Co., Ltd.</organization>
          </author>
          <date day="17" month="April" year="2023"/>
          <abstract>
            <t>   This document describes a method to encode network slicing
   identifier within SRv6 domain.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cheng-spring-srv6-encoding-network-sliceid-06"/>
      </reference>
      <reference anchor="I-D.ietf-6man-enhanced-vpn-vtn-id">
        <front>
          <title>Carrying Virtual Transport Network (VTN) Information in IPv6 Extension Header</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Chenhao Ma" initials="C." surname="Ma">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
            <organization>Verizon Inc.</organization>
          </author>
          <date day="17" month="May" year="2023"/>
          <abstract>
            <t>   Virtual Private Networks (VPNs) provide different customers with
   logically separated connectivity over a common network
   infrastructure.  With the introduction and evolvement of 5G and other
   network scenarios, some existing or new customers may require
   connectivity services with advanced characteristics comparing to
   traditional VPNs.  Such kind of network service is called enhanced
   VPNs (VPN+).  VPN+ can be used to deliver IETF network slices, and
   could also be used for other application scenarios.

   A Virtual Transport Network (VTN) is a virtual underlay network which
   consists of a set of dedicated or shared network resources allocated
   from the physical underlay network, and is associated with a
   customized logical network topology.  VPN+ services can be delivered
   by mapping one or a group of overlay VPNs to the appropriate VTNs as
   the virtual underlay.  In packet forwarding, some fields in the data
   packet needs to be used to identify the VTN the packet belongs to, so
   that VTN-specific processing can be performed on each node the packet
   traverses.

   This document proposes a new Hop-by-Hop option of IPv6 extension
   header to carry the VTN related information in data packets, which
   could used to identify the VTN specific processing to be performed on
   the packets.  The procedure of processing the VTN option is also
   specified.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-6man-enhanced-vpn-vtn-id-04"/>
      </reference>
      <reference anchor="I-D.ietf-spring-resource-aware-segments">
        <front>
          <title>Introducing Resource Awareness to SR Segments</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Stewart Bryant" initials="S." surname="Bryant">
            <organization>University of Surrey</organization>
          </author>
          <author fullname="Takuya Miyasaka" initials="T." surname="Miyasaka">
            <organization>KDDI Corporation</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Fengwei Qin" initials="F." surname="Qin">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Zhenqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Francois Clad" initials="F." surname="Clad">
            <organization>Cisco Systems</organization>
          </author>
          <date day="31" month="May" year="2023"/>
          <abstract>
            <t>   This document describes the mechanism to associate network resources
   to Segment Routing Identifiers (SIDs).  Such SIDs are referred to as
   resource-aware SIDs in this document.  The resource-aware SIDs retain
   their original forwarding semantics, but with the additional
   semantics to identify the set of network resources available for the
   packet processing and forwarding action.  The resource-aware SIDs can
   therefore be used to build SR paths or virtual networks with a set of
   reserved network resources.  The proposed mechanism is applicable to
   both segment routing with MPLS data plane (SR-MPLS) and segment
   routing with IPv6 data plane (SRv6).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-spring-resource-aware-segments-07"/>
      </reference>
      <reference anchor="I-D.ietf-spring-sr-for-enhanced-vpn">
        <front>
          <title>Segment Routing based Virtual Transport Network (VTN) for Enhanced VPN</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Stewart Bryant" initials="S." surname="Bryant">
            <organization>University of Surrey</organization>
          </author>
          <author fullname="Takuya Miyasaka" initials="T." surname="Miyasaka">
            <organization>KDDI Corporation</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Fengwei Qin" initials="F." surname="Qin">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Zhenqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Francois Clad" initials="F." surname="Clad">
            <organization>Cisco Systems</organization>
          </author>
          <date day="31" month="May" year="2023"/>
          <abstract>
            <t>   Segment Routing (SR) leverages the source routing paradigm.  A node
   steers a packet through an ordered list of instructions, called
   "segments".  A segment can represent topological or service based
   instructions.  A segment can further be associated with a set of
   network resources used for executing the instruction.  Such a segment
   is called resource-aware segment.

   A Virtual Transport Network (VTN) is a virtual underlay network which
   is associated with a network topology, and is allocated with a set of
   dedicated or shared resources from the underlay physical network.

   Resource-aware Segment Identifiers (SIDs) may be used to build SR
   paths with a set of reserved network resources.  In addition, a group
   of resource-aware SIDs may be used to build SR based virtual underlay
   networks, which provide customized network topology and resource
   attributes required by one or a group of customers and/or services.
   Such virtual underlay networks are the SR instantiations of VTNs.

   This document describes a suggested approach to build SR based VTNs
   using resource-aware SIDs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-for-enhanced-vpn-05"/>
      </reference>
      <reference anchor="I-D.liu-spring-nrp-id-in-srv6-segment">
        <front>
          <title>NRP ID in SRv6 segment</title>
          <author fullname="Yisong Liu" initials="Y." surname="Liu">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Hao Li" initials="H." surname="Li">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <date day="17" month="April" year="2023"/>
          <abstract>
            <t>   This document proposes a method to carry the NRP-ID with the packet
   in the SRv6 segment.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-spring-nrp-id-in-srv6-segment-02"/>
      </reference>
      <reference anchor="I-D.li-mpls-mna-nrp-selector">
        <front>
          <title>MPLS Network Actions for Network Resource Partition Selector</title>
          <author fullname="Tony Li" initials="T." surname="Li">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Israel Meilik" initials="I." surname="Meilik">
            <organization>Broadcom</organization>
          </author>
          <date day="5" month="May" year="2023"/>
          <abstract>
            <t>   An IETF Network Slice service provides connectivity coupled with a
   set of network resource commitments and is expressed in terms of one
   or more connectivity constructs.  A Network Resource Partition (NRP)
   is a collection of resources identified in the underlay network to
   support IETF Network Slice services.  A Slice-Flow Aggregate refers
   to the set of traffic streams from one or more connectivity
   constructs belonging to one or more IETF Network Slices that are
   mapped to a specific NRP and provided the same forwarding treatment.
   The packets associated with a Slice-Flow Aggregate may carry a
   marking in the packet's network layer header to identify this
   association and this marking is referred to as NRP Selector.  The NRP
   Selector is used to map the packet to the associated NRP and provide
   the corresponding forwarding treatment to the packet.

   MPLS Network Actions (MNA) technologies are used to indicate actions
   for Label Switched Paths (LSPs) and/or MPLS packets and to transfer
   data needed for these actions.  This document discusses options for
   using MPLS Network Actions (MNAs) to carry the NRP Selector in MPLS
   packets.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-mpls-mna-nrp-selector-00"/>
      </reference>
      <reference anchor="I-D.liu-mpls-lsp-ping-nrp">
        <front>
          <title>LSP Ping/Traceroute for SR-MPLS NRP SIDs</title>
          <author fullname="Liu Yao" initials="L." surname="Yao">
            <organization>ZTE</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE</organization>
          </author>
          <date day="12" month="March" year="2023"/>
          <abstract>
            <t>   [RFC8287] defines the extensions to MPLS LSP ping and traceroute for
   Segment Routing IGP-Prefix and IGP-Adjacency SIDs with an MPLS data
   plane.  To correctly identify and validate an SR NRP SID, the
   validating device also requires NRP-ID to be supplied in the FEC
   Stack sub-TLV.  This document introduces new Target FEC Stack sub-
   TLVs to perform MPLS LSP ping and traceroute for NRP SIDs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-mpls-lsp-ping-nrp-01"/>
      </reference>
      <reference anchor="I-D.ietf-ippm-pam">
        <front>
          <title>Precision Availability Metrics for Services Governed by Service Level Objectives (SLOs)</title>
          <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Xiao Min" initials="X." surname="Min">
            <organization>ZTE Corp.</organization>
          </author>
          <author fullname="Alexander Clemm" initials="A." surname="Clemm">
            <organization>Futurewei</organization>
          </author>
          <author fullname="John Strassner" initials="J." surname="Strassner">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Jérôme François" initials="J." surname="François">
            <organization>Inria and University of Luxembourg</organization>
          </author>
          <date day="5" month="July" year="2023"/>
          <abstract>
            <t>   This document defines a set of metrics for networking services with
   performance requirements expressed as Service Level Objectives (SLO).
   These metrics, referred to as Precision Availability Metrics (PAM),
   are useful for defining and monitoring SLOs.  For example, PAM can be
   used by providers and/or users of a Network Slice service to assess
   whether the service is provided in compliance with its defined SLOs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ippm-pam-04"/>
      </reference>
      <reference anchor="I-D.liu-opsawg-ipfix-network-slice">
        <front>
          <title>Export of Network Resource Partition (NRP) Information in IP Flow Information Export (IPFIX)</title>
          <author fullname="Liu Yao" initials="L." surname="Yao">
            <organization>ZTE</organization>
          </author>
          <date day="28" month="June" year="2023"/>
          <abstract>
            <t>   This document introduces new IP Flow Information Export (IPFIX)
   Information Elements to identify the Network Resource Partition (NRP)
   that the network slice traffic is related with.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-opsawg-ipfix-network-slice-00"/>
      </reference>
      <reference anchor="I-D.ietf-teas-nrp-scalability">
        <front>
          <title>Scalability Considerations for Network Resource Partition</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Guangming Yang" initials="G." surname="Yang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jim Guichard" initials="J." surname="Guichard">
            <organization>Futurewei Technologies</organization>
          </author>
          <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
            <organization>Verizon Inc.</organization>
          </author>
          <author fullname="Fengwei Qin" initials="F." surname="Qin">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <date day="2" month="June" year="2023"/>
          <abstract>
            <t>   The IETF Network Slice aims to offer connectivity services to a
   network slice customer with specific Service Level Objectives (SLOs)
   and Service Level Expectations (SLEs) over a common underlay network.
   A Network Resource Partition (NRP) is a set of network resources that
   are allocated from the underlay network to carry a specific set of
   network slice service traffic and meet specific SLOs and SLEs.

   As the demand for IETF Network Slice increases, scalability would
   become an important factor for the deployment of IETF Network Slices.
   Although the scalability of IETF Network Slices can be improved by
   mapping a group of IETF Network Slices to one NRP, that design may
   not be suitable or possible for all deployments, thus there are
   concerns about the scalability of NRPs.

   This document discusses some scalability considerations about NRPs in
   the network control and data plane.  It also investigates a set of
   optimization mechanisms.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-nrp-scalability-02"/>
      </reference>
    </references>
    <?line 359?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Kaliraj Vairavakkalai for the comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
