<?xml version='1.0' encoding='utf-8'?>

<!DOCTYPE rfc [
  <!ENTITY RFC6241 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6241.xml">
  <!ENTITY RFC7665 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7665.xml">
  <!ENTITY RFC8040 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8040.xml">
  <!ENTITY RFC8299 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8299.xml">
  <!ENTITY RFC8309 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8309.xml">
  <!ENTITY RFC8453 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8453.xml">
  <!ENTITY RFC8454 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8454.xml">
  <!ENTITY RFC8466 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8466.xml">
  <!ENTITY RFC8639 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8639.xml">
  <!ENTITY RFC8640 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8640.xml">
  <!ENTITY RFC8641 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8641.xml">
  <!ENTITY RFC8650 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8650.xml">
  <!ENTITY RFC9182 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9182.xml">
  <!ENTITY RFC8650 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8650.xml">   
  <!ENTITY RFC9291 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9291.xml"> 
  <!ENTITY RFC9522 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9522.xml"> 
  <!ENTITY RFC9543 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.9543.xml"> 

  <!ENTITY I-D.ietf-teas-nrp-scalability SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-nrp-scalability.xml">
  <!ENTITY I-D.ietf-ccamp-l1csm-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ccamp-l1csm-yang.xml">
  <!ENTITY I-D.ietf-teas-actn-pm-telemetry-autonomics SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-actn-pm-telemetry-autonomics.xml">
  <!ENTITY I-D.ietf-teas-actn-vn-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-actn-vn-yang.xml">
  <!ENTITY I-D.ietf-teas-enhanced-vpn SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-enhanced-vpn.xml">
  <!ENTITY I-D.ietf-teas-ietf-network-slice-nbi-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-ietf-network-slice-nbi-yang.xml">
  <!ENTITY I-D.ietf-teas-te-service-mapping-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-te-service-mapping-yang.xml">
  <!ENTITY I-D.ietf-teas-yang-te SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-yang-te.xml">
  <!ENTITY I-D.dhody-teas-ietf-network-slice-mapping SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.dhody-teas-ietf-network-slice-mapping.xml">
]>

<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-applicability-actn-slicing-08" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">

  <front>
    <title abbrev="ACTN and Network Slicing">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Network Slicing</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-applicability-actn-slicing-08"/>

    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>

    <author initials="J." surname="Drake" fullname="John Drake">
      <organization>Independent</organization>
      <address>
        <email>je_drake@yahoo.com</email>
      </address>
    </author>

    <author initials="H." surname="Zheng" fullname="Haomian Zheng">
      <organization>Huawei Technologies</organization>
      <address>
        <email>zhenghaomian@huawei.com</email>
      </address>
    </author>

    <author initials="A." surname="Farrel" fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>

    <date year="2024"/>

    <workgroup>TEAS Working Group</workgroup>

    <keyword>ACTN</keyword>

    <abstract>

      <t>Network abstraction is a technique that can be applied to a network
         domain to obtain a view of potential connectivity across the network
         by utilizing a set of policies to select network resources.</t>

      <t>Network slicing is an approach to network operations that builds on
         the concept of network abstraction to provide programmability,
         flexibility, and modularity.  It may use techniques such as Software
         Defined Networking (SDN) and Network Function Virtualization (NFV)
         to create multiple logical or virtual networks, each tailored for a
         set of services that share the same set of requirements.</t>

      <t>Abstraction and Control of Traffic Engineered Networks (ACTN) is
         described in RFC 8453.  It defines an SDN-based architecture that
         relies on the concept of network and service abstraction to detach
         network and service control from the underlying data plane.</t>

      <t>This document outlines the applicability of ACTN to network slicing
         in a Traffic Engineered (TE) network that utilizes IETF technologies.
         It also identifies the features of network slicing not currently
         within the scope of ACTN and indicates where ACTN might be extended.</t>

    </abstract>

  </front>

  <middle>

    <section anchor="INTRO" numbered="true" toc="default">
      <name>Introduction</name>

      <t>The principles of network resource separation are not new.  For
         years, the concepts of separated overlay and logical (virtual) networking
         have existed, allowing multiple services to be deployed over a single
         physical network comprised of a single or multiple layers.  However,
         several key aspects differentiate overlay and virtual
         networking from network slicing.</t>

      <t>A network slice is a virtual (that is, logical) network with its own
         network topology and a set of network resources that are used to provide
         connectivity that conforms to specific Service Level Agreements (SLAs) or
         a set of Service Level Objectives (SLOs).  The network resources used to
         realize a network slice belong to the network that is sliced.  The
         resources may be assigned and dedicated to an individual slice, or they
         may be shared with other slices enabling different degrees of service
         guarantee and providing different levels of isolation between the traffic
         in each slice.</t>

      <t><xref target="RFC9543" format="default"/> provides a
         definition for network slicing in the context of IETF network technologies.
         In particular, that document defines the term "IETF Network Slice" as the
         generic network slice concept applied to a network that uses IETF technologies.
         An IETF Network Slice could span multiple technologies (such as IP, MPLS, or
         optical) and multiple administrative domains.  The logical network that is an
         IETF Network Slice may be kept separate from other concurrent logical networks
         with independent control and management: each can be created or modified
         on demand.  Since this document is focused entirely on IETF technologies, it
         uses the term "network slice" as a more concise expression.  Further discussion
         on the topic of IETF Network Slices and details of how an IETF Network Slice
         service may be requested and realized as an IETF Network Slice can be found in
         <xref target="RFC9543" format="default"/>.</t>
         
      <t>Within this document, the terms "network slice", "network slice service", and 
         "network slice controller" refer to network slicing of networks built using 
         IETF technologies as described in <xref target="RFC9543" format="default"/>.</t>        

      <t>At one end of the spectrum, a Virtual Private Wire (VPW) or a Virtual
         Private Network (VPN) may be used to build a network slice.  In these
         cases, the network slices do not require the service provider to
         isolate network resources for the provision of the service - the
         service is "virtual".</t>

      <t>At the other end of the spectrum, there may be a detailed description
         of a complex network service that will meet the needs of a set of
         applications with connectivity and service function requirements that
         may include compute resources, storage capabilities, and access to
         content.  Such a service may be requested dynamically (that is,
         instantiated when an application needs it, and released when the
         application no longer needs it), and modified as the needs of the
         application change.  An example of such a type of service can be provided using an enhanced VPN
         described in <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/>.
         It is often based on Traffic Engineering (TE) constructs in the underlay network.</t>

      <t>Abstraction and Control of TE Networks (ACTN) <xref target="RFC8453" format="default"/>
         is a framework that facilitates the abstraction of underlying network
         resources to higher-layer applications and that allows network operators
         to create and supply virtual networks for their customers through the abstraction of
         the operators&apos; network resources.</t>

      <t>ACTN is a toolset capable of delivering network slice functionality.  This
         document outlines the application of ACTN and associated enabling technologies
         to provide network slicing in a network that utilizes IETF TE-based technologies.
         It describes how the ACTN functional components can be
         used to support model-driven partitioning of resources into variable-sized
         bandwidth units to facilitate network sharing and virtualization.  Furthermore,
         the use of model-based interfaces to dynamically request the instantiation of
         virtual networks can be extended to encompass requesting and instantiation of
         specific service functions (which may be both physical or virtual), and to
         partition network resources such as compute resources, storage capability, and
         access to content.  In Section 3, the document highlights how the ACTN approach
         might be extended to address the requirements of network slicing where the
         underlying network is TE-capable.</t>

      <section anchor="TERM" numbered="true" toc="default">
        <name>Terminology</name>

        <t>This document re-uses terminology from <xref target="RFC8453" format="default"/>,
           <xref target="RFC9543" format="default"/> and
           <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/>.</t>

        <dl newline="false" spacing="normal">

          <dt>Service Provider:</dt>
          <dd>See "Provider" in <xref target="RFC9543" format="default"/>.</dd>

          <dt>Consumer:</dt>
          <dd>See <xref target="RFC9543" format="default"/>.</dd>

          <dt>Service Functions (SFs):</dt>
          <dd>Components that provide specific functions within a network.  SFs are often combined
              in a specific sequence called a service function chain to deliver services
              <xref target="RFC7665" format="default"/>.</dd>

          <dt>Resource:</dt>
          <dd>Any feature, including connectivity, buffers, compute,
              storage, and content delivery that forms part of or can be accessed
              through a network.  Resources may be shared between users, applications,
              and clients, or they may be dedicated for use by a unique customer.</dd>

          <dt>Infrastructure Resources:</dt>
          <dd>The hardware and software for
              hosting and connecting SFs.  These resources may include computing
              hardware, storage capacity, network resources (e.g., links and
              switching/routing devices enabling network connectivity), and
              physical assets for radio access.</dd>

          <dt>Service Level Agreement (SLA):</dt>
          <dd>See <xref target="RFC9543" format="default"/>.</dd>

          <dt>Service Level Expectation (SLE):</dt>
          <dd>See <xref target="RFC9543" format="default"/>.</dd>

          <dt>Service Level Objective (SLO):</dt>
          <dd>See <xref target="RFC9543" format="default"/>.</dd>

          <dt>IETF Network Slice Service:</dt>
          <dd>See <xref target="RFC9543" format="default"/>.</dd>

        </dl>

      </section>

    </section>

    <section anchor="RfEQS" numbered="true" toc="default">
      <name>Overview of Key Requirements for Network Slicing</name>

      <t>According to Section 6.2 of <xref target="RFC9543" format="default"/>
         "Expressing Connectivity Intents", the customer expresses requirements
         for a particular network slice by specifying what is required rather than how the
         requirement is to be fulfilled.  That is, the customer&apos;s view of a network slice is an
         abstract one expressed as a network slice service request.</t>

      <t>The concept of network slicing is a key capability to serve a customer
         with a wide variety of different service needs expressed as SLOs/SLEs in terms of, e.g.,
         latency, reliability, capacity, and service function-specific capabilities.</t>

      <t>This section outlines the key capabilities required to realize network slicing
         in a TE-enabled IETF technology network.</t>

      <section anchor="RESSLIC" numbered="true" toc="default">
        <name>Resource Partitioning</name>

        <t>Network resources need to be allocated and dedicated for use by a specific
           network slice service, or they may be shared among multiple slice services.  This allows
           a flexible approach that can deliver a range of services by partitioning
           (that is, slicing) the available network resources to make them available
           to meet the customer&apos;s SLA.</t>
      </section>

      <section anchor="NFV" numbered="true" toc="default">
        <name>Network Topology Customization and Virtualization</name>

        <t>Network virtualization enables the creation of multiple virtual
           networks that are operationally decoupled from the underlying physical
           network and are run on top of it.  Slicing enables the creation of
           virtual networks as customer services.</t>
      </section>

      <section anchor="SVCISOL" numbered="true" toc="default">
        <name>Service Isolation</name>

        <t>A customer may request, through their SLA, that changes to the other services
           delivered by the service provider do not have any negative impact on the
           delivery of the service.  This quality is referred to as "isolation" in (Section 8 of
           <xref target="RFC9543" format="default"/>).</t>

        <t>Delivery of service isolation may be achieved in the underlying
           network by various forms of resource partitioning ranging from dedicated
           allocation of resources for a specific slice, to sharing of resources
           with safeguards.</t>

        <t>Although multiple network slices may utilize resources from a single underlying
           network, isolation should be understood in terms of the following three
           categorizations.</t>

        <ul spacing="normal">

          <li>Performance isolation requires that service delivery for one network
              slice does not adversely impact congestion or performance levels
              perceived by the users of other slices.</li>

          <li>Security isolation means that attacks or faults occurring in one slice
              do not impact on other slices.  Moreover, the security functions supporting
              each slice must operate independently so that an attack or misconfiguration
              of security in one slice will not prevent proper security function in the
              other slices.  Further, privacy concerns require that traffic from one
              slice is not delivered to an endpoint in another slice, and that it should
              not be possible to determine the nature or characteristics of a slice from
              any external point.</li>

          <li>Management isolation means that each slice must be independently viewed,
              utilized, and managed as a separate network.  Furthermore, it should be
              possible to prevent the operator of one slice from being able to control,
              view, or detect any aspect of any other network slice.</li>
        </ul>

      </section>

      <section anchor="CNO" numbered="true" toc="default">
        <name>Control and Orchestration</name>

        <t>An orchestrator is used to coordinate disparate processes and resources for creating, managing, and deploying the
           network slicing service in a network. The following aspects of orchestration should be considered:</t>

        <ul spacing="normal">

          <li>Multi-domain Orchestration: Managing connectivity to set up a network
              slice across multiple administrative domains.</li>

          <li>End-to-end Orchestration: Combining resources for an end-to-end
              service (e.g., underlay connectivity with firewalling, and
              guaranteed bandwidth with minimum delay).</li>

        </ul>

      </section>

    </section>

    <section anchor="ACTN" numbered="true" toc="default">
      <name>Abstraction and Control of Traffic Engineered (TE) Networks (ACTN): Overview of Key Components</name>

      <t>ACTN is designed to facilitate end-to-end connectivity and provides virtual connectivity services
         (such as virtual links and virtual networks) to the user.  The ACTN framework
         <xref target="RFC8453" format="default"/> introduces three functional components and two interfaces:</t>

      <ul spacing="normal">
        <li>Customer Network Controller (CNC)</li>
        <li>Multi-domain Service Coordinator (MDSC)</li>
        <li>Provisioning Network Controller (PNC)</li>
        <li>CNC-MDSC Interface (CMI)</li>
        <li>MDSC-PNC Interface (MPI)</li>
      </ul>

      <t>RFC 8453 also highlights how:</t>

      <ul spacing="normal">

        <li>Abstraction of the underlying network resources is provided to
            higher-layer applications and customers.</li>

        <li>Virtualization is achieved by selecting resources according to
            criteria derived from the details and requirements of the customer,
            application, or service.</li>

        <li>Creation of a virtualized environment is performed to allow
            operators to view and control multi-domain networks as a single
            virtualized network.</li>

        <li>A network is presented to a customer as a single virtual network
            via open and programmable interfaces.</li>
      </ul>

      <t>The ACTN-managed infrastructure consists of traffic engineered network
         resources.  The concept of traffic engineering is broad: it describes the
         planning and operation of networks using a method of reserving and
         partitioning of network resources in order to facilitate traffic delivery
         across a network (see <xref target="RFC9522" format="default"/> for more
         details).</t>
         
      <t>In the context of ACTN, traffic engineered network resources may include 
         Statistical Packet Bandwidth, which refers to using statistical methods
         instead of assigning fixed bandwidth. This approach allocates bandwidth 
         based on how data is flowing and statistical multiplexing. ACTN traffic 
         engineered network resources also consider the physical parts of the 
         network, such as optical channels and time slots, which facilitates the 
         best use of the network's resources by matching bandwidth with real-time 
         traffic demands. </t>

      <t>Therefore, an ACTN network may be "sliced", with each customer being given a different
         partial and abstracted topology view of the physical underlay network.</t>

      <section anchor="ACTNVN" numbered="true" toc="default">
        <name>ACTN Virtual Network as a Network Slice</name>

        <t>To support multiple customers, each with its own view and control
           of a virtual network constructed using an underlay network, a service provider
           needs to partition the network resources to create network slices
           assigned to each customer.</t>

        <t>An ACTN Virtual Network (VN) is a customer view of a slice of the
           ACTN-managed infrastructure.  It is a network slice that is presented
           to the customer by the ACTN provider as a set of abstracted resources.
           See <xref target="I-D.ietf-teas-actn-vn-yang" format="default"/> for a detailed description
           of ACTN VNs and an overview of how various different types of YANG models
           are applicable to the ACTN framework.</t>

        <t>Depending on the agreement between a customer and a provider, various VN
           operations are possible:</t>

        <ul spacing="normal">

          <li>Network Slice Creation: A VN could be pre-configured and created
              through static configuration or through a dynamic request and negotiation between 
              a customer and service provider.  The VN must meet the network slice
              requirements specified in the SLA to satisfy the customers
              objectives.</li>

          <li>Network Slice Operations: The VN may be modified or deleted based
              on direct customer requests. Also, the way that the VN is engineered can be
              adjusted by the operator to continuously ensure that the delivered
              service complies with the requested SLA. The customer can further act upon the VN to manage their
              traffic flows across the network slice.</li>

          <li>Network Slice View: A VN topology is viewed from the customer&apos;s
              perspective.  This may be the entire VN topology, or a collection of tunnels that
              are expressed as customer endpoints, access links, intra-domain paths and
              inter-domain links.</li>

        </ul>

        <t>Section 3, "Virtual Network Primitives", in <xref target="RFC8454" format="default"/>
           describes a set of functional primitives that support these different ACTN VN operations.</t>

      </section>

      <section anchor="ACTNagg" numbered="true" toc="default">
        <name>ACTN Virtual Network and Scaling Network Slices</name>

        <t>If the service provider must manage and maintain state in the core of the network
           for every network slice, then this will quickly limit the number of customer services that can be
           supported.</t>

        <t>The importance of scalability for network slices is discussed in
           <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/> and further in
           <xref target="I-D.ietf-teas-nrp-scalability" format="default"/>.  That work notes the
           importance of collecting network slices or their composite connectivity constructs into groups
           that require similar treatment in the network before realizing those groups in the network.</t>

        <t>The same consideration applies to ACTN VNs.  But fortunately, ACTN VNs may be
           arranged hierarchically by recursing the MDSCs so that one VN is realized over
           another VN.  This allows the VNs presented to the customer to be aggregated
           before they are instantiated in the physical network.</t>

      </section>

      <section anchor="ACTNmgmt" numbered="true" toc="default">
        <name>Management Components for ACTN and Network Slicing</name>

        <t>The ACTN management components (CNC, MDSC, and PNC) and interfaces (CMI and MPI) are
           introduced in <xref target="ACTN" format="default"/> and described in detail in <xref target="RFC8453" format="default"/>.
           The management components for network slicing are described in <xref target="RFC9543" format="default"/>
           and are known as the customer orchestration system, the IETF Network Slice Controller (NSC), and the network controller.  The network
           slicing management components are separated by the Network Slice Service Interface
           and the Network Configuration Interface, modeling the architecture described in <xref target="RFC8309" format="default"/>.</t>

        <t>The mapping between network slicing management components and ACTN management components is
           presented visually in <xref target="MgmtFig" format="default"/> and provides a reference for
           understanding the material in <xref target="ACTNEG" format="default"/> and <xref target="YANG" format="default"/>.</t>

        <figure anchor="MgmtFig">
          <name>Mapping Between IETF Network Slice and ACTN Management Components</name>
          <artwork name="" type="" align="left" alt="">
            <![CDATA[
    +-------------------------------------+   |    +---------------+
    |                                     |   |    |    Service    |
    |    Consumer orchestration system    | =====> | Orchestrator  |
    |                                     |   |    |      (1)      |
    +-------------------------------------+   |    +---------------+
                         ^                    |            ^
      IETF Network Slice |                    |            | XMI (2)
       Service Interface |                    |            |
                         v                    |            v
    +-------------------------------------+   |    +---------------+
    |                                     |   |    |     MDSC      |
    | IETF Network Slice Controller (NSC) | =====> |   (Network    |
    |                                     |   |    | Orchestrator) |
    +-------------------------------------+   |    +---------------+
                         ^                    |            ^
           Network       |                    |            |
           Configuration |                    |            | MPI
           Interface     |                    |            |
                         v                    |            v
    +-------------------------------------+   |    +---------------+
    |         Network Controllers         | =====> |   PNC/MSDCs   |
    +-------------------------------------+   |    +---------------+
            ]]>
          </artwork>
        </figure>

        <t>Note 1 - The Service Orchestrator may also contain some MDSC
           service-related functions, as described in section
           4.2 of <xref target="RFC8453" />.</t>

        <t>Note 2 - The Service Orchestrator-to-MDSC Interface (XMI) is an interface 
           between two MDSC functional elements encompassing different 
           MDSC service-related functions which is not defined 
           in <xref target="RFC8453" />.</t>

        <t>Note 2 - The Service Orchestrator-to-MDSC Interface (XMI) is an interface
           between two MDSC functional elements encompassing different MDSC 
           service-related functions which is not defined in <xref target="RFC8453" />. 
           Depending on the function being delivered, the XMI might be realised 
           by the Layer 2 VPN Network Management YANG model <xref target="RFC9291" /> 
           or the Layer 3 VPN Network Management YANG model <xref target="RFC9182" />.</t>

      </section>

      <section anchor="ACTNEG" numbered="true" toc="default">
        <name>Examples of ACTN Delivering Network Slice Services</name>

        <t>The following examples build on the ACTN framework to provide control, management,
           and orchestration for the network slice life-cycle.  These network slices utilize common
           physical infrastructure, and meet specific service-level requirements.</t>

        <t>Three examples are shown.  Each uses ACTN to achieve a different network slicing
           scenario.  All three scenarios can be scaled up in capacity or be subject to topology
           changes as well as changes in customer requirements.</t>

        <section anchor="VPL" numbered="true" toc="default">
          <name>ACTN Used for Virtual Private Line</name>

          <t>In the example shown in <xref target="VPLFig" format="default"/>, ACTN provides virtual connections
             between multiple customer locations (sites accessed through Customer Edge nodes - CEs).
             The service is requested by the customer (via CNC-A) and delivered as a Virtual Private
             Line (VPL) service.  The characteristics of this model include the following benefits.</t>

          <ul spacing="normal">

            <li>Programmable: The service setup and operation are managed by the network provider via APIs.</li>

            <li>Virtual: The private line connectivity is provided from Site A to Site C (VPL1)
                 and from Site B to Site C (VPL2) across the ACTN-managed physical network.</li>

            <li>Flexible: On-demand adjustments to the connectivity and bandwidth are available
                 according to the customer&apos;s requests, which may be automated.</li>

          </ul>

          <t>In terms of the network slicing concept defined in <xref target="RFC9543" format="default"/>,
             in this example the customer requests a single network slice with two pairs of point-to-point connectivity constructs between
             the service demarcation points CE1 and CE3, and CE2 and CE3 with each pair comprising one connectivity construct in each
             direction.</t>

          <figure anchor="VPLFig">
            <name>Virtual Private Line Model</name>
            <artwork name="" type="" align="left" alt="">
              <![CDATA[
                     (Customer VPL Request)

      Boundary                  :
      Between  . . . . . . . . .:. . . . . . . . . . .
      Customer &                :
      Network Operator          : CMI
                                :
                 +-----------------------------+
                 | MDSC (Service Orchestrator) |
                 +-----------------------------+
      Boundary                  :
      Between  . . . . . . . . .:. . . . . . . . . . .
      Consumer &                :
      Network Provider          : XMI
                                :
                 +-----------------------------+
                 | MDSC (Network Orchestrator) |
                 +-----------------------------+
                                :
                                : MPI
                                :
                              -----
                             | PNC |
            Site A          ( ----- )           Site B
           +-----+         (         )         +-----+
           | CE1 |========(  Physical )========| CE2 |
           +-----\         ( Network )         /-----+
                  \         (_______)         /
                   \            ||           /
                    \           ||          /
                VPL1 \          ||         / VPL2
                      \         ||        /
                       \        ||       /
                        \       ||      /
                         \-------------/
                         |     CE3     |
                         +-------------+
                              Site C

      Key:   ... ACTN control connectivity
             === Physical connectivity
             --- Logical connectivity
              ]]>
            </artwork>
          </figure>

        </section>

        <section anchor="VPN" numbered="true" toc="default">
          <name>ACTN Used for VPN Delivery Model</name>

          <t>In the example shown in <xref target="VPNFig" format="default"/>, ACTN provides VPN
             connectivity between two sites across three physical networks.  The
             users of the two sites express the requirements for the VPN.
             The request is directed to the CNC, and the CNC interacts with the network
             provider&apos;s MDSC. The main characteristics of this model are as follows.</t>

          <ul spacing="normal">

            <li>Provides edge-to-edge VPN multi-access connectivity.</li>
            <li>Most of the function is managed by the network provider,
                with some flexibility delegated to the customer-managed CNC.</li>

          </ul>

          <t>In terms of the network slicing concept defined in <xref target="RFC9543" format="default"/>,
             in this example, the customer requests a single network slice with a pair of point-to-point connectivity constructs
             (one in each direction) between the service demarcation points at site A and site B.  The customer is unaware that
             the service is delivered over multiple physical networks.</t>

          <figure anchor="VPNFig">
            <name>VPN Model</name>
            <artwork name="" type="" align="left" alt="">
              <![CDATA[
                   +--------------+   +--------------+
                   |     CNC-A    |   |     CNC-B    |
                   +--------------+   +--------------+
                               :         :
    Boundary                   :         :
    Between  . . . . . . . . ..:. . . . . . . . . . .
    Consumer &                 :         :
    Network Operator           : CMI-A   : CMI-B
                               :         :
                     +-----------------------------+
                     | MDSC (Service Orchestrator) |
                     +-----------------------------+
    Boundary                        :
    Between   . . . . . . . . . . . : . . . . . . . . . .
    Consumer &                      :
    Network Provider                : XMI
                                    :
                     +-----------------------------+
                     | MDSC (Network Orchestrator) |
                     +-----------------------------+
                     :              :              :
                     : MPI          : MPI          : MPI
                     :              :              :
                 +-------+      +-------+      +-------+
                 |  PNC  |      |  PNC  |      |  PNC  |
                 +-------+      +-------+      +-------+
                     :              :              :
                     :              :              :
      ____     ---------      ---------      ---------     ____
     <    >   (         )    (         )    (         )   <    >
     <Site>==( Physical  )==( Physical  )==( Physical  )==<Site>
     < A  >   ( Network )    ( Network )    ( Network )   < B  >
     <    >    (       )      (       )      (       )    <    >
     <    >     -------        -------        -------     <    >
     <    >-----------------------------------------------<    >
     <____>                                               <____>

    Key:   ... ACTN control connectivity
           === Physical connectivity
           --- Logical connectivity
              ]]>
            </artwork>
          </figure>

        </section>

        <section anchor="VCN" numbered="true" toc="default">
          <name>ACTN Used to Deliver a Virtual Customer Network</name>

          <t>In the example shown in <xref target="SliceFig" format="default"/>, ACTN provides a
             virtual network to the customer.  This virtual network is managed by the
             customer.  The figure shows two virtual networks (Network Slice 1 and
             Network Slice 2) each created for different customers under the care of 
             different CNCs.  There are two physical networks controlled by separate
             PNCs.  Network Slice 2 is built using resources from just one physical
             network, while Network Slice 1 is constructed using resources from both
             physical networks.</t>

          <t>The characteristics of this model include the following.</t>

          <ul spacing="normal">

            <li>The MDSC provides the topology to the customer so that the customer
                can control their network slice to fit their needs.</li>

            <li>Customers may interact with their assigned network slices directly.
                The customer may implement their own network control methods and
                traffic classification, mapping, prioritization, and manage their
                own addressing schemes.</li>

            <li>Customers may further slice their virtual networks so that this
                becomes a recursive model.</li>

            <li>Service isolation can be provided through selection of physical
                networking resources through a combination of efforts of the MSDC
                and PNC.</li>

            <li>The network slice may include nodes with specific capabilities.  These
                can be delivered as Physical Network Functions (PNFs) or Virtual Network
                Functions (VNFs).</li>

          </ul>

          <figure anchor="SliceFig">
            <name>Network Slicing</name>
            <artwork name="" type="" align="left" alt="">
              <![CDATA[
               +--------------+                  ___________
               |    Service   |                 (           )
               | Orchestrator |---------------->(  Network  )
               +--------------+                 (  Slice 2  )
                  ^                             (___________)
                  |                           ___________  ^
                  |  +--------------+        (           ) :
                  |  |    Service   |------->(  Network  ) :
                  |  | Orchestrator |        (  Slice 1  ) :
                  |  +--------------+        (___________) :
                  |       ^                      ^    ^    :
      Boundary    |       |                      :    :    :
      Between    .|. . . .|. . . . . . . . . . . : . .:. . : . . .
      Consumer &  |       |                      :    :    :
      Network     |       |                      :    :    :
      Provider    v       v                      :    :    :
               +---------------+                 :    :....:
               |     MDSC      |                 :         :
               |   (Network    |                 :         :
               | Orchestrator) |                 :         :
               +---------------+                 :         :
                        ^                  ------^--       :
                        |                 (         )      :
                        v                (  Physical )     :
                    +-------+             ( Network )      :
                    |  PNC  |<------------>(       )    ---^-----
                  +-------  |               -------    (         )
                  |  PNC  |-+                         (  Physical )
                  |       |<-------------------------->( Network )
                  +-------+                             (       )
                                                         -------

      Key: --- ACTN control connection
           ... Virtualization/abstraction through slicing
              ]]>
            </artwork>
          </figure>

        </section>

      </section>

    </section>

    <section anchor="YANG" numbered="true" toc="default">
      <name>YANG Models</name>

      <section anchor="MAP" numbered="true" toc="default">
        <name>Network Slice Service Mapping from TE to ACTN VN Models</name>

        <t>The TE-service mapping model <xref target="I-D.ietf-teas-te-service-mapping-yang" format="default"/> creates
           a binding relationship across a L3VPN Service Model (L3SM) <xref target="RFC8299" format="default"/>,
           L2VPN Service Model (L2SM) <xref target="RFC8466" format="default"/>, and TE Tunnel model <xref target="I-D.ietf-teas-yang-te" format="default"/>,
           via the generic ACTN Virtual Network (VN) model <xref target="I-D.ietf-teas-actn-vn-yang" format="default"/>.</t>

        <t>When necessary, it must be possible to map between a slice service request and an ACTN VN model. The
           ACTN VN model is a generic virtual network service model that allows customers to specify a VN that meets
           the customer&apos;s service objectives with various constraints, which could be included in the initial request,
           and how the service is delivered. Therefore, a request for a network slice service may be mapped directly to a request for a VN.</t>

        <t>The TE-service mapping model <xref target="I-D.ietf-teas-te-service-mapping-yang" format="default"/> binds
           the L3SM with TE-specific parameters.  This binding facilitates seamless
           service operation and enables visibility of the underlay TE network.  The TE-service model developed
           in that document can also be extended to support other services, including L2SM, and the Layer 1 Connectivity
           Service Model (L1CSM) <xref target="I-D.ietf-ccamp-l1csm-yang" format="default"/>
           L1CSM network service models.</t>

        <t><xref target="TEMapFig" format="default"/> shows the relationship between the YANG models discussed above.</t>

        <figure anchor="TEMapFig">
          <name>Relationships Between YANG Models</name>
          <artwork name="" type="" align="left" alt="">
            <![CDATA[
    ---------------            -----------
   |    L3SM       |<=========|           |            -----------
    ---------------   augments|           |..........>|  ACTN VN  |
    ---------------           | Augmented |references  -----------
   |    L2SM       |<=========| Service   |
    ---------------   augments| Model     |            -----------
    ---------------           |           |..........>|  TE-topo  |
   |    L1CSM      |<=========|           |references  -----------
    ---------------   augments|           |
    ---------------           |           |            -----------
   | TE & Service  |--------->|           |..........>| TE-tunnel |
   | Mapping Types |  import   ----------- references  -----------
    ---------------
            ]]>
          </artwork>
        </figure>

        <t>Work is still needed to define YANG models to help map network slice services to Traffic Engineering (TE) models. 
           For example, <xref target="I-D.dhody-teas-ietf-network-slice-mapping" format="default"/> shows 
           how the Virtual Network (VN) model and the TE Tunnel model can support network slice services.</t>

      </section>

      <section anchor="NBI" numbered="true" toc="default">
        <name>Interfaces and YANG Models</name>

        <t><xref target="NBIFig" format="default"/> shows the two ACTN components (MDSC and PNC) and
           one ACTN interface (MPI), as listed in <xref target="ACTN" format="default"/>.  The
           figure also shows the Device Configuration Interface between the
           PNC and the devices in the physical network.  That interface
           might be used to install state on every device in the network,
           or might instruct a "head-end" node when a control plane is used
           within the physical network.  In the context of <xref target="RFC8309" format="default"/>,
           the Device Configuration Interface uses one or more device configuration models.</t>

        <t>Figure 6 also shows the Network Slice Service Interface.  This interface
           allows a customer to make requests for delivery of the
           service, and it facilitates the customer modifying and monitoring the
           service.  In the context of <xref target="RFC8309" format="default"/>, this is
           a customer service interface and uses a service model.</t>

        <t>When an ACTN system is used to manage the delivery of network
           slices, a network slice resource model is needed.  This model
           will be used for instantiation, operation, and monitoring of
           network and function resource slices.  The YANG model defined
           in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang" format="default"/> provides a 
           suitable basis for requesting, controlling, and deletion, of a Network Slice Service.</t>

        <figure anchor="NBIFig">
          <name>The YANG Interfaces in Context</name>
          <artwork name="" type="" align="left" alt="">
            <![CDATA[
                  +----------+
                  | Consumer |
                  +----------+
                        :
                 .......:....... Network Slice Service Interface
                        :
                +---------------+
                |      MDSC     |
                +---------------+
                        :
                 .......:....... MPI
                        :
                    +-------+
                    |  PNC  |
                    +-------+
                        :
                 .......:....... Device Configuration Interface
                        :
                    ----------
                   (          )
                  (  Physical  )
                   ( Network  )
                    (________)
            ]]>
          </artwork>
        </figure>

      </section>

      <section anchor="Telemetry" numbered="true" toc="default">
        <name>ACTN VN Telemetry</name>

        <t>The ACTN VN telemetry model <xref target="I-D.ietf-teas-actn-pm-telemetry-autonomics" format="default"/>
           provides a way for a customer to define performance monitoring relevant for the VN/network slice
           via the NETCONF subscription mechanisms <xref target="RFC8639" format="default"/>, <xref target="RFC8640" format="default"/>,
           or using the equivalent mechanisms in RESTCONF <xref target="RFC8641" format="default"/>, <xref target="RFC8650" format="default"/>.</t>

        <t>Key characteristics of <xref target="I-D.ietf-teas-actn-pm-telemetry-autonomics" format="default"/> include the following:</t>

        <ul spacing="normal">

          <li>An ability to provide scalable VN-level telemetry aggregation
              based on a customer subscription model for key performance
              parameters defined by the customer.</li>

          <li>An ability to facilitate proactive re-optimization and
              reconfiguration of VNs/network slices based on
              autonomic network traffic engineering scaling configuration
              mechanisms.</li>

        </ul>

      </section>

    </section>

    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>

        <t>This document makes no requests for action by IANA.</t>

    </section>

    <section anchor="SEC" numbered="true" toc="default">
      <name>Security Considerations</name>

      <t>Network slicing involves the control of network resources in order
         to meet the service requirements of customers.  In some deployment
         models using ACTN, the customer may directly request a modification in
         the behaviour of resources owned and operated by a service provider.
         Such changes could significantly affect the service provider's
         ability to provide services to other customers.  Furthermore, the
         resources allocated for or consumed by a customer will typically be
         billable by the service provider.</t>

      <t>Therefore, it is crucial that the mechanisms used in any network
         slicing system allow for authentication of requests, security of
         those requests, and tracking of resource allocations.</t>

      <t>It should also be noted that while the partitioning or slicing of
         resources is virtual, as mentioned in <xref target="SVCISOL" format="default"/> the
         customers expect and require that there is no risk of data leakage
         from one slice to another, and no transfer of knowledge of the
         structure or even existence of other slices.  Further, in some service
         requests, there is an expectation that changes to
         one slice (under the control of one customer) should not have
         detrimental effects on the operation of other slices (whether
         under control of different or the same customers) even within limits
         allowed within the SLA.  Thus, slices are assumed to be private and
         to provide the appearance of genuine physical connectivity.</t>

      <t>Some service provider's may offer secure network slices as a service.
         Such services may claim to include edge-to-edge encryption for the
         customer&apos;s traffic.  However, a customer should take full
         responsibility for the privacy and integrity of their traffic and
         should carefully consider using their own edge-to-edge encryption.</t>
         
      <t>Further security considerations and recommendations may be found in Section 9 of
         <xref target="RFC8453" format="default"/> and Section 10 of <xref target="RFC9543" format="default"/>, 
         with the latter document providing additional privacy considerations in Section 11.</t>         
      
      <t>ACTN operates using the NETCONF <xref target="RFC6241" format="default"/> or RESTCONF
         <xref target="RFC8040" format="default"/> protocols and assumes the security
         characteristics of those protocols.  Deployment models for ACTN should
         fully explore the authentication and other security aspects before
         networks start to carry live traffic.</t>

    </section>

    <section anchor="ACK" numbered="true" toc="default">
      <name>Acknowledgements</name>

      <t>Thanks to Italo Busi, Qin Wu, Andy Jones, Ramon Casellas, Gert Grammel, Joe Clarke, Peter Yee, Alvaro Retana, Éric Vyncke, Linda Dunbar and Kiran
         Makhijani for their reviews, insight, and useful discussions about network slicing.</t>

      <t>This work is partially supported by the European Commission under Horizon 2020 grant agreement number 101015857
         Secured autonomic traffic management for a Tera of SDN flows (Teraflow).</t>
    </section>

    <section anchor="CONT" numbered="true" toc="default">
      <name>Contributors</name>

      <t>The following people contributed text to this document.</t>
      <artwork name="" type="" align="left" alt="">
        <![CDATA[
      Young Lee
      Email: younglee.tx@gmail.com

      Mohamed Boucadair
      Email: mohamed.boucadair@orange.com

      Sergio Belotti
      Email: sergio.belotti@nokia.com

      Daniele Ceccarelli
      Email: dceccare@cisco.com
        ]]>
      </artwork>

    </section>

  </middle>

  <back>

    <references>
    
      <name>Normative References</name>

      &RFC8299;
      &RFC8466;      
      &RFC8453;
      &RFC9543;
      &I-D.ietf-teas-enhanced-vpn;
      &I-D.ietf-teas-actn-pm-telemetry-autonomics;
      &I-D.ietf-teas-actn-vn-yang;
      &I-D.ietf-teas-ietf-network-slice-nbi-yang;
      &I-D.ietf-teas-te-service-mapping-yang;
      &I-D.ietf-teas-yang-te;

    </references>

    <references>
    
      <name>Informative References</name>

      &RFC6241;
      &RFC7665;
      &RFC8040;
      &RFC8309;
      &RFC8454;
      &RFC8639;
      &RFC8640;
      &RFC8641;
      &RFC8650;
      &RFC9182;  
      &RFC9291;
      &RFC9522;
      &I-D.ietf-teas-nrp-scalability;
      &I-D.ietf-ccamp-l1csm-yang;
      &I-D.dhody-teas-ietf-network-slice-mapping;

    </references>

  </back>

</rfc>
