<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-03"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="February" day="28"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 169?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN).  The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control Service Level Agreements (SLAs) offered for 5G slices.</t>
      <t>This work is compatible with the framework defined in <xref target="I-D.ietf-teas-ietf-network-slices"/> which describes network slicing in the context of networks built from IETF technologies.</t>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Network Slice Service mapping considerations (e.g., mapping between 3GPP to IETF service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a NF instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the RFC XXXX Network Slices apply.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─       
 ┌─────      5G RAN or CORE Network      ├────┐ 
 │    └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─     │ 
 │                                            │ 
 │                                            │ 
 ▼                                            ▼ 
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─   ┌──┐
│NF├──         Transport Network         ├──┤NF│
└──┘  └ ─ ┬ ─ ─ ─ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─ ┬   └──┘
          │                 │           │       
          │                 │           │       
          ▼                 ▼           ▼       
  ┌ ─ Data Center ─   ┌ MPLS VPN─   ┌ Public─   
                   │    Backbone │    Cloud  │  
  │   ┌───┐┌───┐     ┌┴─┐      ┌──┐┌┴─┐         
      └───┘└───┘   │ └──┘      └─┬┘└──┘      │  
  │┌──┐┌──┐┌──┐┌──┐  ┌┴─┐      ┌──┐ │           
   └──┘└──┘└──┘└──┘│ └──┘      └─┬┘          │  
  └ ─ ─ ─ ─ ─ ─ ─ ─   └ ─ ─ ─ ─ ─   └ ─ ─ ─ ─   
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. End-to-End 5G Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created (called, 5G Network Slices), with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different options to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: customer site and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site 1           │                     │       │      Site 2     
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt>customer site:</dt>
          <dd>
            <t>A customer manages and deploys 5G NFs (RAN and CN) in customer sites. On top of 5G NFs (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, or switches) within a customer site. A customer site can be either a physical or a virtual location. Examples of customer sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within the provider network or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of the scope of this document to document how these controllers are implemented.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting customer sites.</t>
          </dd>
          <dt/>
          <dd>
            <t>The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a CE/AC/PE definition that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. For example, the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs), a CE may also connect to the provider network using MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). An example of such an AC is depicted in <xref target="_figure-51"/>. This is a source of confusion since these configurations are typically enforced on PEs. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                                       
│                                     │               │
               │  ◀─────MP-BGP─────▶                   
│           ┌────┐                  ┌─┴──┐            │
            │    │   MPLS-based AC  │    │             
│           │ CE ├──────────────────│ PE │            │
         ┏━━┻━━━━┻━━┓               │    │             
│        ┃ VRF foo  ┃               └─┬──┘            │
 ─ ─ ─ ─ ┻━━━━━━━━━━┛                  ─ ─ ─ ─ ─ ─ ─ ─ 
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>End-to-End 5G Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of an end-to-end 5G slice with a zoom on TN parts. This framework helps to delimit the realization scope of RFC XXXX Network Slices and identify interactions that are required for the realization of such slices.</t>
          <ul empty="true">
            <li>
              <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
            </li>
          </ul>
          <t>In reference to <xref target="_figure-orch"/>, an end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating end-to-end 5G slices. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G slice spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>, the provider relies on an RFC XXXX Network Slice Controller (NSC) to manage and orchestrate RFC XXXX Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this segment does not involve the Transport Network Orchestration.</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <figure anchor="_figure-orch">
            <name>End-to-end 5G Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         │  5G NSO   │                          
                         └───────────┘                          
                            │   │                               
                            │   │                               
                            ▼   │                               
              ┌───────────────┐ │                               
              │ 3GPP domains  │ │                               
  ┌───────────│ Orchestration │────────────────────────────┐    
  │           │ (RAN and CN)  │ │                          │    
  │           └───────────────┘ │                          │    
  │                             │                          │    
  │    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━│━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   │    
  │     TN Orchestration        │                          │    
  │    ┃        ┌───────────────┼──────────────┐       ┃   │    
  │             ▼               ▼              ▼           │    
  │    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   │    
  │     │ Customer Site ││RFCXXXX NSC││ Customer Site │    │    
  │    ┃│ Orchestration ││           ││ Orchestration │┃   │    
  │     └──┬────────────┘└─────┬─────┘└──────────────┬┘    │    
  │    ┗ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        ▼                   ▼                     ▼     │    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─│─ ─ 
  │                          Provider                      │   │
│ ▼           │       ┌─┴──┐  Network  ┌──┴─┐      ┌┴───┐  │    
 ┌──┐     ┌────┐  AC  │    │           │    │  AC  │ NF │◀─┘   │
││NF◍ ─ ─ ┤ CE ├ ─ ─ ─■ PE │           │ PE ■ ─ ─ ─◍(CE)│       
 └──┘     └────┘      │    │           │    │      └────┘      │
│             │       └─┬──┘           └──┬─┘       │           
   Customer                                           Customer │
│    Site     │         │                 │         │   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC XXXX                          
                      ■─────Network Slice───■                   
                                                                
    ◍───────────────────TN Slice───────────────────◍                  
                                                                
]]></artwork>
          </figure>
          <ul empty="true">
            <li>
              <t>The various orchestration depicted in the figure encompass the 3GPP's Network Slice Subnet Management Function (NSSMF).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main types of segments that are shown in <xref target="fig-end-to-end"/>.</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects two NFs located in the same customer site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration. The realization of this segment does not involve the Transport Network Orchestration.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC XXXX NSC.</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC XXXX NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
          </dl>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an RFC XXXX Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new Network Slice may rely on a partial or full pre-provisioned segment (e.g., a new Network Slice may rely on an existing AC). The customer site segment is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the customer site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the Network Slice between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
      ├───────────────────────TN Slice─────────────┤            
                                                                
                        ○─────RFC XXXX ─────○                   
                        │   Network Slice   │                   
                        │                   │                   
                        │                   │                   
                        ▼                   ▼                   
      ○──CS───□ □───AC──○ □──────PN───────□ ○──AC──○            
  ┌ ─ ─ ─ ─ ─ ─           ┌ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ 
     Customer  │               Provider               Customer │
  │   Site 1              │    Network    │         │  Site 2   
               │        ┌────┐          ┌────┐                 │
  │┌───┐    ┌────┐  AC  │    │          │    │ AC ┌─┴─┐         
CS │NF1├────┤ CE ├──────┤ PE │          │ PE ├────┤NF3│        │
□ │└─┬─┘    └────┘      │    │          │    │    └─┬─┘         
│    │         │        └────┘          └────┘                 │
│ │  │                    │               │         │           
□  ┌─┴─┐       │                                               │
  ││NF2│                  │               │         │           
   └───┘       │                                               │
  └ ─ ─ ─ ─ ─ ─           └ ─ ─ ─ ─ ─ ─ ─ ┘         └ ─ ─ ─ ─ ─ 
                                                                
              □──────□  TN segments:                            
                          CS = Customer Segment                 
                          AC = Attachment Circuit               
                          PN = Provider Network
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC XXXX NSC).  More precisely, a PE and a CE connected via an AC need to be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the RFC XXXX Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ┐                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                          RFCXXXX NSC    │
  │ Customer Site │                   │                   
    Orchestration      IETF APIs/DM    (Provider Network │
  │               │◀─────────────────▶│  Orchestration)   
   ─ ─ ─ ─ ─ ─ ─ ─                     ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
                │                        │                
                │                        │                
┌ ─ ─ ─ ─ ─ ─ ─ ┼ ┐                    ┌ ┼ ─ ─ ─ ─ ─ ─ ─ ┐
                ▼                        ▼                
│ ┌──┐      ┌──┐.1│    192.0.2.0/31    │.0┌──┐           │
  │NF├──────┤CE├──────────────────────────┤PE│            
│ └──┘      └──┘  │      VLAN 100      │  └──┘           │
     Customer                                Provider     
│      Site       │                    │     Network     │
 ─ ─ ─ ─ ─ ─ ─ ─ ─                      ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                          
               └─────────── AC ──────────┘                                     
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping Schemes Between 5G Network Slices and Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G Control Plane and User Plane in TN slices for a single 5G eMBB network slice. It is important to note that this mapping can serve as an interim step to N:M mapping. In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G network slices (e.g., the Control Plane TN slice is shared by multiple 5G network Slices). Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.</t>
          </li>
        </ul>
        <t>In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC XXXX Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                                                                 
│                        5G Slice eMBB                          │
                                                                 
│            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            │
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐  
│ │CU-UP├─────── RFC XXXX Network Slice UP_eMBB  ───────┤ UPF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
│            │                                     │            │
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐  
│ │CU-CP├───────    RFC XXXX Network Slice CP    ───────┤ AMF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
└ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ┘
                                                                 
             │                                     │             
                       Transport Network                         
             │                                     │             
                                                                 
             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘             
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC XXXX Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐                                  
                     Edge Cloud                                    
                  │             │                                  
                    ┌─────────┐                                    
                  │ │UPF_URLLC│ │                                  
                    └─────┬───┘                                    
                  └ ─ ─ ─ │ ─ ─ ┘                                  
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ │ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  │ ┌ ─ ─ ─ ─ ─ ─ ─ 
│   Cell Site   │ │                            │                  │
                    │                            │ │   Regional    
│ ┌───────────┐ │ │                            │         Cloud    │
  │CU-UP_URLLC├─────┤                            │ │ ┌──────────┐  
│ └───────────┘ │ │       RFC XXXX Network     ├─────┤  5GC CP  │ │
                    │        Slice ALL           │ │ └──────────┘  
│ ┌───────────┐ │ │                            │                  │
  │CU-UP_eMBB ├─────┤                            │ │ ┌──────────┐  
│ └───────────┘ │ │                            ├─────┤ UPF_eMBB │ │
 ─ ─ ─ ─ ─ ─ ─ ─    │                            │ │ └──────────┘  
                  │  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  │
                                                 │ └ ─ ─ ─ ─ ─ ─ ─ 
                  │      Transport Network                         
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                 
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize Network Slices (including the adjustment of slice services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G Control Plane and User Plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and CU-CP need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Referring to the example in <xref target="_figure-7"/>, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for Control and User Planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a User Plane Function (NF-UP2) together with a dedicated User Plane TN slice (INS-UP2). The Control Plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2023), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="528" viewBox="0 0 528 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 268,328 L 276,344" fill="none" stroke="black"/>
                <path d="M 276,344 L 284,360" fill="none" stroke="black"/>
                <path d="M 292,360 L 300,344" fill="none" stroke="black"/>
                <path d="M 300,344 L 308,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="8" y="36">┌</text>
                  <text x="24" y="36">─</text>
                  <text x="40" y="36">─</text>
                  <text x="56" y="36">─</text>
                  <text x="72" y="36">─</text>
                  <text x="88" y="36">─</text>
                  <text x="104" y="36">─</text>
                  <text x="120" y="36">─</text>
                  <text x="136" y="36">─</text>
                  <text x="152" y="36">─</text>
                  <text x="168" y="36">─</text>
                  <text x="184" y="36">─</text>
                  <text x="200" y="36">─</text>
                  <text x="216" y="36">─</text>
                  <text x="232" y="36">─</text>
                  <text x="248" y="36">─</text>
                  <text x="264" y="36">─</text>
                  <text x="280" y="36">─</text>
                  <text x="296" y="36">─</text>
                  <text x="312" y="36">─</text>
                  <text x="328" y="36">─</text>
                  <text x="344" y="36">─</text>
                  <text x="360" y="36">─</text>
                  <text x="376" y="36">─</text>
                  <text x="392" y="36">─</text>
                  <text x="408" y="36">─</text>
                  <text x="424" y="36">─</text>
                  <text x="440" y="36">─</text>
                  <text x="456" y="36">─</text>
                  <text x="472" y="36">─</text>
                  <text x="488" y="36">─</text>
                  <text x="504" y="36">─</text>
                  <text x="520" y="36">┐</text>
                  <text x="160" y="52">┌</text>
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="400" y="52">─</text>
                  <text x="8" y="68">│</text>
                  <text x="32" y="68">1</text>
                  <text x="96" y="68">┌─────┐</text>
                  <text x="284" y="68">┌──────────────────────────┐</text>
                  <text x="408" y="68">│</text>
                  <text x="472" y="68">┌─────┐</text>
                  <text x="520" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="124" y="84">│NF-CP├──────┤</text>
                  <text x="212" y="84">CP</text>
                  <text x="236" y="84">TN</text>
                  <text x="272" y="84">Slice</text>
                  <text x="332" y="84">(TNS-CP)</text>
                  <text x="444" y="84">├──────┤NF-CP│</text>
                  <text x="8" y="100">│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="96" y="100">└─────┘</text>
                  <text x="284" y="100">└──────────────────────────┘</text>
                  <text x="408" y="100">│</text>
                  <text x="472" y="100">└─────┘</text>
                  <text x="520" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="160" y="116">│</text>
                  <text x="8" y="132">│</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="96" y="132">┌─────┐</text>
                  <text x="284" y="132">┌──────────────────────────┐</text>
                  <text x="408" y="132">│</text>
                  <text x="472" y="132">┌─────┐</text>
                  <text x="520" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="124" y="148">│NF-UP├──────┤</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(TNS-UP1)</text>
                  <text x="444" y="148">├──────┤NF-UP│</text>
                  <text x="8" y="164">│</text>
                  <text x="96" y="164">└─────┘</text>
                  <text x="284" y="164">└──────────────────────────┘</text>
                  <text x="408" y="164">│</text>
                  <text x="472" y="164">└─────┘</text>
                  <text x="520" y="164">│</text>
                  <text x="16" y="180">─</text>
                  <text x="32" y="180">─</text>
                  <text x="48" y="180">─</text>
                  <text x="64" y="180">─</text>
                  <text x="80" y="180">─</text>
                  <text x="96" y="180">─</text>
                  <text x="112" y="180">─</text>
                  <text x="128" y="180">─</text>
                  <text x="144" y="180">─</text>
                  <text x="160" y="180">┼</text>
                  <text x="176" y="180">─</text>
                  <text x="192" y="180">─</text>
                  <text x="208" y="180">─</text>
                  <text x="224" y="180">─</text>
                  <text x="240" y="180">─</text>
                  <text x="256" y="180">─</text>
                  <text x="272" y="180">─</text>
                  <text x="288" y="180">─</text>
                  <text x="304" y="180">─</text>
                  <text x="320" y="180">─</text>
                  <text x="336" y="180">─</text>
                  <text x="352" y="180">─</text>
                  <text x="368" y="180">─</text>
                  <text x="384" y="180">─</text>
                  <text x="400" y="180">─</text>
                  <text x="416" y="180">─</text>
                  <text x="432" y="180">─</text>
                  <text x="448" y="180">─</text>
                  <text x="464" y="180">─</text>
                  <text x="480" y="180">─</text>
                  <text x="496" y="180">─</text>
                  <text x="512" y="180">─</text>
                  <text x="408" y="196">│</text>
                  <text x="160" y="212">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="408" y="228">│</text>
                  <text x="160" y="244">└</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="280" y="308">│</text>
                  <text x="296" y="308">│</text>
                  <text x="276" y="324">─┘</text>
                  <text x="300" y="324">└─</text>
                  <text x="288" y="372">V</text>
                  <text x="8" y="388">┌</text>
                  <text x="24" y="388">─</text>
                  <text x="40" y="388">─</text>
                  <text x="56" y="388">─</text>
                  <text x="72" y="388">─</text>
                  <text x="88" y="388">─</text>
                  <text x="104" y="388">─</text>
                  <text x="120" y="388">─</text>
                  <text x="136" y="388">─</text>
                  <text x="152" y="388">─</text>
                  <text x="168" y="388">─</text>
                  <text x="184" y="388">─</text>
                  <text x="200" y="388">─</text>
                  <text x="216" y="388">─</text>
                  <text x="232" y="388">─</text>
                  <text x="248" y="388">─</text>
                  <text x="264" y="388">─</text>
                  <text x="280" y="388">─</text>
                  <text x="296" y="388">─</text>
                  <text x="312" y="388">─</text>
                  <text x="328" y="388">─</text>
                  <text x="344" y="388">─</text>
                  <text x="360" y="388">─</text>
                  <text x="376" y="388">─</text>
                  <text x="392" y="388">─</text>
                  <text x="408" y="388">─</text>
                  <text x="424" y="388">─</text>
                  <text x="440" y="388">─</text>
                  <text x="456" y="388">─</text>
                  <text x="472" y="388">─</text>
                  <text x="488" y="388">─</text>
                  <text x="504" y="388">─</text>
                  <text x="520" y="388">┐</text>
                  <text x="160" y="404">┌</text>
                  <text x="176" y="404">─</text>
                  <text x="192" y="404">─</text>
                  <text x="208" y="404">─</text>
                  <text x="224" y="404">─</text>
                  <text x="240" y="404">─</text>
                  <text x="256" y="404">─</text>
                  <text x="272" y="404">─</text>
                  <text x="288" y="404">─</text>
                  <text x="304" y="404">─</text>
                  <text x="320" y="404">─</text>
                  <text x="336" y="404">─</text>
                  <text x="352" y="404">─</text>
                  <text x="368" y="404">─</text>
                  <text x="384" y="404">─</text>
                  <text x="400" y="404">─</text>
                  <text x="8" y="420">│</text>
                  <text x="32" y="420">1</text>
                  <text x="96" y="420">┌─────┐</text>
                  <text x="284" y="420">┌──────────────────────────┐</text>
                  <text x="408" y="420">│</text>
                  <text x="472" y="420">┌─────┐</text>
                  <text x="520" y="420">│</text>
                  <text x="32" y="436">s</text>
                  <text x="48" y="436">S</text>
                  <text x="124" y="436">│NF-CP├──────┤</text>
                  <text x="212" y="436">CP</text>
                  <text x="236" y="436">TN</text>
                  <text x="272" y="436">Slice</text>
                  <text x="332" y="436">(TNS-CP)</text>
                  <text x="444" y="436">├──────┤NF-CP│</text>
                  <text x="8" y="452">│</text>
                  <text x="32" y="452">t</text>
                  <text x="48" y="452">l</text>
                  <text x="96" y="452">└─────┘</text>
                  <text x="284" y="452">└──────────────────────────┘</text>
                  <text x="408" y="452">│</text>
                  <text x="472" y="452">└─────┘</text>
                  <text x="520" y="452">│</text>
                  <text x="48" y="468">i</text>
                  <text x="160" y="468">│</text>
                  <text x="8" y="484">│</text>
                  <text x="32" y="484">5</text>
                  <text x="48" y="484">c</text>
                  <text x="96" y="484">┌─────┐</text>
                  <text x="284" y="484">┌──────────────────────────┐</text>
                  <text x="408" y="484">│</text>
                  <text x="472" y="484">┌─────┐</text>
                  <text x="520" y="484">│</text>
                  <text x="32" y="500">G</text>
                  <text x="48" y="500">e</text>
                  <text x="124" y="500">│NF-UP├──────┤</text>
                  <text x="204" y="500">UP</text>
                  <text x="228" y="500">TN</text>
                  <text x="264" y="500">Slice</text>
                  <text x="328" y="500">(TNS-UP1)</text>
                  <text x="444" y="500">├──────┤NF-UP│</text>
                  <text x="8" y="516">│</text>
                  <text x="96" y="516">└─────┘</text>
                  <text x="284" y="516">└──────────────────────────┘</text>
                  <text x="408" y="516">│</text>
                  <text x="472" y="516">└─────┘</text>
                  <text x="520" y="516">│</text>
                  <text x="16" y="532">─</text>
                  <text x="32" y="532">─</text>
                  <text x="48" y="532">─</text>
                  <text x="64" y="532">─</text>
                  <text x="80" y="532">─</text>
                  <text x="96" y="532">─</text>
                  <text x="112" y="532">─</text>
                  <text x="128" y="532">─</text>
                  <text x="144" y="532">─</text>
                  <text x="160" y="532">┼</text>
                  <text x="176" y="532">─</text>
                  <text x="192" y="532">─</text>
                  <text x="208" y="532">─</text>
                  <text x="224" y="532">─</text>
                  <text x="240" y="532">─</text>
                  <text x="256" y="532">─</text>
                  <text x="272" y="532">─</text>
                  <text x="288" y="532">─</text>
                  <text x="304" y="532">─</text>
                  <text x="320" y="532">─</text>
                  <text x="336" y="532">─</text>
                  <text x="352" y="532">─</text>
                  <text x="368" y="532">─</text>
                  <text x="384" y="532">─</text>
                  <text x="400" y="532">─</text>
                  <text x="416" y="532">─</text>
                  <text x="432" y="532">─</text>
                  <text x="448" y="532">─</text>
                  <text x="464" y="532">─</text>
                  <text x="480" y="532">─</text>
                  <text x="496" y="532">─</text>
                  <text x="512" y="532">─</text>
                  <text x="408" y="548">│</text>
                  <text x="8" y="564">┌</text>
                  <text x="24" y="564">─</text>
                  <text x="40" y="564">─</text>
                  <text x="56" y="564">─</text>
                  <text x="72" y="564">─</text>
                  <text x="88" y="564">─</text>
                  <text x="104" y="564">─</text>
                  <text x="120" y="564">─</text>
                  <text x="136" y="564">─</text>
                  <text x="160" y="564">─│─</text>
                  <text x="184" y="564">─</text>
                  <text x="200" y="564">─</text>
                  <text x="216" y="564">─</text>
                  <text x="232" y="564">─</text>
                  <text x="248" y="564">─</text>
                  <text x="264" y="564">─</text>
                  <text x="280" y="564">─</text>
                  <text x="296" y="564">─</text>
                  <text x="312" y="564">─</text>
                  <text x="328" y="564">─</text>
                  <text x="344" y="564">─</text>
                  <text x="360" y="564">─</text>
                  <text x="376" y="564">─</text>
                  <text x="392" y="564">─</text>
                  <text x="408" y="564">─</text>
                  <text x="424" y="564">─</text>
                  <text x="440" y="564">─</text>
                  <text x="456" y="564">─</text>
                  <text x="472" y="564">─</text>
                  <text x="488" y="564">─</text>
                  <text x="504" y="564">─</text>
                  <text x="520" y="564">┐</text>
                  <text x="32" y="580">2</text>
                  <text x="408" y="580">│</text>
                  <text x="8" y="596">│</text>
                  <text x="32" y="596">n</text>
                  <text x="48" y="596">S</text>
                  <text x="100" y="596">┌──────┐</text>
                  <text x="160" y="596">│</text>
                  <text x="284" y="596">┌──────────────────────────┐</text>
                  <text x="468" y="596">┌──────┐</text>
                  <text x="520" y="596">│</text>
                  <text x="32" y="612">d</text>
                  <text x="48" y="612">l</text>
                  <text x="124" y="612">│NF-UP2├─────┤</text>
                  <text x="204" y="612">UP</text>
                  <text x="228" y="612">TN</text>
                  <text x="264" y="612">Slice</text>
                  <text x="328" y="612">(TNS-UP2)</text>
                  <text x="444" y="612">├─────┤NF-UP2│</text>
                  <text x="8" y="628">│</text>
                  <text x="48" y="628">i</text>
                  <text x="100" y="628">└──────┘</text>
                  <text x="160" y="628">│</text>
                  <text x="284" y="628">└──────────────────────────┘</text>
                  <text x="468" y="628">└──────┘</text>
                  <text x="520" y="628">│</text>
                  <text x="32" y="644">5</text>
                  <text x="48" y="644">c</text>
                  <text x="408" y="644">│</text>
                  <text x="8" y="660">│</text>
                  <text x="32" y="660">G</text>
                  <text x="48" y="660">e</text>
                  <text x="160" y="660">│</text>
                  <text x="520" y="660">│</text>
                  <text x="16" y="676">─</text>
                  <text x="32" y="676">─</text>
                  <text x="48" y="676">─</text>
                  <text x="64" y="676">─</text>
                  <text x="80" y="676">─</text>
                  <text x="96" y="676">─</text>
                  <text x="112" y="676">─</text>
                  <text x="128" y="676">─</text>
                  <text x="144" y="676">─</text>
                  <text x="160" y="676">─</text>
                  <text x="176" y="676">─</text>
                  <text x="192" y="676">─</text>
                  <text x="208" y="676">─</text>
                  <text x="224" y="676">─</text>
                  <text x="240" y="676">─</text>
                  <text x="256" y="676">─</text>
                  <text x="272" y="676">─</text>
                  <text x="288" y="676">─</text>
                  <text x="304" y="676">─</text>
                  <text x="320" y="676">─</text>
                  <text x="336" y="676">─</text>
                  <text x="352" y="676">─</text>
                  <text x="368" y="676">─</text>
                  <text x="384" y="676">─</text>
                  <text x="408" y="676">─│─</text>
                  <text x="432" y="676">─</text>
                  <text x="448" y="676">─</text>
                  <text x="464" y="676">─</text>
                  <text x="480" y="676">─</text>
                  <text x="496" y="676">─</text>
                  <text x="512" y="676">─</text>
                  <text x="160" y="692">│</text>
                  <text x="256" y="708">Transport</text>
                  <text x="328" y="708">Network</text>
                  <text x="408" y="708">│</text>
                  <text x="160" y="724">│</text>
                  <text x="168" y="740">─</text>
                  <text x="184" y="740">─</text>
                  <text x="200" y="740">─</text>
                  <text x="216" y="740">─</text>
                  <text x="232" y="740">─</text>
                  <text x="248" y="740">─</text>
                  <text x="264" y="740">─</text>
                  <text x="280" y="740">─</text>
                  <text x="296" y="740">─</text>
                  <text x="312" y="740">─</text>
                  <text x="328" y="740">─</text>
                  <text x="344" y="740">─</text>
                  <text x="360" y="740">─</text>
                  <text x="376" y="740">─</text>
                  <text x="392" y="740">─</text>
                  <text x="408" y="740">┘</text>
                  <text x="76" y="756">Deployment</text>
                  <text x="132" y="756">of</text>
                  <text x="188" y="756">additional</text>
                  <text x="244" y="756">5G</text>
                  <text x="280" y="756">slice</text>
                  <text x="324" y="756">with</text>
                  <text x="372" y="756">shared</text>
                  <text x="432" y="756">Control</text>
                  <text x="488" y="756">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
                   │      Transport Network                      
                                                  │              
                   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
                      Deployment of first 5G slice               
                                  │ │                            
                                  │ │                            
                                  │ │                            
                                 ─┘ └─                           
                                 ╲   ╱                           
                                  ╲ ╱                            
                                   V                             
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
   2                                              │              
│  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
   d l  │NF-UP2├─────┤  UP TN Slice (TNS-UP2)   ├─────┤NF-UP2│   
│    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
   5 c                                            │              
│  G e             │                                            │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ 
                   │                                             
                           Transport Network      │              
                   │                                             
                    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘              
    Deployment of additional 5G slice with shared Control Plane  
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      ┌──────────┐               base NRP               ┌──────────┐
      │    PE    │                                      │    PE    │
    ┌ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─
      ■<───┐│    │       RFC XXXX Network Slice 1       │    ┌┼───>■ │
    │ │    │     │        ┌─────┐        ┌─────┐        │    │     │
      ■<───┤│    │        │  P  │        │  P  │        │    ├┼───>■ │
    ├ ┼ ─ ─├────>□<──────>□<───>□<──────>□────>□<──────>□<───┤─ ─ ─│─
      ■<───┤│    │        │     │        │     │        │    ├┼───>■ │
    │ │    │     │        └─────┘        └─────┘        │    │     │
      ■<───┘│    │       RFC XXXX Network Slice 2       │    └┼───>■ │
    └ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─
      │     │    │                                      │     │    │
      └──────────┘                                      └──────────┘
            └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ 
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices         
]]></artwork>
        </figure>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). The realization of the mapping
   between customer sites and provider networks is commonly refered to as the "hand-off".</t>
      <t>More details about the mapping between 3GPP and RFC XXXX Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not reproduced here because of the intrinsic shortcomings of these methods.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC XXXX Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at the Service Demarcation Point (SDP)
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP-based
   interfaces (the only exception could be the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to RFC XXXX Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple for
   NFs, it adds complexity due to the requirement of maintaining
   mapping tables for each SDP and requires a configuration task of new VLANs and
   IP subnet for every slice on every AC.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           │     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      │             │           
           │                        │     │             │           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
│      ●───────●■    │          │    ■●───────●     ●───────●      │
│ NF   ●───────●■ PE │          │ PE ■●───────●L2/L3●───────●   NF │
│      ●───────●■    │          │    ■●───────●     ●───────●      │
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    │                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAI to IP addresses makes IP addresses an identifier for eventual
   policy decisions in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (for example, IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case, there is no logical interface representing
   a slice on the PE, hence all slices are handled within single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAI, a mapping table similar to
   the VLAN Hand-off solution should be utilized <xref target="sec-vlan-handoff"/>.</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary. Alternatively,
   instead of using 2 full octets from the 8 octets in an IPv6 address, a provider
   could build a mapping table that uses only one octet or parts of an octet to
   represent utilized S-NSSAI. This mapping is a local allocation method to
   allocate IPv6 addresses to NFs in order to be representative of the S-NSSAI without
   redefining IPv6 semantic. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>.</t>
        <t>Different IPv6 address allocation
   schemes following this approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
        <ul empty="true">
          <li>
            <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary
   TN nodes are not required to associate any additional semantic with IPv6 address.</t>
          </li>
        </ul>
        <t>One benefit of embedding the S-NSSAI in the IPv6 address is that a specific S-NSSAI
   can be identified as needed at any place in the TN domain. This might be used,
   for example, to selectively enable per S-NSSAI monitoring, traffic engineering, or any
   other per S-NSSAI handling, if required.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI Embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. NF-A has a set of tunnel termination points, with unique per-slice IP addresses
   allocated from the 2001:db8:a:0::/96 prefix, while NF-B uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: customer A eMBB (SST=01, SD=00001) and customer B MIoT (SST=03, SD=00003).
   Therefore, for customer A eMBB the tunnel IP addresses are auto-derived (without the need
   for an explicit mapping table) as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets, and for customer B MIoT (SST=3,
   SD=00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
          <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘ MIoT (SST=3)            │     
     │                                                        │     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
        </dl>
        <t>Option B (<xref target="sec-10b"/>):
     : redistribution of labeled VPN routes with next-hop
      change at domain boundaries.</t>
        <dl>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off: Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the attachment circuit there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the attachment circuit with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC XXXX Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC XXXX Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to a NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC XXXX Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC XXXX
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC XXXX Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC XXXX Network Slice)       RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN CoS
   marking, per-hop behavior for all RFC XXXX Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ││              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC XXXX Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to RFC XXXX NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   should be rejected by the RFC XXXX NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
X ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
X ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
X ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
X ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
X ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
X ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
X ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
X ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC XXXX Network Slice)        RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC XXXX Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC XXXX Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each RFC XXXX
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the attachment circuit.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator can define multiple transport planes. A transport plane may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A flex-algo <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
        <li>
          <t>An NRP <xref target="I-D.ietf-teas-ns-ip-mpls"/></t>
        </li>
        <li>
          <t>Any combination thereof.</t>
        </li>
      </ul>
      <t>Detailed realization of transport planes is out of the scope of this document.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes, each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes example based on TE tunnels</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there might be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   X ┃│  └──────────┘ │┃   │
   X ┃   ┌──────────┐  ┃   │                     │
   X ┃│  │ 5G QoS B ├──────┤
   X ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   X ┃   └──────────┘  ┃   │    │    │         │
   X ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   X ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   X ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   RFCXXXX NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The RFCXXXX NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC XXXX NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC XXXX NSC.  The RFC XXXX
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC XXXX NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC XXXX NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo, a particular set of TE LSPs, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="RFC9350"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE LSPs <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the RFCXXXX NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The RFCXXXX NSC needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the RFCXXXX NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   RFCXXXX NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   RFCXXXX NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  </t>
          <t>
SFC OAM <xref target="RFC9451"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="RFC9516"/>.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slices"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to a transport plane that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slices"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to a transport plane that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices’ specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-teas-ietf-network-slices">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma" initials="S." surname="Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="14" month="September" year="2023"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" to describe this type of network slice, and establishes the
   general principles of network slicing in the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-25"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-06"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-05"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC AAAA Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="17" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC AAAA Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC AAAA
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-09"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="I-D.henry-tsvwg-diffserv-to-qci">
          <front>
            <title>Diffserv to QCI Mapping</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Szigeti" initials="T." surname="Szigeti">
              <organization>Cisco</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="April" year="2020"/>
            <abstract>
              <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-henry-tsvwg-diffserv-to-qci-04"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-ip-mpls">
          <front>
            <title>Realizing Network Slices in IP/MPLS Networks</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ran Chen" initials="R." surname="Chen">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Luay Jalil" initials="L." surname="Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="26" month="November" year="2023"/>
            <abstract>
              <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-03"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9451">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document clarifies an ambiguity in the Network Service Header (NSH) specification related to the handling of O bit. In particular, this document clarifies the meaning of "OAM packet".</t>
              <t>This document updates RFC 8300.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9451"/>
          <seriesInfo name="DOI" value="10.17487/RFC9451"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC9516">
          <front>
            <title>Active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC)</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="W. Meng" initials="W." surname="Meng"/>
            <author fullname="T. Ao" initials="T." surname="Ao"/>
            <author fullname="B. Khasnabish" initials="B." surname="Khasnabish"/>
            <author fullname="K. Leung" initials="K." surname="Leung"/>
            <author fullname="G. Mishra" initials="G." surname="Mishra"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>A set of requirements for active Operations, Administration, and Maintenance (OAM) for Service Function Chaining (SFC) in a network is presented in this document. Based on these requirements, an encapsulation of active OAM messages in SFC and a mechanism to detect and localize defects are described.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9516"/>
          <seriesInfo name="DOI" value="10.17487/RFC9516"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-01"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2377?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Jie Dong, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,       Daniele Ceccarelli, and Bo Wu for
   their review of this document and for providing valuable comments.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>jdrake@juniper.net</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amit.dhamija@rakuten.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
