<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-08" category="info" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-08"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="June" day="01"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 181?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 188?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, this document explains how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). This document assumes that the customer site infrastructure is over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Transport Network Slice &amp;  RFC 9543 Network Slice Scopes</name>
        <artwork align="center"><![CDATA[
      |------------------TN Slice------------------|

                        RFC 9543 Network Slice
                        +-----SDP Type 3----+
                        |  +- SDP Type 4-+  |
                        |  |             |  |
                        v  v             v  v
  +------------+          +---------------+         +------------+
  |  Customer  |          |    Provider   |         |  Customer  |
  |   Site 1   |          |    Network    |         |   Site 2   |
  |            |        +-+--+          +-+--+      |            |
  |+---+    +--+-+  AC  |    |          |    | AC +-+-+          |
  ||NF +....+ CE +------+ PE |          | PE +----+NF |          |
  |+---+    +--+-+      |    |          |    |    +-+-+          |
  |            |        +-+--+          +-+--+      |            |
  |            |          |               |         |            |
  +------------+          +---------------+         +------------+
]]></artwork>
      </figure>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The 5G control plane uses the Single Network Slice Selection Assistance Information (S-NSSAI) for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G domains can expose the 5G slices to the transport
domain by mapping to explicit data plane identifiers (e.g., Layer 2, Layer 3, or Layer 4). The realization of the mapping between customer sites and provider networks is refered to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of such hand-off methods.</t>
      <t>The realization model described in this document uses a set of building blocks commonly used in service provider networks. Concretely, the model uses (1) Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation, (2) fine-grained resource control at the Provider Edges (PEs), (3) coarse-grained resource control at within the provider network, and (4) capacity management. More details are provided in Sections <xref format="counter" target="sec-over-rea-model"/>, <xref format="counter" target="sec-qos-map"/>, <xref format="counter" target="transport-plane-mapping-models"/>, and <xref format="counter" target="sec-capacity-planning"/>.</t>
      <t>This realization model uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
      <t>"5G Network Slicing" (or "5G Network Slice") refers to "Network Slicing" (or "Network Slice") as defined in the 3GPP <xref target="TS-28.530"/>.</t>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Customer:</dt>
        <dd>
          <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably the Radio Access Network (RAN) and Core Network (CN).</t>
        </dd>
        <dt/>
        <dd>
          <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
        </dd>
        <dt>Customer site:</dt>
        <dd>
          <t>A customer manages and deploys 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)) in customer sites. A customer site can be either a physical or a virtual location.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of customer sites are a customer private locations (Point of Presence (PoP), Data Center (DC)), a Virtual Private Cloud (VPC), or servers hosted within the provider network or colocation service.</t>
        </dd>
        <dt>Provider:</dt>
        <dd>
          <t>An entity responsible for interconnecting customer sites.</t>
        </dd>
        <dt/>
        <dd>
          <t>A provider orchestrates and manages a provider network.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as:</t>
        <blockquote>
          <t>"part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        </blockquote>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <blockquote>
          <t>"The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts." (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
        </blockquote>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts an NF instance that is deployed in an edge data center (DC) connected to an NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      +----------------------------------+       
 +----+      5G RAN or Core Network      +----+
 |    +----------------------------------+    | 
 |                                            | 
 v                                            v 
+--+  +----------------------------------+  +--+
|NF+--+        Transport Network         +--+NF|
+--+  +--+---------------+------------+--+  +--+
         |               |            |       
         v               v            v       
 +-- Data Center -+  +-MPLS VPN-+   +-Public-+   
 |                |  | Backbone |   |  Cloud |  
 |.-----. .-----. | +--+      +--+ +--+      |  
 |'-----' '-----' | |PE|      |PE| |GW|      |
 |.-. .-. .-. .-. | +--+      +--+ +--+      |
 |'-' '-' '-' '-' |  |          |   |        |
 |                | +--+      +--+  |        |
 |                | |PE|      |PE|  |        |
 |                | +--+      +--+  |        |
 |                |  |          |   |        |
 +----------------+  +----------+   +--------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
world. This difference can be seen from the descriptions below that set out
the objectives of 5G Network Slicing (<xref target="sec-5g-slicing"/>) and Transport Network
Slicing (<xref target="sec-tn-slicing"/>). These descriptions are not intended to be exhaustive.</t>
        <section anchor="sec-5g-slicing">
          <name>5G Network Slicing</name>
          <t>5G Network Slicing is defined by the 3GPP  <xref target="TS-28.530"/> as an approach:</t>
          <blockquote>
            <t>"where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category (e.g. use case/traffic category, or for MNO internal reasons) or customers (logical system created "on demand")."</t>
          </blockquote>
          <t>These resources are from the TN, RAN, CN domains, and the underlying infrastructure.</t>
          <t>Section 3.1 of <xref target="TS-28.530"/> defines 5G Network Slice as:</t>
          <blockquote>
            <t>"a logical network that provides specific network capabilities and network characteristics, supporting various service properties for network slice customers."</t>
          </blockquote>
        </section>
        <section anchor="sec-tn-slicing">
          <name>Transport Network Slicing</name>
          <t>The term "TN slice" refers to a slice in the Transport Network domain of the 5G architecture.</t>
          <t>The objective of Transport Network Slicing is to isolate,
guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).</t>
          <t>Transport Network Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.</t>
          <t>There are different components to implement TN slices based upon
mechanisms such as Virtual Routing and Forwarding instances (VRFs)
for logical separation, Quality of Service (QoS), and Traffic
Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
        </section>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
      Customer                 Provider                     Customer
   Orchestration            Orchestration                 Orchestration
      Domain                   Domain                       Domain                                                                          
+----------------+      +---------------------+       +----------------+
|    Customer    |      |  Provider Network   |       |    Customer    |
|      Site 1    |      |                     |       |      Site 2    |
|          +----+|      |+----+         +----+|       |+----+          |
|+--+      |    ||  AC  ||    |         |    ||  AC   || NF |          |
||NF|......| CE +--------+ PE |         | PE +---------+(CE)|          |
|+--+      |    ||      ||    |         |    ||       ||    |          |
|          +----+|      |+----+         +----+|       |+----+          |
|                |      |                     |       |                |
+----------------+      +---------------------+       +----------------+
                                                                          
     <-----------------Transport Network--------------->
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> is provided in the following subsections.</t>
        <section anchor="sec-cs">
          <name>Customer Site</name>
          <t>On top of 5G NFs, a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site.</t>
          <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of scope to document how these controllers are implemented.</t>
        </section>
        <section anchor="sec-ce">
          <name>Customer Edge (CE)</name>
          <t>A CE is a function that provides logical connectivity of a customer site (<xref target="sec-cs"/>) to the provider network (<xref target="sec-pn"/>). The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC) (<xref target="sec-ac"/>). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          <t>A CE is typically managed by the customer, but it can also be co-managed with the provider. A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. A co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
          <t>This document generalizes the definition of a CE with the introduction of "Distributed CE"; that is, the logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (<xref target="fig-distribute-ce"/>). Another example of distributed CE is shown in <xref target="fig-50"/>.</t>
          <figure anchor="fig-distribute-ce">
            <name>Example of Distributed CE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|.................                  |              |
||+-----+ +----+ |               +----+            |
|||     | |    ==================     |            |
|||     +------------AC---------+ PE  |            |
||| RTR | | SW ==================     |            |
||+-----+ +----+ |               +----+            |
|'..Distributed..'                  |              |
|       CE     |                    |              |
+--------------+                    +--------------+
]]></artwork>
          </figure>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs subinterface on a Layer 3 interface), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). However, the CE is still managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. The complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE. Service-aware CEs are used, for example, in the deployments discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
        <section anchor="sec-pn">
          <name>Provider Network</name>
          <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP, MPLS, or both.</t>
        </section>
        <section anchor="sec-pe">
          <name>Provider Edge (PE)</name>
          <t>PE is a device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs (<xref target="sec-ac"/>).</t>
          <t>This document generalizes the PE definition with the introduction of "Distributed PE"; that is, the logical connectivity is realized by configuring multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
          <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (i) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (ii) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
          <figure anchor="fig-50">
            <name>Examples of Distributed PE</name>
            <artwork align="center"><![CDATA[
+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|              |                .................  |
|          +----+               |+----+   +----+|  |
|          |    ==================Mngd|   |    ||  |
|          | CE +--------AC------+ CE +---+ PE ||  |
|          |    ==================    |   |    ||  |
|          +----+               |+----+   +----+|  |
|              |                '..Distributed..'  |
|              |                    |  PE          |
+--------------+                    +--------------+
                  (i) Distributed PE

+--------------+                    +--------------+
|   Customer   |                    |   Provider   |
|     Site     |                    |    Network   |
|  ..................           .................. |
|  |    IP Fabric   |           |+----+   +----+ | |
|  |.-----. .-----. ============== DC |   |    | | |
|  |'-----' '-----' +-----AC-----+ GW +---+ PE | | |
|  |.-. .-. .-. .-. ==============    |   |    | | |
|  |'-' '-' '-' '-' |           |+----+   +----+ | |
|  '...Distributed..'           '...Distributed..' |
|          CE  |                    |  PE          |
|              |                    |              |
+--Data Center-+                    +--------------+
              (ii) Distributed PE and CE
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="sec-ac">
          <name>Attachment Circuit (AC)</name>
          <t>The AC is the logical connection that attaches a CE (<xref target="sec-ce"/>) to a PE (<xref target="sec-pe"/>). A CE is connected to a PE via one or multiple ACs.</t>
          <t>This document uses the concept of distributed CE and PE (Sections <xref format="counter" target="sec-ce"/>) and (<xref format="counter" target="sec-pe"/>) to consolidate a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity. For example, the bearer is illustrated with "===" in Figures <xref format="counter" target="fig-distribute-ce"/> and <xref format="counter" target="fig-50"/>.</t>
          <t>An AC is technology-specific. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          <t>Deployment cases where the AC is also managed by the provider are not discussed in the document because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <aside>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented. Also, the underlying bearers are not represented in most of the figures.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </aside>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or Virtualized Infrastructure Manager (VIM)).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         |  5G NSO   |                          
                         +--+---+----+                          
                            |   |                               
                            v   |                               
              +---------------+ |                               
              | 3GPP domains  | |                               
  +-----------+ Orchestration +-|--------------------------+    
  |           | (RAN and CN)  | |                          |    
  |           +---------------+ |                          |    
  |                             |                          |    
  |    +------------------------|----------------------+   |    
  |    |TN Orchestration        |                      |   |    
  |    |        +------------------------------+       |   | 
  |    |        |               |              |       |   | 
  |    |        v               v              v       |   |    
  |    |+---------------++-----------++---------------+|   |    
  |    || Customer Site ||RFC9543 NSC|| Customer Site ||   |    
  |    || Orchestration ||           || Orchestration ||   |    
  |    |+---------------++-----------++---------------+|   |    
  |    +---|-------------------|---------------------|-+   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        v                   v                     v     |    
+-|-----------+         +-----------------+         +------|---+
| |           |         |    Provider     |         |      |   |
| v           |       +----+  Network  +----+      +----+  |   | 
|+--+     +----+   AC |    |           |    |  AC  | NF |<-+   | 
||NF+.....+ CE +------+ PE |           | PE +------+(CE)|      | 
|+--+     +----+      |    |           |    |      +----+      |
|             |       +----+           +----+       |          |
|  Customer   |         |                 |         | Customer |
|    Site     |         |                 |         |   Site   |
+-------------+         +-----------------+         +----------+
                              RFC 9543                          
                      |-----Network Slice---|                  
                                                                
    |--------------------TN Slice-------------------|                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>This document focuses on deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>. The concept of distributed PE (<xref target="sec-pe"/>) assimilates CE-based SDPs defined in <xref section="5.2" sectionFormat="of" target="RFC9543"/> (i.e., Types 1 and 2) as SDP Type 3 or 4 in this document.</t>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types that are as follows:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site or connects an NF to a CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>This segment may not be present if the NF is the CE. In this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs. The realization of this segment is controlled by an NSC (<xref section="6.3" sectionFormat="of" target="RFC9543"/>).</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>The orchestration of this segment relies partially upon an NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
            <dt/>
            <dd>
              <t>PEs and CEs that are connected via an AC need to be
provisioned with consistent data plane and control plane information (VLAN-
IDs, IP addresses/subnets, BGP  Autonomous System (AS) Number, etc.). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t>The provisioning of a Network Slice may rely on new or existing ACs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  +---------------+                   +------------------+ 
  |               |                   |   RFC9543 NSC    |
  | Customer Site |                   |                  |
  | Orchestration |    IETF APIs/DM   |(Provider Network |
  |               |<----------------->|  Orchestration)  |
  +---------------+                   +------------------+ 
                |                        |                
                |                        |                
+---------------|-+                    +-|---------------+
|               v |                    | v               |
| +--+      +--+.1|    192.0.2.0/31    |.0+--+           |
| |NF+......+CE+--------------------------+PE|           |
| +--+      +--+  |      VLAN 100      |  +--+           |
|    Customer     |                    |     Provider    |
|      Site       |                    |     Network     |
+-----------------+                    +-----------------+
                                                          
               |----------- AC -----------|
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                        5G Slice eMBB                          |
|            +------------------------------------+             |
| +-----+ N3 | +---------------------------------+|  N3 +-----+ |
| |CU-UP+------+ RFC 9543 Network Slice UP_eMBB  +------+ UPF | |
| +-----+    | +---------------------------------+|     +-----+ |
|            |                                    |             |
| +-----+ N2 | +---------------------------------+|  N2 +-----+ |  
| |CU-CP+------+    RFC 9543 Network Slice CP    +------+ AMF | |
| +-----+    | +---------------------------------+|     +-----+ |
+------------|------------------------------------|-------------+
             |                                    |              
             |           Transport Network        |          
             +------------------------------------+
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  +-------------+                                  
                  |  Edge Cloud |                                  
                  |             |                                  
                  | +---------+ |                                  
                  | |UPF_URLLC| |                                  
                  | +-----+---+ |                                  
                  +-------|-----+                                  
+---------------+ +-------|----------------------+                
|   Cell Site   | | +-----+--------------------+ | +--------------+
|               | | |                            | |   Regional   |
| +-----------+ | | |                          | | |     Cloud    |
| |CU-UP_URLLC+-----+                          | | | +-----------+| 
| +-----------+ | | |     RFC 9543 Network     +-----+  5GC CP  | |
|               | | |        Slice ALL         | | | +-----------+| 
| +-----------+ | | |                          | | |              |
| |CU-UP_eMBB +-----+                          | | | +-----------+  
| +-----------+ | | |                          +-----+ UPF_eMBB | |
+---------------+ | |                          | | | +-----------+|  
                  | +--------------------------+ | |              |
                  |                              | +--------------+
                  |      Transport Network       |                 
                  +------------------------------+
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Mapping approaches that preserve the 5G slice identification in the TN (e.g., <xref target="sec-ip-hof"/>) may simplify required operations to map back TN slices to 5G slices. However, such considerations are not detailed in this document because these are under the responsibility of the 3GPP orchestration domain.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deploloyment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (INS-UP2). In this example, the control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST-1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+              
                      Deployment of first 5G slice               
                                  | |                            
                                  | |                            
                                --+ +--                           
                                 \   /                           
                                  \ /                                                      
+---------------------------------------------------------------+
|                  +------------------------------+             |
|  1    +-----+    | +--------------------------+ |    +-----+  |
|  s S  |NF-CP+------+   CP TN Slice (TNS-CP)   +------+NF-CP|  |
|  t l  +-----+    | +--------------------------+ |    +-----+  |
|    i             |                              |             |
|  5 c  +-----+    | +--------------------------+ |    +-----+  |
|  G e  |NF-UP+------+  UP TN Slice (TNS-UP1)   +------+NF-UP|  |
|       +-----+    | +--------------------------+ |    +-----+  |
+------------------|------------------------------|-------------+
                   |                              |              
+------------------|------------------------------|-------------+
|  2               |                              |             |
|  n S  +------+   | +--------------------------+ |   +------+  |
|  d l  |NF-UP2+-----+  UP TN Slice (TNS-UP2)   +-----+NF-UP2|  |
|    i  +------+   | +--------------------------+ |   +------+  |
|  5 c             |                              |             |
|  G e             |                              |             |
+------------------|------------------------------|-------------+
                   |                              |              
                   |      Transport Network       |          
                   +------------------------------+                 
    Deployment of additional 5G slice with shared Control Plane
]]></artwork>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN <xref target="RFC4664"/> and/or L3VPN <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>).</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
            .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ...
      +-----:----+              Base NRP              +----:-----+
      | PE  :    |                                    |    :  PE |
   ...|.....:....|....................................|....:.....|... 
   |  *<---+:    |      RFC 9543 Network Slice 1      |    :+--->*  |
   |  |    |:    |       +-----+        +-----+       |    :|    |  |
   |  *<---+:    |       |  P  |        |  P  |       |    :+--->*  |
    .......+---->o<----->o<--->o<------>o---->o<----->o<----+....|..
   |  *<---+:    |       |     |        |     |       |    :+--->*  |
   |  |    |:    |       +-----+        +-----+       |    :|    |  |
   |  *<---+:    |      RFC 9543 Network Slice 2      |    :+--->*  |
   ....|....:....|....................................|....:.....|...
       |    :    |                                    |    :     |
       +----:----+                                    +----:-----+
            '.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..'
 * SDP, with fine-grained QoS (dedicated resources per Network Slice) 
 o Coarse-grained QoS, with resources shared by all Network Slices         
]]></artwork>
        </figure>
        <t>P nodes shown in <xref target="_figure-high-level-qos"/> are routers that do no interface with customer devices. See <xref section="5.3.1" sectionFormat="of" target="RFC4026"/>.</t>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. These section lists few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     +------------------+     |             |           
           |     |                  |     |             |           
+------+   v   +-+---+ Provider +---+-+   v   +-----+   v   +------+
|      +-------+*    |          |    *+-------+     +.......+      |
| NF   +-------+* PE |          | PE *+-------+L2/L3+.......+   NF |
|      +-------+*    |          |    *+-------+     +.......+      |
+------+   AC  +-+---+  Network +---+-+   AC  +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                     
 + Logical interface represented by a VLAN on a physical interface
 * SDP
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example, a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices                                                                     
                 +------------------+                   |        
                 |                  |                   |           
+------+       +--+--+ Provider +---+-+       +-----+   v   +------+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+------+  AC   +-+---+  Network +---+-+  AC   +-----+       +------+
                 |                  |                               
                 +------------------+
                                                                    
o Tunnel (IPsec, GTP-U, ...) termination point          
* SDP
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <section anchor="an-example-of-local-ipv6-addressing-plan-for-network-functions">
          <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
          <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
          <figure anchor="_figure-11">
            <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
            <artwork align="center"><![CDATA[
             NF-specific          Reserved
        (not slice specific)     for S-NSSAI
   <----------------------------><--------->
   +----+----+----+----+----+----+----+----+
   |xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd|
   +----+----+----+----+----+----+----+----+
   <------------------128 bits------------->

    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
          </figure>
          <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
          <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST-01, SD-00001) and "customer B Massive Internet of Things (MIoT)" (SST-03, SD-00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST-3,
   SD-00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
          <figure anchor="_figure-s-nssai-deployment">
            <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
            <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     |                                                        |     
     |            + - - - - - - - - +   eMBB (SST=1)          |     
     |            |                 |      |                  |     
+----v-+       +--+--+ Provider +---+-+    v  +-----+       +-v----+
|    o============*================*==========================o    |
| NF   +-------+ PE  |          | PE  +-------+L2/L3+.......+   NF |
|    o============*================*==========================o    |
+----^-+       +--+--+  Network +---+-+    ^  +-----+       +-^----+
     |            |                 |      |                  |     
     |            + - - - - - - - - + MIoT (SST=3)            |     
     |                                                        |     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                   
 o Tunnel (IPsec, GTP-U, etc) termination point          
 * SDP
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <t><xref target="_figure-51"/> illustrates the use of service-aware CE (<xref target="sec-ce"/>) for the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        <figure anchor="_figure-51">
          <name>Example of MPLS-based Attachment Circuit</name>
          <artwork align="center"><![CDATA[
+--------------+                      +--------------+
|   Customer   |                      |   Provider   |
|     Site     |                      |    Network   |
|              |                      |              |
|              |                      |              |
|              |  <------MP-BGP-----> |              |
|           +--+-+                  +-+--+           |
|           |    |   MPLS-based AC  |    |           |
|           | CE +------------------+ PE |           |
|        +--+----+--+               |    |           |
|        | VRF foo  |               +-+--+           |
+--------+----------+                 +--------------+
]]></artwork>
        </figure>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don't support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <------        <------        <------                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
     <-------------><------------><------------->                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
service instances                service instances  representing   
representing slices              representing slices    slices      
      |                                       |         | 
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

  x Logical interface represented by a VLAN on a physical interface   
  # Service instances (with unique MPLS labels)                    
  * SDP
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM-1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI-4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     <-------------------------------------------
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     <------------------------------------------>

      <------        <------        <------
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     <-------------><------------><------------->
                nhs  nhs      nhs  nhs
                                                        VLANs
service instances                service instances  representing
representing slices              representing slices    slices
      |                                       |         |
+---+ |           +--------------+           +|---------|----------+
|   | |           |     Provider |           ||         |          |
|+--+-v-+       +-+---+       +--+--+      +-+v----+    v  +------+|
||    # |       |*    |       |    *|      |  #<><>x.......x      ||
|| NF # +-------+* PE |       | PE *+------+  #<><>x.......x   NF ||
||    # |   AC  |*    |       |    *|   AC |  #<><>x.......x      ||
|+---+--+       +-+---+       +---+-+      +-+-----+       +------+|
| CS1|            |      Network  |          | L2/L3    CS2        |
+----+            +---------------+          +---------------------+

   x Logical interface represented by a VLAN on s physical interface
   # Service instances (with unique MPLS label)
   * SDP
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the AC there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
+------------------------------------------------------------+
+-----------------+         PE                               |
|+ - - - - - - - +|                                          | 
||  SDP          ||              +---------------------------+
||  +----------+ ||              |       Transit link        |
||  |     NS 1 +------------+    |+------------------------+ |
||  +----------+ ||         |----->     TN QoS Class 1     | |
|+ - - - - - - - +|         |    |+------------------------+ |
|+ - - - - - - - +|         |    |+------------------------+ |
||  SDP          ||         |    ||     TN QoS Class 2     | |
||  +----------+ ||         |    |+------------------------+ |
|   |     NS 2 +--------+   |    |+------------------------+ |
||  +----------+ ||     |   |    ||     TN QoS Class 3     | |
|+ - - - - - - - +|     |   |    |+------------------------+ |
|+ - - - - - - - +|     |   |    |+------------------------+ |
||  SDP          ||     +--------->     TN QoS Class 4     | |
||  +----------+ ||         |    |+------------------------+ |
||  |     NS 3 +------------+    |+------------------------+ |
||  +----------+ ||     +--------->     TN QoS Class 5     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 6     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 4 +--------+        |+------------------------+ |
||  +----------+ ||     |        ||     TN QoS Class 7     | |
|+ - - - - - - - +|     |        |+------------------------+ |
|+ - - - - - - - +|     |        |+------------------------+ |
||  SDP          ||     |        ||     TN QoS Class 8     | |
||  +----------+ ||     |        |+------------------------+ |
||  |     NS 5 +--------+        |     Max 8 TN Classes      |
||  +----------+ ||              +---------------------------+
|+ - - - - - - - +|                                          |
+-----------------+                                          |
+------------------------------------------------------------+
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | MPLS Header  |
                                 +-----+-----+  |
                                 |Label|TN TC|  |
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 +--------------+
                                 | IPv6 Header  |
                                 |      +-------+
                                 |      |TN DSCP|
                                 +------+-------+
                                 :   Optional   :
                                 :     IPv6     :
                                 :    Headers   :
+--------------+ - - - - - - - - +-----+-----+--+
|  IP Header   |         |\      |  IP Header   |
|      +-------+         | \     |      +-------+
|      |5G DSCP|---------+  \    |      |5G DSCP|
+------+-------+             \   +------+-------+
|              |              \  |              |
|              |               \ |              |
|              |                 |              |
|   Payload    |               / |   Payload    |
|(GTP-U/IPsec) |              /  |(GTP-U/IPsec) |
|              |             /   |              |
|              |---------+  /    |              |
|              |         | /     |              |
|              |         |/      |              |
+--------------+ - - - - - - - - +--------------+
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     +---------+
              |    +---|--+      |
              |    |      |      |
              |    |    S |      |
              |    |    l |      |
              v    |    i |      |
-------------<>----|--> c |      |
                   |    e |  A   |
                   |      |  t   |
                   |    1 |  t   |
                   |      |  a   |
                    ------   c   |
                   |      |  h   |
                   |    S |  m   |
                   |    l |  e   |
                   |    i |  n   |
-------------<>----|--> c |  t   |
                   |    e |      |
                   |      |  C   |
                   |    2 |  i   |
                   |      |  r   |
                    ------   c   |
                   |      |  u   |
                   |    S |  i   |
                   |    l |  t   |
                   |    i |      |
-------------<>----|--> c |      |
                   |    e |      |
                   |      |      |
                   |    3 |      |
                   |      |      |
                   +---|--+      |
                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      +---------+        QoS output queues
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      |     | S    |                            \|/
      |     | l    |                             |
      |     | i    |                             |
      |  A  | c    |                             |  weight-Slice-1-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-1-PIR
   ---|--t--|---->                            |  |
      |  a  | 1  +-|--------------------------+ /|\
      |  c   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  h  | S    |                            \|/
      |  m  | l    |                             |
      |  e  | i    |                             |
      |  n  | c    |                             |  weight-Slice-2-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-2-PIR
   ---|-----|---->                            |  |
      |  C  | 2  +-|--------------------------+ /|\
      |  i   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
      |  r  | S    |                            \|/
      |  c  | l    |                             |
      |  u  | i    |                             |
      |  i  | c    |                             |  weight-Slice-3-CIR
      |  t  | e  +-|--------------------------+  | shaping-Slice-3-PIR
   ---|-----|---->                            |  |
      |     | 3  +-|--------------------------+ /|\
      |     +---|--+- - - - - - - - - - - - - - - - - - - - - - - - - -
      +---------+
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  +------------------------------------------------------------+ 
  +-----------------+        PE                                |
  |+ - - - - - - - +|                                          |    
R ||  SDP          ||              +---------------------------+
F ||  +----------+ ||              |       Transit link        |
C ||  |5G DSCP A +---------------+ |+------------------------+ |
9 ||  +----------+ ||            +-->     TN QoS Class 1     | |
5 ||  +----------+ ||            | |+------------------------+ |
4 ||  |5G DSCP B +-----------+   | |+------------------------+ |
3 ||  +----------+ ||        |   | ||     TN QoS Class 2     | |
  ||  +----------+ ||        |   | |+------------------------+ |
N ||  |5G DSCP C +--------+  |   | |+------------------------+ |
S ||  +----------+ ||     |  |   | ||     TN QoS Class 3     | |
  ||  +----------+  |     |  |   | |+------------------------+ |
1 ||  |5G DSCP D +-----+  |  |   | |+------------------------+ |
  ||  +----------+  |  |  |  +------>     TN QoS Class 4     | |
  |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
R |+ - - - - - - - +|  |  |  |   | |+------------------------+ |
F ||  +----------+  |  |  +--------->     TN QoS Class 5     | |
C ||  |5G DSCP A +-----|--|--|---+ |+------------------------+ |
9 ||  +----------+ ||  |  |  |     |+------------------------+ |
5 ||  +----------+ ||  |  |  |     ||     TN QoS Class 6     | |
4 ||  |5G DSCP E +-----|--|--+     |+------------------------+ |
3 ||  +----------+ ||  |  |        |+------------------------+ |
  ||  +----------+ ||  |  |        ||     TN QoS Class 7     | |
N ||  |5G DSCP F +-----|--+        |+------------------------+ |
S ||  +----------+ ||  |           |+------------------------+ |
  ||  +----------+ ||  +------------>     TN QoS Class 8     | |
2 ||  |5G DSCP G +-----+           |+------------------------+ |
  ||  +----------+ ||              |     Max 8 TN Classes      |
  ||  SDP          ||              +---------------------------+
  |+ - - - - - - - +|                                          |
  +-----------------+                                          |                                         
  +------------------------------------------------------------+ 
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      +-------------  PE  -----------------+
+------ NF-A ------+  |                                    |
|                  |  | + - - - - +                        |
| 3GPP S-NSSAI 100 |  | |   SDP   |                        |
|.------. .-------.|  | |.-------.|                        |
||5QI=1 +->DSCP=46+------>DSCP=46+---+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=65+->DSCP=46+------>DSCP=46+|--+                     |
|'------' '-------'|  | |'-------'|  |                     |
|.------. .-------.|  | |.-------.|  |                     |
||5QI=7 +->DSCP=10+------>DSCP=10------+  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 5| |
+------------------+  | +- - - - -+  +-|-->   Queue 5    | |
                      |              | |  '--------------' |
+------ NF-B ------+  |              | |                   |
|                  |  | + - - - - +  | |                   |
| 3GPP S-NSSAI 200 |  | |   SDP   |  | |                   |
|.------. .-------.|  | |.-------.|  | |                   |
||5QI=1 +->DSCP=46+------>DSCP=46+---+ |  .--------------. |
|'------' '-------'|  | |'-------'|  | |  |TN QoS Class 1| |
|.------. .-------.|  | |.-------.|  | +-->   Queue 1    | |
||5QI=65+->DSCP=46+------>DSCP=46+|--+ |  '--------------' |
|'------' '-------'|  | |'-------'|    |                   |
|.------. .-------.|  | |.-------.|    |                   |
||5QI=7 +->DSCP=10+------>DSCP=10+-----+                   |
|'------' '-------'|  | |'-------'|                        |
+------------------+  | +- - - - -+                        |
                      +------------------------------------+
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             +---------+
                    policer         +--|---+     |
                                    |      |     |
5Q-QoS-A: CIR-1A ------<>-----------|--> S |     |
5Q-QoS-B: CIR-1B ------<>-----------|--> l |     |
5Q-QoS-C: CIR-1C ------<>-----------|--> i |     |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-1D ------<>-----------|-->   |  A  |
                                    |    1 |  t  |
                                    |      |  t  |
                                     ------   a  |
                                    |      |  c  |
5Q-QoS-A: CIR-2A ------<>-----------|->  S |  h  |
5Q-QoS-B: CIR-2B ------<>-----------|->  l |  m  |
5Q-QoS-C: CIR-2C ------<>-----------|->  i |  e  |
                                    |    c |  n  |
                                    |    e |  t  |
   BE CIR/PIR-2D ------<>-----------|->    |     |
                                    |    2 |  C  |
                                    |      |  i  |
                                     ------   r  |
                                    |      |  c  |
5Q-QoS-A: CIR-3A ------<>-----------|->  S |  u  |
5Q-QoS-B: CIR-3B ------<>-----------|->  l |  i  |
5Q-QoS-C: CIR-3C ------<>-----------|->  i |  t  |
                                    |    c |     |
                                    |    e |     |
   BE CIR/PIR-3D-------<>-----------|->    |     |
                                    |    3 |     |
                                    |      |     |
                                    +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   +---------+
                   Class        .   +--|---+     |
                  policer      ; :  |      |     |
5Q-QoS-A: CIR-1A ----<>--------|-|--|--> S |     |
5Q-QoS-B: CIR-1B ----<>--------|-|--|--> l |     |
5Q-QoS-C: CIR-1C ----<>--------|-|--|--> i |     |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-1D --------------|-|--|-->   |  A  |
                               | |  |    1 |  t  |
                               : ;  |      |  t  |
                                .    ------   a  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-2A ----<>--------|-|--|--> S |  h  |
5Q-QoS-B: CIR-2B ----<>--------|-|--|--> l |  m  |
5Q-QoS-C: CIR-2C ----<>--------|-|--|--> i |  e  |
                               | |  |    c |  n  |
                               | |  |    e |  t  |
   BE CIR/PIR-2D --------------|-|--|-->   |     |
                               | |  |    2 |  C  |
                               : ;  |      |  i  |
                                .    ------   r  |
                               ; :  |      |  c  |
5Q-QoS-A: CIR-3A ----<>--------|-|--|--> S |  u  |
5Q-QoS-B: CIR-3B ----<>--------|-|--|--> l |  i  |
5Q-QoS-C: CIR-3C ----<>---- ---|-|--|--> i |  t  |
                               | |  |    c |     |
                               | |  |    e |     |
   BE CIR/PIR-3D --------------|-|--|-->   |     |
                               | |  |    3 |     |
                               : ;  |      |     |
                                '   +--|---+     |
                                       +---------+
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   +---------+        QoS output queues
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |     |   |.-|--------------------------. \|/
---|-----|----> 5Q-QoS-A: w-5Q-QoS-A-CIR   |  |
   |     | S |'-|--------------------------'  |
   |     | l |.-|--------------------------.  |
---|-----|-i--> 5Q-QoS-B: w-5Q-QoS-B-CIR   |  |
   |     | c |'-|--------------------------'  |  weight-Slice-1-CIR
   |     | e |.-|--------------------------.  | shaping-Slice-1-PIR
---|-----|----> 5Q-QoS-C: w-5Q-QoS-C-CIR   |  |
   |     | 1 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
---|-----|----> Best Effort (remainder)    |  |
   |     |   |'-|--------------------------' /|\
   |  A   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  t  |   |.-|--------------------------. \|/
   |  t  |   ||                            |  |
   |  a  |   |'-|--------------------------'  |
   |  c  | S |.-|--------------------------.  |
   |  h  | l ||                            |  |
   |  m  | i |'-|--------------------------'  |  weight-Slice-2-CIR
   |  e  | c |.-|--------------------------.  | shaping-Slice-2-PIR
   |  n  | e ||                            |  |
   |  t  |   |'-|--------------------------'  |
   |     | 2 |.-|--------------------------.  |
   |  C  |   ||                            |  |
   |  i  |   |'-|--------------------------' /|\
   |  r   ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   |  c  |   |.-|--------------------------. \|/
   |  u  |   ||                            |  |
   |  i  | S |'-|--------------------------'  |
   |  t  | l |.-|--------------------------.  |
   |     | i ||                            |  |
   |     | c |'-|--------------------------'  |  weight-Slice-3-CIR
   |     | e |.-|--------------------------+  | shaping-Slice-3-PIR
   |     |   ||                            |  |
   |     | 3 |'-|--------------------------'  |
   |     |   |.-|--------------------------.  |
   |     |   ||                            |  |
   |     |   |'-|--------------------------' /|\
   |      ------ - - - - - - - - - - - - - - - - - - - - - - - - - -
   +---------+
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in Figures <xref format="counter" target="_figure-15"/> and <xref format="counter" target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>Inter-PE Transfer Plane Mapping Models</name>
      <t>An inter-PE transfer plane (or "transfer plane") refers to a specific path forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs. This realization step focuses on controlling the paths that will be used for packet delivery between PEs, independent of the underlying network resource partitioning.</t>
      <t>It is worth noting that TN QoS Classes and inter-PE transfer planes are
   orthogonal.  The TN domain can be operated with, e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 transfer planes (e.g., latency optimized transfer
   plane using link latency metrics for path calculation, and transfer
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transfer plane determines the paths for packets through provider
   network based on the operator's requirements. This path can be optimized or constrained.</t>
      <t>A network operator can define multiple inter-PE transfer planes within a single NRP. A transfer plane may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>These protocols can be controlled, e.g., by tuning the protocol list under the "underlay-transport" data node defined in the L3VPN Network Model (L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
      <t>Also, inter-PE transfer planes may be realized using separate NRPs. However, such an approach is left out of the scope given the current state of the technology (2024).</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transfer planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transfer planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transfer planes (5QI-aware
   model).</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transfer
   planes, each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate inter-PE transfer planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Inter-PE Transfer Planes Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
+---------------+                                    +------+
|  Ingress PE   |   .------------------------------->| PE-A |
|               |   |   .-------------------------->>|      |
|  +---------+  |   |   '---------------------.      +------+
|  |         x------'   .---------------------'
|  |Transfer x--------------------------------.      +------+
|  | Plane A x-------------.                  '----->| PE-B |
|  |         x-------.  |  |  .---.   .---.   .---->>|      |
|  +---------+  |    |  |  |  |   |   |   |   |      +------+
|               |    |  |  |  |   '---'   '---'
|  +---------+  |    |  |  |  |                      +------+
|  |         o-------|--'  '------------------------>| PE-C |
|  |Transfer o-------|--------'               .---->>|      |
|  | Plane B o-------|-----------------.      |      +------+
|  |         o-----. '---------------. |      |
|  +---------+  |  | .-. .-. .-. .-. | '------'      +------+
|               |  | | | | | | | | | '-------------->| PE-D |
+---------------+  '-' '-' '-' '-' '--------------->>|      |
                                                     +------+
 x----->   Tunnels of Inter-PE Transfer Plane A
 o---->>   Tunnels of Inter-PE Transfer Plane B
]]></artwork>
      </figure>
      <t>For illustration purposes, <xref target="_figure-23"/> shows only single
   tunnels per transfer plane for (ingress PE, egress PE) pair. However, there might be multiple tunnels within a single transfer plane
   between any pair of PEs.</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware inter-PE transfer plane mapping model, the entire
   slice is mapped to a single transfer plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to Inter-PE Transfer Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   +-----------------------------------------+
   |.. .. .. .. .. ..                        |
   :        AC       :      PE               |
   :+---------------+:                       |
   :|  SDP          |:                       |
   :|  +----------+ |:                       |
   :|  |     NS 1 +----------+               |
   :|  +----------+ |:       |               |
   :+---------------+:       |               |
   :+---------------+:       |   +---------+ |
   :|  SDP          |:       |   |         | |
   :|  +----------+ |:       |   |Transfer | |
   :|  |     NS 2 +------+   +--->  Plane  | |
   :|  +----------+ |:   |   |   |    A    | |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   +---------+ |
   :|  SDP          |:   |   |               |
   :|  +----------+ |:   |   |               |
   :|   |     NS 3 +-----+   |               |
   :|  +----------+ |:   |   |   +---------+ |
   :+---------------+:   |   |   |         | |
   :+---------------+:   |   |   |Transfer | |
   :|  SDP          |:   +------->  Plane  | |
   :|  +----------+ |:   |   |   |    B    | |
   :|  |     NS 4 +------+   |   |         | |
   :|  +----------+ |:       |   +---------+ |
   :+---------------+:       |               |
   :+---------------+:       |               |
   :|  SDP          |:       |               |
   :|  +----------+ |:       |               |
   :|  |     NS 5 +----------+               |
   :|  +----------+ |:                       |
   :+---------------+:                       |
   '.. .. .. .. .. ..                        |
   +-----------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transfer planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   inter-PE transfer planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transfer plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Inter-PE Transfer Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     +-------------------------------------------+
     |.. .. .. .. .. ..                          |
     :        AC       :      PE                 |
     :+---------------+:                         |
   R :|  SDP          |:                         |
   F :|  +----------+ |:                         |
   C :|  | 5G QoS A +------+                     |
   9 :|  +----------+ |:   |                     |
   5 :|  +----------+ |:   |                     |
   4 :|  | 5G QoS B +------+                     |
   3 :|  +----------+ |:   |         +---------+ |
     :|  +----------+ |:   |         |         | |
   N :|  | 5G QoS C +-----------+    |Transfer | |
   S :|  +----------+ |:   +--------->  Plane  | |
     :|  +----------+ |:   |    |    |    A    | |
   1 :|  | 5G QoS D +-----------+    |         | |
     :|  +----------+ |:   |    |    +---------+ |
     :+---------------+:   |    |                |
   R :+---------------+:   |    |                |
   F :|  +----------+ |:   |    |                |
   C :|  | 5G QoS A +------+    |    +---------+ |
   9 :|  +----------+ |:   |    |    |         | |
   5 :|  +----------+ |:   |    |    |Transfer | |
   4 :|  | 5G QoS E +------+    +---->  Plane  | |
   3 :|  +----------+ |:        |    |    B    | |
     :|  +----------+ |:        |    |         | |
   N :|  | 5G QoS F +-----------+    +---------+ |
   S :|  +----------+ |:        |                |
     :|  +----------+ |:        |                |
   2 :|  | 5G QoS G +-----------+                |
     :|  +----------+ |:                         |
     :|  SDP          |:                         |
     :+---------------+:                         |
     '.. .. .. .. .. ..                          |
     +-------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
+ - - - - DC 1- - - -+   + - - - - - - - - +   + - - - - DC 2- - - -+
| +------+           |  +----+         +----+  |           +------+ |
| | NF1A |           +--*PE1A|         |PE2A*--+           | NF2A | |
| +------+           |  +----+         +----+  |           +------+ |
| +------+           |   |                 |   |           +------+ |
| | NF1B |           |   |                 |   |           | NF2B | |
| +------+           |   |                 |   |           +------+ |
| +------+           |  +----+         +----+  |           +------+ |
| | NF1C |           +--*PE1B|         |PE2B*--+           | NF2C | |
| +------+           |  +----+         +----+  |           +------+ |
+ - - - - - - - - - -+   |    Provider     |   + - - - - - - - - - -+
                         |                 |                         
                         |     Network     |   + - - - - DC 3- - - -+
                         |             +----+  |           +------+ |
                         |             |PE3A*--+           | NF3A | |
                         |             +----+  |           +------+ |
                         |                 |   |           +------+ |
                         |                 |   |           | NF3B | |
                         |                 |   |           +------+ |
                         |             +----+  |           +------+ |
                         |             |PE3B*--+           | NF3C | |
                         |             +----+  |           +------+ |
                         + - - - - - - - - +   + - - - - - - - - - -+
                                                                     
  * SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_table-x"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple NF instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, "NF1A" and "NF1B" in "DC1"
   might be sending traffic to multiple NFs in "DC2", but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice "X" from "DC1" to "DC2" (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the NFs are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from "DC1" for slice "X"
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <table anchor="_table-x">
          <name>Inter-DC Traffic Demand Matrix (Slice X)</name>
          <thead>
            <tr>
              <th align="left">From/To</th>
              <th align="left">DC 1</th>
              <th align="left">DC 2</th>
              <th align="left">DC 3</th>
              <th align="center">Total from DC</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DC 1</td>
              <td align="left">n/a</td>
              <td align="left">8</td>
              <td align="left">5</td>
              <td align="center">11.0</td>
            </tr>
            <tr>
              <td align="left">DC 2</td>
              <td align="left">1</td>
              <td align="left">n/a</td>
              <td align="left">2</td>
              <td align="center">2.5</td>
            </tr>
            <tr>
              <td align="left">DC 3</td>
              <td align="left">4</td>
              <td align="left">7</td>
              <td align="left">n/a</td>
              <td align="center">10.0</td>
            </tr>
          </tbody>
        </table>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to an NSC.  The
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only slices "X" and
   "Y" are present, then the bandwidth requirement from "DC1" to "DC2"
   is 12 units (8 units for slice "X" (<xref target="_table-x"/>) and 4 units for slice "Y" (<xref target="_table-y"/>)).  When the
   5G NSO requests a new slice, the NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from "DC1" to "DC2".  The transport
   controller would increase its notion of the bandwidth requirement
   from "DC1" to "DC2" from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <table anchor="_table-y">
            <name>Inter-DC Traffic Demand Matrix (Slice Y)</name>
            <thead>
              <tr>
                <th align="left">From/To</th>
                <th align="left">DC 1</th>
                <th align="left">DC 2</th>
                <th align="left">DC 3</th>
                <th align="center">Total from DC</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">DC 1</td>
                <td align="left">n/a</td>
                <td align="left">4</td>
                <td align="left">2.5</td>
                <td align="center">6.0</td>
              </tr>
              <tr>
                <td align="left">DC 2</td>
                <td align="left">0.5</td>
                <td align="left">n/a</td>
                <td align="left">0.8</td>
                <td align="center">1.0</td>
              </tr>
              <tr>
                <td align="left">DC 3</td>
                <td align="left">2.6</td>
                <td align="left">3</td>
                <td align="left">n/a</td>
                <td align="center">5.1</td>
              </tr>
            </tbody>
          </table>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the "DC1" to "DC2" bandwidth requirement to bandwidth reservations of TE
   LSPs from "DC1" to "DC2".  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from "DC1" to "DC2" always enters "PE1A" and goes to "PE2A", the controller
   reserves 12.8 Gbps of bandwidth on the path from "PE1A" to "PE2A".  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from "DC1" to "DC2" always
   enters "PE1A" and is load-balanced across "PE2A" and "PE2B", the controller
   reserves 6.4 Gbps of bandwidth on the path from "PE1A" to "PE2A" and
   6.4 Gbps of bandwidth on the path from "PE1A" to "PE2B".  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within "DC1" that
   causes traffic from "DC1" to land on "PE1B", rather than "PE1A".  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from "PE1B" to "PE2A" / "PE2B".</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sca-impli">
      <name>Scalability Implications</name>
      <t>The mapping between 5G slice to TN slices (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
      <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies (<xref target="sec-over-rea-model"/>). Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Providers may adjust the mapping model to better handle local scalability constraints.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to an inter-PE transfer plane that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to an inter-PE transfer plane that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices' specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId-3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId-3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="29" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-13"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="15" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-11"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-13"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-00"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-01"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2351?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, Access and Mobility Function (AMF), etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1 and N2).  This architecture has built-in control
   and user plane separation, and the control plane leverages a Service-
   Based Architecture (SBA).  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible NFs and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  +-----+  +-----+  +-----+    +-----+  +-----+  +-----+
  |NSSF |  | NEF |  | NRF |    | PCF |  | UDM |  | AF  |
  +--+--+  +--+--+  +--+--+    +--+--+  +--+--+  +--+--+
Nnssf|    Nnef|    Nnrf|      Npcf|    Nudm|        |Naf
  ---+--------+--+-----+----------+---+----+--------+----
            Nausf|    Namf|       Nsmf|
              +--+--+  +--+--+     +--+------+
              |AUSR |  | AMF |     |   SMF   |
              +-----+  +--+--+     +--+------+
                       /  |           |      \
Control Plane      N1 /   |N2         |N4     \N4
------------------------------------------------------------
User Plane          /     |           |         \
                +---+  +--+--+  N3 +--+--+ N9 +-----+ N6  .---.
                |UE +--+(R)AN+-----+ UPF +----+ UPF +----( DN  )
                +---+  +-----+     +-----+    +-----+     '---'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms User Equipment (UE), Mobile Station (MS), Mobile
Node (MN), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of a Terminal Equipment (TE) and a Mobile Terminal
(MT).</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to UEs. A RAN is
made up of the Antenna that transmits and receives signals to
UEs and the Base Station that digitizes the signal and converts the
Radio Frequency (RF) data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to Public Switched Telephony Network (PSTN) and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G NFs.  The TN may provide connectivity from the RAN to the CN as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
+----------------------------------------------+
|             +------------+    +------------+ |
| +----+      |            |    |            | |   .-------.
| | UE +------+    RAN     |    |     CN     +----(    DN   )
| +----+      |            |    |            | |   '-------'
|             +------+-----+    +------+-----+ |
|                    |                 |       |
|              +-----+-----------------+----+  |
|              |     Transport Network      |  |
|              +----------------------------+  |
|                                              |
|                    5G System                 |
+----------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The UPF is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the user plane traffic in GTP tunnels (aka GTP-U or
Mobile user plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G control plane is made up of a
comprehensive set of NFs.  The description of these entities is out of the scope of this
document. The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF connects with the RAN control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  +---------+    +-------------------------+
  |   RAN   |    |      5G Core (5GC)      |
  |         |    |                         |
  |         |    |   [AUSF  NRF  UDM ...]  |
  |         |    |         (SBA)           |
  |         |    |                         |
  |         | N2 |   +-----+ N11 +-----+   |
  |    CP -----------+ AMF +-----+ SMF |   |
  |         |    |   +-----+     +--+--+   |
  |         |    |                  |      |  Control Plane
-----------------------------------------------------------
  |         |    |                  | N4   |  User Plane
  |         | N3 |               +--+--+   | N6  .-------.
  |    UP -----------------------+ UPF +------->(   DN    )
  |         |    |               +-----+   |     `-------'
  +---------+    +-------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            +---------------------------------+    +-----------+
            |                                 | N3 |           |
+----+  NR  |                                 +----+  5G Core  |
| UE +------+             gNodeB              |    |           |
+----+      |                                 +----+   (5GC)   |
            |                                 | N2 |           |
            +---------------------------------+    +-----------+
                            | |
                           .+ +.
                           \   /
                            \ /
            +---------------------------------+    +-----------+
            |           +-------------------+ |    |           |
            |           |                   | |    |           |
+----+  NR  | +----+ F2 |+----+ F1-U +-----+| | N3 |  +-----+  |
| UE +--------+ RU +-----+ DU +------+CU-UP+----------+ UPF |  |
+----+      | +----+    |+-+--+      +--+--+| |    |  +-----+  |
            |           |  |            |E1 | |    |           |
            |           |  | F1-C       |   | |    |           |
            |           |  |         +--+--+| | N2 |  +-----+  |
            |           |  +---------+CU-CP+----------+ AMF |  |
            |           |            +-----+| |    |  +-----+  |
            |           |     BBU split     | |    |  5G Core  |
            |           +-------------------+ |    |           |
            |       Disaggregated gNodeB      |    |           |
            +---------------------------------+    +-----------+
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI with Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the CN.  All traffic
is encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant NFs.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
+---------------------------------------------------------+
|                    Transport Network                    |
|                                                         |
|    Fronthaul       Midhaul       Backhaul               |
|  +-----------+ +------------+ +-----------+             |
|  |           | |            | |           |             |
+--|-----------|-|------------|-|-----------|-------------+
 +-+--+      +-+-++         +-+-++        +-+---+     .---.
 | RU |      | DU |         | CU |        | UPF :----( DN  )
 +----+      +----+         +----+        +-----+     `---'
]]></artwork>
        </figure>
        <t>A given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G NFs
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
+---------+
|+----+   | Colocated
||RU-1|   | RU/DU
|+-+--+   |
|  | FH-1 |
|+-+--+   |
||DU-1|   |  +----+         +-----+         .---.
|+-+--+   |  |CU-1|         |UPF-1+--------( DN  )
+--|------+  +-+-++         +-+---+         `---'
+--|-----------|-|------------|----------------------------+
|  |    MH-1   | |    BH-1    |          Transport Network |
|  +-----------+ +------------+                            |
|  +-----------+ +------------+ +-----------+              |
|  |    FH-2   | |    MH-2    | |    BH-2   |              |
+--|-----------|-|------------|-|-----------|--------------+
 +-+--+      +-+-++         +-+-++        +-+---+     .---.
 |RU-2|      |DU-2|         |CU-2|        |UPF-2+----( DN  )
 +----+      +----+         +----+        +-----+     `---'
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
