<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of IETF Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-00"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2023" month="June" day="27"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 162?>

<t>5G slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks. This feature covers slicing
   requirements for all mobile domains, including the Radio Access
   Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a basic IETF Network Slice realization model
   in IP/MPLS networks with a focus on the Transport Network fulfilling
   5G slicing connectivity requirements. This realization model reuses many building blocks currently commonly used
   in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 174?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> defines a framework for
   network slicing in the context of networks built using IETF
   technologies.  The IETF network slicing framework introduces the
   concept of a Network Resource Partition (NRP), which is simply a
   collection of resources identified in the underlay network.  There
   could be multiple realizations of IETF Network Slice and
   NRP concepts, where each realization might be optimized for the
   different network slicing use cases.</t>
      <t>This document describes an IETF Network Slice realization model
   in IP/MPLS networks, using a single NRP and with a focus on
   fulfilling 5G slicing connectivity requirements.
   This IETF Network Slice realization model leverages many building blocks currently
   commonly used in service provider networks.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-intro"/> for readers' convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more
   details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="g-network-slicing-integration-in-transport-networks">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-intro"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP managment system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map with a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a Network Function (NF) instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a Wide Area Network (WAN) (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the IETF Network Slices apply.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
     ┌──────────────────────────────────┐
  ┌──│         5G NF (RAN or CN)        │──┐
  │  └──────────────────────────────────┘  │
  │                                        │
  ▼                                        ▼
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  ┌──┐
│NF├ ─ ─      Transport Network        ├ ┤NF│
└──┘  └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  └──┘
          │             │            │
          ▼             ▼            ▼

  ┌───Data Center──┐ ┌─MPLS-VPN─┐  ┌─Public─┐
  │                │ │ Backbone │  │ Cloud  │
  │   ┌───┐┌───┐   │┌┴─┐      ┌─┴┐┌┴─┐      │
  │   └───┘└───┘   │└┬─┘      └─┬┘└┬─┘      │
  │┌──┐┌──┐┌──┐┌──┐│┌┴─┐      ┌─┴┐ │        │
  │└──┘└──┘└──┘└──┘│└┬─┘      └─┬┘ │        │
  └────────────────┘ └──────────┘  └────────┘
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. End-to-End 5G Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN Slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different options to implement TN slices based upon
 tools, such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: Customer Sites and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │          Provider Network                 Customer    │
│      Site             │                       │       │      Site       
           ┌────┐│       ┌────┐           ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │           │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │           │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │           │    ││       ││    │           
  └┤NF│    └────┘│       └────┘           └────┘         └────┘          │
│  └──┘                 │                       │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the End-to-End 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt>Customer Sites:</dt>
          <dd>
            <t>A customer manages and deploys 5G Network Functions (RAN and CN) in Customer Sites. On top of 5G Network Functions (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, switches, or VPC Gateways) within a Customer Site. A Customer Site can be either a physical or a virtual location. Examples of Customer Sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within provider or colocation service. The Orchestration of the TN within Customer Sites relies upon a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). The detail of these is out of the scope of this document.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting Customer Sites. The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect Customer Sites. We assume in this document that the provider Network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit. Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G Network Function (i.e., an element of 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)). This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data model terminology (e.g., <xref target="RFC9182"/>), we assume that an AC is configured on a “bearer”, which represents the underlying connectivity. Examples of ACs are VLANs (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., Section 3.4.3 of <xref target="RFC4664"/>). This approach consolidates a definition of CE/PE/AC that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of such a distribution is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed. An example of a distributed PE is the “Managed CE service”. For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both a single and a distributed devices.</t>
        </section>
        <section anchor="attachment-circuits-for-inter-as-options-bc">
          <name>Attachment Circuits for Inter-AS Options B/C</name>
          <t>In some cases, a CE connects to the provider network using Inter-AS Option B or C as defined in <xref section="10" sectionFormat="of" target="RFC4364"/> with the use of MPLS or SRv6 data planes. An example of such as an AC is depicted in <xref target="_figure-51"/>. The configuration of VRFs together with control plane identifiers, such as Route Targets (RTs) and Route Distinguishers (RDs), happens on the CE. This is a source of confusion since these configurations are typically enforced on PE devices. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE (e.g., in  Inter-AS Option C, the Autonomous System Border Router (ASBR) and a remote PE in the provider network with VRF configuration form a distributed PE).</t>
          <figure anchor="_figure-51">
            <name>MPLS or SRv6 Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                     NHS               
│                                (Option B)           │
               │ ◀──────MP-BGP─────▶    ◀──────────▶   
│          ┌────┐                  ┌──┴─┐             │
           │    │   MPLS-based AC  │    │              
│          │ CE ├ ─ ─ ─ ─ ─ ─ ─ ─ ─│ PE │             │
   ┏━━━━━━━┻━━━━┻━━━━━━━┓          │    │              
│  ┃VRFX:               ┃          └──┬─┘             │
 ─ ┫- rt 123:123        ┃              ─ ─ ─ ─ ─ ─ ─ ─ 
   ┃- rd 198.51.100.1:1 ┃                              
   ┗━━━━━━━━━━━━━━━━━━━━┛                              
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters (e.g., the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies)). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although we may consider that the AC stitching logic happens internally within the device. The provider manages the AC between the CE and the PE.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="end-to-end-5g-slice-orchestration-architecture">
          <name>End-to-End 5G Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of an end-to-end 5G Slice with a zoom on TN parts.</t>
          <ul empty="true">
            <li>
              <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
            </li>
          </ul>
          <t>In reference to <xref target="_figure-orch"/>, an end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating end-to-end 5G Slices. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G Slice spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <ul spacing="normal">
            <li>Provider Network Orchestration domain: as defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>, the provider relies on an IETF Network Slice Controller (NSC) to manage and orchestrate IETF Network Slices in the provider network. This framework permits to manage connectivity together with SLOs. Ultimately, the 5G NSO interfaces with an NSC for the management of IETF Network Slices using IETF APIs and data models.</li>
            <li>Customer Site Orchestration domain: the Orchestration of TN elements of the Customer Sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this section does not involve the Transport Network Orchestration.</li>
          </ul>
          <t>A TN Slice relies upon resources that can involve both the provider and customer TN domains. Therefore, a TN Slice has broader scope than an IETF Network Slice since the latter applies to the provider network only. More details are provided in the next section.</t>
          <figure anchor="_figure-orch">
            <name>End-to-end 5G Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         │  5G NSO   │                          
                         └──┬───┬────┘                          
                            │   │                               
                            │   │                               
                            ▼   │                               
              ┌───────────────┐ │                               
              │ 3GPP domains  │ │                               
  ┌───────────┤ Orchestration │─┼──────────────────────────┐    
  │           │ (RAN and CN)  │ │                          │    
  │           └───────────────┘ │                          │    
  │                             │                          │    
  │    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━│━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   │    
  │      TN Orchestration       │                          │    
  │    ┃        ┌───────────────┼──────────────┐       ┃   │    
  │             ▼               ▼              ▼           │    
  │    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   │    
  │     │ Customer Site ││ IETF NSC  ││ Customer Site │    │    
  │    ┃│ Orchestration ││           ││ Orchestration │┃   │    
  │     └──┬────────────┘└─────┬─────┘└──────────────┬┘    │    
  │    ┗ ━ │ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        ▼                   ▼                     ▼     │    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─│─ ─ 
  │                          Provider                      │   │
│ ▼           │       ┌─┴──┐ Network   ┌──┴─┐      ┌┴───┐  │    
 ┌──┐     ┌────┐  AC  │    │           │    │  AC  │ NF ◀──┘   │
││NF● ─ ─ ┤ CE ├ ─ ─ ─■ PE │           │ PE ■ ─ ─ ─●(CE)│       
 └──┘     └────┘      │    │           │    │      └────┘      │
│             │       └─┬──┘           └──┬─┘       │           
    Customer                                          Customer │
│     Site    │         │                 │         │   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                                                                
                      ■─IETF Network Slice──■                   
                                                                
     ●──────────────────TN Slice────────────────────●           
                                                                
]]></artwork>
          </figure>
        </section>
        <section anchor="transport-network-sections-and-network-slice-instantiation">
          <name>Transport Network Sections and Network Slice Instantiation</name>
          <t>Based on the reference design, the connectivity between NFs can be decomposed into three main types of sections. <xref target="fig-end-to-end"/> depicts the different sections:</t>
          <ul spacing="normal">
            <li>Customer Site: Either connects two NFs located in the same Customer Site (e.g., NF1-NF2) or it connects a NF to a CE (e.g., NF1-CE). This section may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE. The realization of this section is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration (e.g., Fabric Manager, Element Management System, or VIM). The realization of this section does not involve the Transport Network Orchestration.</li>
            <li>Provider Network: Represents the connectivity between two PEs (e.g., PE1-PE2).The realization of this section is controlled by an IETF NSC.</li>
            <li>Attachment Circuit: Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this section relies partially upon an  IETF NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</li>
          </ul>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an IETF Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new network slice may rely on a partial or full pre-provisioned section (e.g., a network slice may rely on an existing AC). Notwithstanding, a framework for the automation of both sections is proposed in this document. The Customer Site section is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the Customer Site infrastructure is usually over-provisioned with short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the network slice between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
                                                                  
       ●──────────────────────TN Slice────────────────●           
                                                                  
                        ■─────IETF NETWORK────■                   
                        │        SLICE        │                   
                        │          │          │                   
                        │          │          │                   
                        ▽          ▽          ▽                   
       ●──CS──□ □───AC──■ □────────PN───────□ ■───AC──●           
  ┌ ─ ─ ─ ─ ─ ─ ┐          ┌ ─ ─ ─ ─ ─ ─ ─ ┐          ┌ ─ ─ ─ ─ ─ 
      Customer                  Provider                Customer │
  │     Site    │          │    Network    │          │   Site    
                        ┌────┐           ┌────┐                  │
  │┌───┐    ┌───┴┐  AC  │    │           │    │  AC  ┌┴──┐        
CS │NF1├────┤ CE ├ ─ ─ ─│ PE │           │ PE ├ ─ ─ ─│NF3│       │
□ │└─┬─┘    └───┬┘      │    │           │    │      └┬──┘        
│    │                  └────┘           └────┘                  │
│ │  │          │          │               │          │           
□  ┌─┴─┐                                                         │
  ││NF2│        │          │               │          │           
   └───┘                                                         │
  └ ─ ─ ─ ─ ─ ─ ┘          └ ─ ─ ─ ─ ─ ─ ─ ┘          └ ─ ─ ─ ─ ─ 
                                                                  
  □──────□  TN sections:                                          
            CS= Customer Site                                     
            AC= AC                                                
            PN= Provider Network                                  
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the provider network orchestration (e.g., NSC).  More precisely, a PE and a CE connected via an AC must be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP AS number). Hence, the realization of this
interconnection is technology-specific and requires a coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, we assume that this coordination is based upon standard YANG data models and APIs (more details in further sections).</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface. This document proposes to rely upon IETF service data models: the IETF Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.boro-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of TN Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
      ┌─────────────┐                ┌──────────────────┐ 
      │Customer Site│  IETF APIs/DM  │     IETF NSC     │ 
      │Orchestration│ ◀───────────▶ │(Provider Network │ 
      │             │                │ Orcherstration)  │ 
      │             │                │                  │ 
      └────────────┬┘                └┬─────────────────┘ 
                   │                  │                   
                   │                  │                   
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│┐                ┌│─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   │                  │┌────┐             
│ ┌──┐       ┌────┐▼│   192.0.2.0/31 │▼│    │            │
  │NF├───────│ CE ├────────────────────┤ PE │             
│ └──┘       └────┘.1    VLAN 100    .0│    │            │
      Customer                         └────┘Provider     
│       Site        │                │       Network     │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                  □──────────AC────────□                  
                                                          
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>5G Slice to IETF Network Slice Mapping</name>
        <ul empty="true">
          <li>
            <t>Editor Note: This section is intended to focus on the realization implications of the mappings. Will reassess in future versions whether this section should be maintained or moved to <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
          </li>
        </ul>
        <t>There are multiple options to map a 5G network slice to IETF Network
   Slices:</t>
        <ul spacing="normal">
          <li>1 to N:
 A single 5G Network Slice can map to multiple IETF Network
 Slices (1 to N).  One example of such a case is the separation of
 the 5G Control Plane and User Plane: this use case is represented
 in <xref target="_figure-5"/> where a slice (eMBB) is deployed with a separation of
 User Plane and Control Plane at the TN.</li>
          <li>N to 1:
 Multiple 5G Network Slices may rely upon the same IETF Network
 Slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</li>
          <li>N to M:
 The 5G to IETF Network Slice mapping combines both
 approaches with a mix of shared and dedicated associations.</li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (IETF Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐

│                        5G Slice eMBB                          │

│            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            │
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐
│ │CU-UP├───────   IETF Network Slice UP_eMBB    ───────┤ UPF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘
│            │                                     │            │
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐
│ │CU-CP├───────      IETF Network Slice CP      ───────┤ AMF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘
└ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ┘

             │                                     │
                       Transport Network
             │                                     │

             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (IETF Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐
                     Edge Cloud
                  │             │
                    ┌─────────┐
                  │ │UPF_URLLC│ │
                    └─────┬───┘
                  └ ─ ─ ─ │ ─ ─ ┘
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ │ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  │ ┌ ─ ─ ─ ─ ─ ─ ─
│   Cell Site   │ │                            │                  │
                    │                            │ │   Regional
│ ┌───────────┐ │ │                            │         Cloud    │
  │CU-UP_URLLC├─────┤                            │ │ ┌──────────┐
│ └───────────┘ │ │         IETF Network       ├─────┤  5GC CP  │ │
                    │        Slice ALL           │ │ └──────────┘
│ ┌───────────┐ │ │                            │                  │
  │CU-UP_eMBB ├─────┤                            │ │ ┌──────────┐
│ └───────────┘ │ │                            ├─────┤ UPF_eMBB │ │
 ─ ─ ─ ─ ─ ─ ─ ─    │                            │ │ └──────────┘
                  │  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  │
                                                 │ └ ─ ─ ─ ─ ─ ─ ─
                  │      Transport Network
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate few network slices and accommodate the need of few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize network slices (including the adjustment of slice services to network slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="first-5g-slice-versus-subsequent-slices">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>A 5G Network Slice is fully functional with both 5G Control Plane and
   User Plane capabilities (i.e., dedicated NF functions or contexts).
   In this regard, the creation of the "first slice" is subject to a
   specific logic since it must deploy both CP and UP.  This is not the
   case for the deployment of subsequent slices because they can share
   the same CP of the first slice, while instantiating dedicated UP.  An
   example of an incremental deployment is depicted in <xref target="_figure-7"/>.</t>
        <t>At the time of writing (2023), Section 6.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      s S  │NF-CP├──────┤  CP IETF NS (IETF-NS-1)  ├──────┤NF-CP│
   │  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
        i             │
   │  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      G e  │NF-UP├──────┤  UP IETF NS (IETF-NS-2)  ├──────┤NF-UP│
   │       └─────┘      └──────────────────────────┘ │    └─────┘  │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                                     │
                      │      Transport Network
                                                     │
                      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                         Deployment of first 5G slice
                                     │ │
                                     │ │
                                     │ │
                                    ─┘ └─
                                    ╲   ╱
                                     ╲ ╱
                                      V
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      s S  │NF-CP├──────┤  CP IETF NS (IETF-NS-1)  ├──────┤NF-CP│
   │  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
        i             │
   │  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      G e  │NF-UP├──────┤  UP IETF NS (IETF-NS-2)  ├──────┤NF-UP│
   │       └─────┘      └──────────────────────────┘ │    └─────┘  │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                                     │
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      2                                              │
   │  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
      d l  │NF-UP2├─────┤   UP2 IETF NS (IETF-NS-3)├─────┤NF-UP2│
   │    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
      5 c                                            │
   │  G e             │                                            │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
                      │
                              Transport Network      │
                      │
                       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
       Deployment of additional 5G slice with shared Control Plane
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="overview-of-the-realization-model">
      <name>Overview of the Realization Model</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> introduces the concept of the
   Network Resource Partition (NRP), which is defined as a collection of
   resources identified in the underlay network.  In the basic
   realization model described in this document, depicted in <xref target="_figure-high-level-qos"/>, a single NRP is used
   with the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>L2VPN/L3VPN service instances for logical separation:  </t>
          <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. eCPRI supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
        </li>
        <li>
          <t>Fine-grained resource control at the PE:  </t>
          <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
          <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
          <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
        </li>
        <li>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</li>
        <li>
          <t>Capacity planning/management for efficient usage of provider network resources:  </t>
          <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure more less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
        </li>
      </ul>
      <figure anchor="_figure-high-level-qos">
        <name>Resource Allocation Slicing Model with a Single NRP</name>
        <artwork align="center"><![CDATA[
        ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐        
  ┌──────────┐               base NRP               ┌──────────┐   
  │    PE    │                                      │    PE    │   
┌ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─  
  ■◀───┐│    │         IETF Network Slice 1         │    ┌┼───▶■ │ 
│ │    │     │        ┌─────┐        ┌─────┐        │    │     │   
  ■◀───┤│    │        │  P  │        │  P  │        │    ├┼───▶■ │ 
├ ┼ ─ ─├────▶□◀──────▶□◀───▶□◀──────▶□────▶□◀──────▶□◀───┤─ ─ ─│─  
  ■◀───┤│    │        │     │        │     │        │    ├┼───▶■ │ 
│ │    │     │        └─────┘        └─────┘        │    │     │   
  ■◀───┘│    │         IETF Network Slice 2         │    └┼───▶■ │ 
└ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─  
  │     │    │                                      │     │    │   
  └──────────┘                                      └──────────┘   
        └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘        
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices            
]]></artwork>
      </figure>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification.  The S-NSSAI is not visible to the transport domain.
   So instead, 5G functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). More details about the mapping between 3GPP and IETF network slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the IETF Network Slice, fulfilling connectivity
   requirements between NFs of some 5G slice, is represented at the SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.  Each VLAN
   represents a distinct logical interface on the attachment circuits,
   hence it provides the possibility to place these logical interfaces
   in distinct L2 or L3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP
   based interfaces (the only exception could be the F2 fronthaul-
   interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to IETF Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple from
   the NF point of view, it adds complexity due to the requirement of
   maintaining mapping tables for each SDP.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           │     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      │             │           
           │                        │     │             │           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
│      ●───────●■    │          │    ■●───────●     ●───────●      │
│ NF   ●───────●■ PE │          │ PE ■●───────●L2/L3●───────●   NF │
│      ●───────●■    │          │    ■●───────●     ●───────●      │
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    │                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Section         Circuit      Section         
                                                                    
 ● – logical interface represented by VLAN on physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="ip-hand-off">
        <name>IP Hand-off</name>
        <t>In this option, the slices in the TN domain are instantiated
   by IP tunnels (for example, IPsec or GTP-U tunnels) established between
   NFs, as depicted in <xref target="_figure-ip-hand-off"/>.  The transport for a single 5G slice might be constructed with
   multiple such tunnels, since a typical 5G slice contains many NFs -
   especially DUs and CUs.  If a shared NF (i.e., an NF that serves
   multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a
   single slice.  As opposed to the VLAN hand-off case, there is no
   logical interface representing a slice on the PE, hence all slices are
   handled within single service instance.  On the other hand, similarly
   to the VLAN hand-off case, a mapping table tracking IP to IETF
   Network Slice mapping is required.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Section         Circuit      Section         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used
   to address NFs.  An IPv6 address is a 128-bit long field, while the
   S-NSSAI is a 32-bit field: Slice/Service Type (SST): 8 bits, Slice
   Differentiator (SD): 24 bits. 32 bits, out of 128 bits of the IPv6
   address, may be used to encode the S-NSSAI, which makes an IP to
   Slice mapping table unnecessary. This mapping is simply a local allocation method
   to allocate IPv6 addresses to NF loopbacks, without redefining IPv6
   semantics. Different IPv6 address allocation schemes following this
   mapping approach may be used, with one example allocation showed in <xref target="_figure-11"/>.</t>
        <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary nodes are not
   required to associate any additional semantic with IPv6 address.</t>
        <t>One
   benefit of embedding the S-NSSAI in the IPv6 address is that it provides
   a very easy way of identifying the packet as belonging to given
   S-NSSAI at any place in the TN domain.  This might be
   used, for example, to selectively enable per S-NSSAI monitoring, or
   any other per S-NSSAI handling, if required.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    ◀───────────────────────────▶ ◀───────▶
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address are
   unique to the NF, but do not carry any slice-specific information, while
   the least significant 32 bits are used to embed the S-NSSAI information.
   The 96-bit part of the address may be further divided based, for
   example, on the geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> shows an example of a slicing deployment, where the S-NSSAI is
   embedded into IPv6 addresses used by NFs.  NF-A has a set of tunnel
   termination points, with unique per-slice IP addresses allocated from
   the 2001:db8::a:0:0/96 prefix, while NF-B uses a set of tunnel
   termination points with per-slice IP addresses allocated from
   2001:db8::b:0:0/96.  This example shows two slices: eMBB (SST=1) and
   MIoT (SST=3).  Therefore, for eMBB the tunnel IP addresses are auto-
   derived (without the need for a mapping table) as {2001:db8::a:100:0,
   2001:db8::b:100:0}, while for MIoT (SST=3) tunnel uses
   {2001:db8::a:300:0, 2001:db8::b:300:0}.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment example with S-NSSAI embedded into IPv6</name>
          <artwork align="center"><![CDATA[
 2001:db8::a:0:0/96 (NF-A)                2001:db8::b:0:0/96 (NF-B) 
                                                                    
 2001:db8::a:100:0/128                        2001:db8::b:100:0/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   MIoT (SST=3)          │     
     │                                                        │     
 2001:db8::a:300:0/128                        2001:db8::b:300:0/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Section         Circuit      Section         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="mpls-label-hand-off">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLSoUDP encapsulation, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon Section 10 of <xref target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <ul spacing="normal">
          <li>Option A (<xref target="sec-10a"/>): VRF-to-VRF connections.</li>
          <li>Option B (<xref target="sec-10b"/>): redistribution of labeled VPN routes with next-hop
change at domain boundaries.</li>
          <li>Option C (<xref target="sec-10c"/>): redistribution of labeled VPN routes without next-hop
change + redistribution of labeled transport routes with next-hop
change at domain boundaries.</li>
        </ul>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off,
   but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLSoUDP/MPLSoIP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
     ◁──────        ◁──────        ◁──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    ◁─────────────▷◁────────────▷◁─────────────▷                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─▼──────┐    ▼  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Section         Circuit      Section          
                                                                    
  ● – logical interface represented by VLAN on physical interface   
  ◙ - service instances (with unique MPLS label)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option 10B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A' and A" for the first depicted slice).  Therefore, for any slice-specific per hop
   behavior at the provider network edge, the PE must be able to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   another deployment, all prefixes (representing different slices)
   might be handled by single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  Or there could be a deployment that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t><strong><em>for further study</em></strong></t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5QI (5G QoS
   indicator), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier (ID) that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network section
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDP
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS will be referred as '5G QoS
   Class' ('5G QoS' in short), or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this IETF Network Slice
   realization.  That is, IETF Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all IETF Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the architecture assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by QoS indicator
   specific to the encapsulation used in the provider network, and it could
   be DSCP or MPLS Traffic Class (TC).  This layer of QoS will be referred as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network, via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per 5QI differentiated treatment from the provider network.
   This can be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per slice, but not
   per 5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization architecture defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire IETF Network
   Slice is mapped to single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding IETF
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all IETF Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │IETF NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────▶     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │IETF NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────▶     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │IETF NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────▶     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │IETF NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │IETF NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
    IETF Network Slice)                  IETF NSs)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN QoS Class
   marking, per hop behavior for all IETF Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From the QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 <xref target="RFC8754"/> provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each IETF Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., DDoS attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</li>
              <li>PIR: Peak Information Rate (i.e., maximum bandwidth)</li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to IETF NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, which meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>Green, for traffic under CIR</li>
                  <li>Yellow, for traffic between CIR and PIR</li>
                  <li>Red, for traffic above PIR</li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              ▼    │    i │      │
──────────────◇────┼──▶ c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──▶ c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──▶ c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</li>
              <li>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, must not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   must be rejected by the IETF NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────▶                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────▶                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────▶                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
  ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
  ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
  ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
I ┃│  └──────────┘ │┃            ├──▶     TN QoS Class 1     │ ┃
E ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
T ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
F ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────▶     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  ├─────────▶     TN QoS Class 5     │ ┃
  ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
I ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
E ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
T ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
F ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────▶     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
      IETF Network Slice)                  IETF NSs)            
]]></artwork>
          </figure>
          <t>Given that in large scale deployments (large number of 5G
   slices), the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common per hop behavior (PHB) is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─▶DSCP=46├──────▶DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─▶DSCP=46├──────▶DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─▶DSCP=10├──────▶DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──▶   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─▶DSCP=46├──────▶DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──▶   Queue 1    │ │
││5QI=65├─▶DSCP=46├──────▶DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─▶DSCP=10├──────▶DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Rel.17) and O-RAN the mapping of 5QI to
DSCP is not expected in per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per hop behavior for all aggregated 5G QoS
   Classes from all IETF Network Slices is executed on provider network transit links.  Provider network
   transit routers do not evaluate original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In 5QI-aware model, compared to 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each IETF Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each IETF
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</li>
              <li>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──▶ S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──▶ l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──▶ i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──▶   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─▶  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─▶  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─▶  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─▶    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─▶  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─▶  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─▶  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─▶    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──▶ S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──▶ l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──▶ i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──▶   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──▶ S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──▶ l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──▶ i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──▶   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──▶ S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──▶ l │  i  │
5Q-QoS-C: CIR-3C ────◇─────────┤─┼──┼──▶ i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──▶   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, must not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   must not exceed the physical capacity of the attachment circuit.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────▶ 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──▶ 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────▶ 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────▶ Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-planes-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator might define various tunnel groups, where each
   tunnel group is created with specific optimization criteria and
   constraints.  This document refers to such tunnel groups as
   'transport planes'.  For example, a transport plane "A" might represent
   tunnels optimized for latency, and transport plane "B" might represent tunnels optimized for high capacity.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes.  These transport planes might be realized via various IP/MPLS
   techniques, for example Flex-Algo or RSVP/SR traffic engineering
   tunnels with or without PCE, and with or without bandwidth
   reservations.</t>
      <t><xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════▶│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════▶│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════▶│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════▶│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there could be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │IETF NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │IETF NS 2 ├──────┐   ├───▶  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │IETF NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───▶  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │IETF NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │IETF NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following IGP metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
     ┃   SDP           ┃                         │
     ┃│  ┌──────────┐ │┃
     ┃   │ 5G QoS A ├──────┐                     │
   I ┃│  └──────────┘ │┃   │
   E ┃   ┌──────────┐  ┃   │                     │
   T ┃│  │ 5G QoS B ├──────┤
   F ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────▶  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
     ┃   ┌──────────┐  ┃   │    │
     ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   I ┃   └──────────┘  ┃   │    │    │         │
   E ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   T ┃   │ 5G QoS E ├──────┘    ├────▶  Plane  │
   F ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   transport controller with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The transport controller has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per IETF NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G Slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G Slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G Slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the IETF NSC.  The IETF
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="I-D.ietf-opsawg-sap"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the IETF NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the IETF NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo or a particular set of TE LSPs), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="I-D.ietf-teas-rfc3272bis"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="I-D.ietf-lsr-flex-algo"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of network slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE or SR-TE LSPs with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the transport controller, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The transport controller needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the transport controller to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   transport controller may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   transport controller can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   a set OAM functions (<xref target="RFC6291"/>) to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per network slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist in (but not limited to):  </t>
          <ul spacing="normal">
            <li>tracing resources that are bound to a given network slice,</li>
            <li>tracing resources that are invoked when forwarding a given flow bound to a given network slice,</li>
            <li>assessing whether flow isolation characteristics are in
conformance with the network slice service requirements, or</li>
            <li>assessing the compliance of the allocated network slice resources against flow/
customer service requirements.</li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  </t>
          <t>
SFC OAM <xref target="I-D.ietf-sfc-oam-packet"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="I-D.ietf-sfc-multi-layer-oam"/>.</t>
        </li>
        <li>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given network slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</li>
        <li>Providers may deploy means to dynamically discover the set of network slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
must be undertaken accordingly. For example, a provider may rely
upon L3NM <xref target="RFC9182"/> or L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver network slice services.
The correlation between an LxVPN instance and a network slice service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>.</li>
        <li>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g. YANG Push <xref target="RFC8641"/>) can be used.</li>
        <li>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>IETF Network Slices considerations are discussed in Section 6 of <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
      <t>Adequate admission control policies should be configured in the edge of the provider network to control access to specific slice resources. Likewise, access to classification and mapping tables must be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices must check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-teas-ietf-network-slices">
          <front>
            <title>A Framework for IETF Network Slices</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma" initials="S." surname="Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="15" month="June" year="2023"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-21"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs).  This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the IETF Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Liuyan Han" initials="L." surname="Han">
              <organization>China Mobile</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-04"/>
        </reference>
        <reference anchor="I-D.boro-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="3" month="May" year="2023"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   prior or during service provisioning (e.g., Network Slice Service).
   The document specifies also a module that updates other service and
   network modules with the required information to bind specific
   services to ACs that are created using the AC service model.

   Also, the document specifies a set of reusable groupings.  Whether a
   service model reuses structures defined in the AC models or simply
   include an AC reference is a design choice of these service models.
   Relying upon the AC service model to manage ACs over which a service
   is delivered has the merit to decorrelate the management of a service
   vs. upgrade the AC components to reflect recent AC technologies or
   features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boro-opsawg-teas-attachment-circuit-06"/>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features in 5G, which provides
   different network service as independent logical networks.  To
   provide 5G network slices service, an end-to-end network slice needs
   to consists of 3 major types of network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of IETF network slice in
   providing 5G end-to-end network slices, including the network slice
   identification mapping, network slice parameter mapping and 5G IETF
   Network Slice NBI.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-00"/>
        </reference>
        <reference anchor="I-D.henry-tsvwg-diffserv-to-qci">
          <front>
            <title>Diffserv to QCI Mapping</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Szigeti" initials="T." surname="Szigeti">
              <organization>Cisco</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="April" year="2020"/>
            <abstract>
              <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-henry-tsvwg-diffserv-to-qci-04"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH).  This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services.  This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services.  The marker defined here is different from previously defined markers in the handling of the in-profile traffic.  Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms.  While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-sap">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="18" month="January" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).

 This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-sap-15"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc3272bis">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <date day="15" month="June" year="2023"/>
            <abstract>
              <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-24"/>
        </reference>
        <reference anchor="I-D.ietf-lsr-flex-algo">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="Peter Psenak" initials="P." surname="Psenak">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Shraddha Hegde" initials="S." surname="Hegde">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Arkadiy Gulko" initials="A." surname="Gulko">
              <organization>Edward Jones</organization>
            </author>
            <date day="17" month="October" year="2022"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links.  Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path.  This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network.  This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-flex-algo-26"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="I-D.ietf-sfc-oam-packet">
          <front>
            <title>OAM Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document clarifies an ambiguity in the Network Service Header
   (NSH) specification related to the handling of O bit.  In particular,
   this document clarifies the meaning of "OAM packet".

   This document updates RFC 8300.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-oam-packet-03"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="I-D.ietf-sfc-multi-layer-oam">
          <front>
            <title>Active OAM for Service Function Chaining (SFC)</title>
            <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Wei Meng" initials="W." surname="Meng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ting Ao" initials="T." surname="Ao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Bhumip Khasnabish" initials="B." surname="Khasnabish">
              <organization>Individual contributor</organization>
            </author>
            <author fullname="Kent Leung" initials="K." surname="Leung">
              <organization>Individual contributor</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="24" month="June" year="2023"/>
            <abstract>
              <t>   A set of requirements for active Operation, Administration, and
   Maintenance (OAM) of Service Function Chains (SFCs) in a network is
   presented in this document.  Based on these requirements, an
   encapsulation of active OAM messages in SFC and a mechanism to detect
   and localize defects are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-multi-layer-oam-26"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG).  The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure.  Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes.  This simple approach does not require any support from other routers.  The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths.  Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies.  This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment.  The construction of Metrics and Methods can be described as either "Active" or "Passive".  Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods".  This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore.  Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed.  Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6.  This document describes the support for IPv6 in 3GPP network architectures.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2255?>

<section anchor="open-issues">
      <name>Open Issues</name>
      <t>The following issues should be resolved prior to the WGLC:</t>
      <ol spacing="normal" type="1"><li>
          <t>Assess which/whether some the material in the "5G Slice to IETF Network Slice Mapping" Section should be maintained in this draft or moved to <xref target="I-D.ietf-teas-5g-network-slice-application"/> (Adrian)
          </t>
          <ul spacing="normal">
            <li>This issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/40.</li>
          </ul>
        </li>
        <li>
          <t>Assess whether we need to mainatin the "First 5G Slice vs Subsequent Slices" Section:
          </t>
          <ul spacing="normal">
            <li>Unless we explain how this ss important for realization, this section should be deleted (Med)</li>
            <li>The motivation of this section is not clear (from Reza)</li>
            <li>Need to describe the implications to the realization of IETF network slices (Jie)</li>
            <li>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/19</li>
          </ul>
        </li>
        <li>
          <t>Clarify the use of inter-AS option B/C to model the AC between CE and PE (Jie)
          </t>
          <ul spacing="normal">
            <li>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/52</li>
          </ul>
        </li>
        <li>
          <t>Further discuss whether the TN slice in the customer site is covered or is out of the scope of IETF network slice (Jie)
          </t>
          <ul spacing="normal">
            <li>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/53</li>
          </ul>
        </li>
      </ol>
      <t>Active issues can be tracked at: https://github.com/boucadair/5g-slice-realization/issues</t>
    </section>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>IP: Internet Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-intro">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</li>
              <li>the SMF controls the 5GC UPF via the N4 interface</li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────▶(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</li>
          <li>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</li>
          <li>The Antenna converts the electric signal received from the RU to
radio waves</li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</li>
          <li>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</li>
          <li>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, and Jie Dong for their reviews of this document and for providing valuable
   comments.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>jdrake@juniper.net</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amit.dhamija@rakuten.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
