<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.29 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-srld-teas-5g-slicing-07" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A  Realization of IETF Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-srld-teas-5g-slicing-07"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2023" month="April" day="19"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <t>5G slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks. This feature covers slicing
   requirements for all mobile domains, including the Radio Access
   Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a basic IETF Network Slice realization model
   in IP/MPLS networks with a focus on the Transport Network fulfilling
   5G slicing connectivity requirements. This realization model reuses many building blocks currently commonly used
   in service provider networks.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> defines a framework for
   network slicing in the context of networks built using IETF
   technologies.  The IETF network slicing framework introduces the
   concept of a Network Resource Partition (NRP), which is simply a
   collection of resources identified in the underlay network.  There
   could be multiple realizations of IETF Network Slice and
   NRP concepts, where each realization might be optimized for the
   different network slicing use cases.</t>
      <t>This document describes an IETF Network Slice realization model
   in IP/MPLS networks, using a single NRP and with a focus on
   fulfilling 5G slicing connectivity requirements.
   This IETF Network Slice realization model leverages many building blocks currently
   commonly used in service provider networks.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-intro"/> for readers' convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more
   details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="g-network-slicing-integration-in-transport-networks">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="scope-of-the-transport-network">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-intro"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The 3GPP does not define the Transport Network and its integration in RAN and CN: it is a non-3GPP managed system that interconnects Network Functions (NFs). Practically, the interconnection (i.e., the TN) may not map with a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a NF instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a Wide Area Network (WAN) (e.g., MPLS-VPN service). The TN can be interpreted as an abstraction representing an end-to-end connectivity based on three distinct IP/MPLS domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where IETF Network Slice applies.</t>
        <figure anchor="fig-1">
          <name>Transport Network vs RAN and CN</name>
          <artwork align="center"><![CDATA[
     ┌──────────────────────────────────┐
  ┌──│         5G RAN or CN             │──┐
  │  └──────────────────────────────────┘  │
  │                                        │
  ▼                                        ▼
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  ┌──┐
│NF├ ─ ─      Transport Network        ├ ┤NF│
└──┘  └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  └──┘
          │             │            │
          ▼             ▼            ▼

  ┌───Data Center──┐ ┌─MPLS-VPN─┐  ┌─Public─┐
  │                │ │ Backbone │  │ Cloud  │
  │   ┌───┐┌───┐   │┌┴─┐      ┌─┴┐┌┴─┐      │
  │   └───┘└───┘   │└┬─┘      └─┬┘└┬─┘      │
  │┌──┐┌──┐┌──┐┌──┐│┌┴─┐      ┌─┴┐ │        │
  │└──┘└──┘└──┘└──┘│└┬─┘      └─┬┘ │        │
  └────────────────┘ └──────────┘  └────────┘
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs.  End-to-End 5G Network Slicing (see <xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
The objective of 5G Network Slicing is to provide a subset of
 resources of the whole 5G infrastructure to some users/customers,
 applications, or Public Land Mobile Networks (PLMNs) (e.g.,
 RAN sharing). These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
In this document, the term TN Slice is used in this document to
 describe the slice in the Transport Network domain of the overall 5G
 architecture, composed from RAN, TN, and CN domains.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing
 Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, shared TN resources could be provided in the backhaul, and dedicated TN resources could be provided in the midhaul.  </t>
            <t>
There are different options to implement TN slices based upon
 tools, such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).  </t>
            <t>
A 5G network slicing architecture
 should integrate TN Slicing for an optimal control of SLAs, however, it is
 possible to implement 5G Network Slicing without TN
 Slicing, as explained in section <contact fullname="#sec-mapping"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: Customer Sites and Provider Network</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/pe-ce-ac.txt}
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the End-to-End 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt>Customer Sites:</dt>
          <dd>
            <t>A customer manages and deploys 5G Network Functions (RAN and CN) in Customer Sites. On top of 5G Network Functions (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, switches, or VPC Gateways) within a Customer Site. A Customer Site can be either a physical or a virtual location. Examples of Customer Sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within provider or colocation service. The Orchestration of the TN within Customer Sites relies upon a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). The detail of these is out of the scope of this document.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting Customer Sites. The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect Customer Sites. We assume in this document that the provider Network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit. Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G Network Function (i.e., an element of 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)). This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data model terminology (e.g., <xref target="RFC9182"/>), we assume that an AC is configured on a “bearer”, which represents the underlying connectivity. Examples of ACs are VLANs (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., Section 3.4.3 of <xref target="RFC4664"/>). This approach consolidates a definition of CE/PE/AC that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of such a distribution is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed. An example of a distributed PE is the “Managed CE service”. For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
{::include ./drawings/distributed-pe-ce.txt}
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both a single and a distributed devices.</t>
        </section>
        <section anchor="attachment-circuits-for-inter-as-options-bc">
          <name>Attachment Circuits for Inter-AS Options B/C</name>
          <t>In some cases, a CE connects to the provider network using Inter-AS Option B or C as defined in <xref section="10" sectionFormat="of" target="RFC4364"/> with the use of MPLS or SRv6 data planes. An example of such as an AC is depicted in <xref target="_figure-51"/>. The configuration of VRFs together with control plane identifiers, such as Route Targets (RTs) and Route Distinguishers (RDs), happens on the CE. This is a source of confusion since these configurations are typically enforced on PE devices. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE (e.g., in  Inter-AS Option C, the Autonomous System Border Router (ASBR) and a remote PE in the provider network with VRF configuration form a distributed PE).</t>
          <figure anchor="_figure-51">
            <name>MPLS or SRv6 Attachment Circuit</name>
            <artwork align="center"><![CDATA[
{::include ./drawings/mpls-ac.txt}
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters (e.g., the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies)). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although we may consider that the AC stitching logic happens internally within the device. The provider manages the AC between the CE and the PE.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="end-to-end-5g-slice-orchestration-architecture">
          <name>End-to-End 5G Slice Orchestration Architecture</name>
          <t><xref target="_figure-orch"/> depicts a global framework for the orchestration of an end-to-end 5G Slice. An end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating the end-to-end 5G Slice. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G Slice spans RAN, CN, and TN. As mentioned in <xref target="TS-28.530"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <ul spacing="normal">
            <li>Provider Network Orchestration domain: as defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>, the provider relies on an IETF Network Slice Controller (NSC) to manage and orchestrate IETF Network Slices in the provider network. This framework permits to manage connectivity together with SLOs. Ultimately, the 5G NSO interfaces with an NSC for the management of IETF Network Slices using IETF APIs and data models.</li>
            <li>Customer Site Orchestration domain: the Orchestration of TN elements of the Customer Sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this section does not involve the Transport Network Orchestration.</li>
          </ul>
          <t>A TN Slice relies upon a data path that can involve both the provider and customer TN domains. Therefore, a TN Slice has broader scope than an IETF Network Slice since the latter applies to the provider network only. More details are provided in the next section.</t>
          <figure anchor="_figure-orch">
            <name>End-to-end 5G Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
{::include ./drawings/tn-orchestration.txt}
]]></artwork>
          </figure>
        </section>
        <section anchor="transport-network-sections-and-network-slice-instantiation">
          <name>Transport Network Sections and Network Slice Instantiation</name>
          <t>Based on the reference design, the data path between NFs can be decomposed into three main types of sections. <xref target="fig-end-to-end"/> depicts the different sections:</t>
          <ul spacing="normal">
            <li>Customer Site: Either connects two NFs located in the same Customer Site (e.g., NF1-NF2) or it connects a NF to a CE (e.g., NF1-CE). This section may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE. The realization of this section is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration (e.g., Fabric Manager, Element Management System, or VIM). The realization of this section does not involve the Transport Network Orchestration.</li>
            <li>Provider Network: Represents the connectivity between two PEs (e.g., PE1-PE2).The realization of this section is controlled by an IETF NSC.</li>
            <li>Attachment Circuit: Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this section relies partially upon an  IETF NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</li>
          </ul>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an IETF Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new NSI may rely on a partial or full pre-provisioned section (e.g., an NSI may rely on an existing AC). Notwithstanding, a framework for the automation of both sections is proposed in this document. The Customer Site section is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the Customer Site infrastructure is usually over-provisioned with short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the NSI between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
{::include ./drawings/tn-sections.txt}
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the provider network orchestration (e.g., NSC).  More precisely, a PE and a CE connected via an AC must be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP AS number). Hence, the realization of this
interconnection is technology-specific and requires a coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, we assume that this coordination is based upon standard YANG data models and APIs (more details in further sections).</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface. This document proposes to rely upon IETF service data models: the IETF Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.boro-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of TN Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
{::include ./drawings/ac-api-synch.txt}
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>5G Slice to IETF Network Slice Mapping</name>
        <t>There are multiple options to map a 5G network slice to IETF Network
   Slices:</t>
        <ul spacing="normal">
          <li>1 to N:
 A single 5G Network Slice can map to multiple IETF Network
 Slices (1 to N).  One example of such a case is the separation of
 the 5G Control Plane and User Plane: this use case is represented
 in <xref target="_figure-5"/> where a slice (eMBB) is deployed with a separation of
 User Plane and Control Plane at the TN.</li>
          <li>N to 1:
 Multiple 5G Network Slices may rely upon the same IETF Network
 Slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</li>
          <li>N to M:
 The 5G to IETF Network Slice mapping combines both
 approaches with a mix of shared and dedicated associations.</li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (IETF Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐

│                        5G Slice eMBB                          │

│            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            │
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐
│ │CU-UP├───────   IETF Network Slice UP_eMBB    ───────┤ UPF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘
│            │                                     │            │
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐
│ │CU-CP├───────      IETF Network Slice CP      ───────┤ AMF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘
└ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ┘

             │                                     │
                       Transport Network
             │                                     │

             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (IETF Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐
                     Edge Cloud
                  │             │
                    ┌─────────┐
                  │ │UPF_URLLC│ │
                    └─────┬───┘
                  └ ─ ─ ─ │ ─ ─ ┘
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ │ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  │ ┌ ─ ─ ─ ─ ─ ─ ─
│   Cell Site   │ │                            │                  │
                    │                            │ │   Regional
│ ┌───────────┐ │ │                            │         Cloud    │
  │CU-UP_URLLC├─────┤                            │ │ ┌──────────┐
│ └───────────┘ │ │         IETF Network       ├─────┤  5GC CP  │ │
                    │        Slice ALL           │ │ └──────────┘
│ ┌───────────┐ │ │                            │                  │
  │CU-UP_eMBB ├─────┤                            │ │ ┌──────────┐
│ └───────────┘ │ │                            ├─────┤ UPF_eMBB │ │
 ─ ─ ─ ─ ─ ─ ─ ─    │                            │ │ └──────────┘
                  │  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  │
                                                 │ └ ─ ─ ─ ─ ─ ─ ─
                  │      Transport Network
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate few network slices and accommodate the need of few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize network slices (including the adjustment of slice services to network slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="first-5g-slice-versus-subsequent-slices">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>A 5G Network Slice is fully functional with both 5G Control Plane and
   User Plane capabilities (i.e., dedicated NF functions or contexts).
   In this regard, the creation of the "first slice" is subject to a
   specific logic since it must deploy both CP and UP.  This is not the
   case for the deployment of subsequent slices because they can share
   the same CP of the first slice, while instantiating dedicated UP.  An
   example of an incremental deployment is depicted in <xref target="_figure-7"/>.</t>
        <t>At the time of writing (2023), Section 6.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      s S  │NF-CP├──────┤  CP IETF NS (IETF-NS-1)  ├──────┤NF-CP│
   │  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
        i             │
   │  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      G e  │NF-UP├──────┤  UP IETF NS (IETF-NS-2)  ├──────┤NF-UP│
   │       └─────┘      └──────────────────────────┘ │    └─────┘  │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                                     │
                      │      Transport Network
                                                     │
                      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                         Deployment of first 5G slice
                                     │ │
                                     │ │
                                     │ │
                                    ─┘ └─
                                    ╲   ╱
                                     ╲ ╱
                                      V
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      s S  │NF-CP├──────┤  CP IETF NS (IETF-NS-1)  ├──────┤NF-CP│
   │  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
        i             │
   │  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      G e  │NF-UP├──────┤  UP IETF NS (IETF-NS-2)  ├──────┤NF-UP│
   │       └─────┘      └──────────────────────────┘ │    └─────┘  │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                                     │
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      2                                              │
   │  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
      d l  │NF-UP2├─────┤   UP2 IETF NS (IETF-NS-3)├─────┤NF-UP2│
   │    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
      5 c                                            │
   │  G e             │                                            │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
                      │
                              Transport Network      │
                      │
                       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
       Deployment of additional 5G slice with shared Control Plane
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="overview-of-the-realization-model">
      <name>Overview of the Realization Model</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> introduces the concept of the
   Network Resource Partition (NRP), which is defined as a collection of
   resources identified in the underlay network.  In the basic
   realization model described in this document, depicted in <xref target="_figure-high-level-qos"/>, a single NRP is used
   with the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>L2VPN/L3VPN service instances for logical separation:  </t>
          <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. eCPRI supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
        </li>
        <li>
          <t>Fine-grained resource control at the PE:  </t>
          <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
          <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Out-of-contract traffic might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
          <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
        </li>
        <li>Coarse resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</li>
        <li>
          <t>Capacity planning/management for efficient usage of provider network resources:  </t>
          <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure more less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
        </li>
      </ul>
      <figure anchor="_figure-high-level-qos">
        <name>Resource Allocation Slicing Model with a Single NRP</name>
        <artwork align="center"><![CDATA[
{::include ./drawings/high-level-qos.txt}
]]></artwork>
      </figure>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification.  The S-NSSAI is not visible to the transport domain.
   So instead, 5G functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). More details about the mapping between 3GPP and IETF network slices is provided in <xref target="I-D.gcdrb-teas-5g-network-slice-application"/>.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the IETF Network Slice, fulfilling connectivity
   requirements between NFs of some 5G slice, is represented at the SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.  Each VLAN
   represents a distinct logical interface on the attachment circuits,
   hence it provides the possibility to place these logical interfaces
   in distinct L2 or L3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP
   based interfaces (the only exception could be the F2 fronthaul-
   interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to IETF Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple from
   the NF point of view, it adds complexity due to the requirement of
   maintaining mapping tables for each SDP.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/vlan-hand-off.txt}
]]></artwork>
        </figure>
      </section>
      <section anchor="ip-hand-off">
        <name>IP Hand-off</name>
        <t>In this option, the slices in the TN domain are instantiated
   by IP tunnels (for example, IPsec or GTP-U tunnels) established between
   NFs, as depicted in <xref target="_figure-ip-hand-off"/>.  The transport for a single 5G slice might be constructed with
   multiple such tunnels, since a typical 5G slice contains many NFs -
   especially DUs and CUs.  If a shared NF (i.e., an NF that serves
   multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a
   single slice.  As opposed to the VLAN hand-off case, there is no
   logical interface representing a slice on the PE, hence all slices are
   handled within single service instance.  On the other hand, similarly
   to the VLAN hand-off case, a mapping table tracking IP to IETF
   Network Slice mapping is required.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/ip-hand-off.txt}
]]></artwork>
        </figure>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used
   to address NFs.  An IPv6 address is a 128-bit long field, while the
   S-NSSAI is a 32-bit field: Slice/Service Type (SST): 8 bits, Slice
   Differentiator (SD): 24 bits. 32 bits, out of 128 bits of the IPv6
   address, may be used to encode the S-NSSAI, which makes an IP to
   Slice mapping table unnecessary. This mapping is simply a local allocation method
   to allocate IPv6 addresses to NF loopbacks, without redefining IPv6
   semantics. Different IPv6 address allocation schemes following this
   mapping approach may be used, with one example allocation showed in <xref target="_figure-11"/>.</t>
        <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary nodes are not
   required to associate any additional semantic with IPv6 address.</t>
        <t>One
   benefit of embedding the S-NSSAI in the IPv6 address is that it provides
   a very easy way of identifying the packet as belonging to given
   S-NSSAI at any place in the TN domain.  This might be
   used, for example, to selectively enable per S-NSSAI monitoring, or
   any other per S-NSSAI handling, if required.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    ◀───────────────────────────▶ ◀───────▶
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address are
   unique to the NF, but do not carry any slice-specific information, while
   the least significant 32 bits are used to embed the S-NSSAI information.
   The 96-bit part of the address may be further divided based, for
   example, on the geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> shows an example of a slicing deployment, where the S-NSSAI is
   embedded into IPv6 addresses used by NFs.  NF-A has a set of tunnel
   termination points, with unique per-slice IP addresses allocated from
   the 2001:db8::a:0:0/96 prefix, while NF-B uses a set of tunnel
   termination points with per-slice IP addresses allocated from
   2001:db8::b:0:0/96.  This example shows two slices: eMBB (SST=1) and
   MIoT (SST=3).  Therefore, for eMBB the tunnel IP addresses are auto-
   derived (without the need for a mapping table) as {2001:db8::a:100:0,
   2001:db8::b:100:0}, while for MIoT (SST=3) tunnel uses
   {2001:db8::a:300:0, 2001:db8::b:300:0}.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment example with S-NSSAI embedded into IPv6</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/S-NSSAI-deployment.txt}
]]></artwork>
        </figure>
      </section>
      <section anchor="mpls-label-hand-off">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLSoUDP encapsulation, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon Section 10 of <xref target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <ul spacing="normal">
          <li>Option A (<xref target="sec-10a"/>): VRF-to-VRF connections.</li>
          <li>Option B (<xref target="sec-10b"/>): redistribution of labeled VPN routes with next-hop
change at domain boundaries.</li>
          <li>Option C (<xref target="sec-10c"/>): redistribution of labeled VPN routes without next-hop
change + redistribution of labeled transport routes with next-hop
change at domain boundaries.</li>
        </ul>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off,
   but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLSoUDP/MPLSoIP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
{::include ./drawings/mpls-10b-hand-off.txt}
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option 10B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A' and A" for the first depicted slice).  Therefore, for any slice-specific per hop
   behavior at the provider network edge, the PE must be able to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   another deployment, all prefixes (representing different slices)
   might be handled by single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  Or there could be a deployment that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t><strong><em>for further study</em></strong></t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Models</name>
      <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in the following subsections.</t>
      <section anchor="g-qos-layer">
        <name>5G QoS Layer</name>
        <t>QoS treatment is indicated in the 5G QoS layer by the 5QI (5G QoS
   indicator), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier (ID) that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network section
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
        <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>
        <t>Each slice service might have flows with multiple 5QIs, thus there could be many
   different 5QIs being deployed. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDP
   (i.e., at the edge of the provider network).</t>
        <t>In this document, this layer of QoS will be referred as '5G QoS
   Class' ('5G QoS' in short), or '5G DSCP'.</t>
      </section>
      <section anchor="tn-qos-layer">
        <name>TN QoS Layer</name>
        <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this IETF Network Slice
   realization.  That is, IETF Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all IETF Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the architecture assumes 8 traffic queues per port support in
   general.</t>
        <t>At this layer, QoS treatment is indicated by QoS indicator
   specific to the encapsulation used in the provider network, and it could
   be DSCP or MPLS Traffic Class (TC).  This layer of QoS will be referred as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network, via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per 5QI differentiated treatment from the provider network.
   This can be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per slice, but not
   per 5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization architecture defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
      </section>
      <section anchor="sec-5QI-unaware">
        <name>5QI-unaware Model</name>
        <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire IETF Network
   Slice is mapped to single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding IETF
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse (single NRP, sharing resources among
   all IETF Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
        <figure anchor="_figure-QoS-5QI-unaware">
          <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/QoS-5QI-unaware.txt}
]]></artwork>
        </figure>
        <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
        <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN QoS Class
   marking, per hop behavior for all IETF Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
        <figure anchor="_figure-15">
          <name>QoS with MPLS Encapsulation</name>
          <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
        </figure>
        <figure anchor="_figure-16">
          <name>QoS with IPv6 Encapsulation</name>
          <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
        </figure>
        <t>From the QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 <xref target="RFC8754"/> provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
        <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each IETF Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
        <section anchor="sec-inbound-edge-resource-control">
          <name>Inbound Edge Resource Control</name>
          <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   capacity enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., DDoS attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
          <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
          <ul spacing="normal">
            <li>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</li>
            <li>PIR: Peak Information Rate (i.e., maximum bandwidth)</li>
          </ul>
          <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to IETF NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
          <ul spacing="normal">
            <li>
              <t>1r2c (single-rate two-color) rate limiter  </t>
              <t>
This is the most basic rate limiter, which meters at the SDP a
traffic stream of given slice and marks its packets as in-contract
(below contracted CIR) or out-of-contract (above contracted CIR).
In-contract packets are accepted and forwarded.  Out-of contract
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
            </li>
            <li>
              <t>2r3c (two-rate three-color) rate limiter  </t>
              <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
              <ul spacing="normal">
                <li>Green, for traffic under CIR</li>
                <li>Yellow, for traffic between CIR and PIR</li>
                <li>Red, for traffic above PIR</li>
              </ul>
              <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
            </li>
          </ul>
          <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
          <figure anchor="_figure-17">
            <name>Ingress Slice Admission Control (5QI-unware Model)</name>
            <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              ▼    │    i │      │
──────────────◇────┼──▶ c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──▶ c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──▶ c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
          </figure>
        </section>
        <section anchor="outbound-edge-resource-control">
          <name>Outbound Edge Resource Control</name>
          <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
          <ul spacing="normal">
            <li>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</li>
            <li>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</li>
          </ul>
          <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
          <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, must not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   must be rejected by the IETF NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
          <figure anchor="_figure-18">
            <name>Ingress Slice Admission control (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────▶                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────▶                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────▶                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="qi-aware-model">
        <name>5QI-aware Model</name>
        <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
        <figure anchor="_figure-QoS-5QI-aware">
          <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/QoS-5QI-aware.txt}
]]></artwork>
        </figure>
        <t>Given that in large scale deployments (large number of 5G
   slices), the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common per hop behavior (PHB) is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>.</t>
        <dl>
          <dt>Note:</dt>
          <dd>
            <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
          </dd>
        </dl>
        <figure anchor="_figure-QoS-5QI-mapping-example">
          <name>Example of 3GPP QoS Mapped to TN QoS</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/QoS-5QI-mapping-example.txt}
]]></artwork>
        </figure>
        <t>In current SDO progress of 3GPP (Rel.17) and O-RAN the mapping of 5QI to
DSCP is not expected in per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
        <t>Like in 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per hop behavior for all aggregated 5G QoS
   Classes from all IETF Network Slices is executed on provider network transit links.  Provider network
   transit routers do not evaluate original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
        <t>In 5QI-aware model, compared to 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each IETF Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each IETF
   Network Slice.</t>
        <section anchor="inbound-edge-resource-control">
          <name>Inbound Edge Resource Control</name>
          <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
          <t>5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
          <ul spacing="normal">
            <li>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</li>
            <li>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</li>
          </ul>
          <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
          <figure anchor="_figure-20">
            <name>Ingress Slice Admission Control (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──▶ S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──▶ l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──▶ i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──▶   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─▶  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─▶  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─▶  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─▶    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─▶  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─▶  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─▶  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─▶    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
          </figure>
          <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
          <figure anchor="_figure-21">
            <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
            <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──▶ S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──▶ l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──▶ i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──▶   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──▶ S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──▶ l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──▶ i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──▶   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──▶ S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──▶ l │  i  │
5Q-QoS-C: CIR-3C ────◇─────────┤─┼──┼──▶ i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──▶   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
          </figure>
        </section>
        <section anchor="outbound-edge-resource-control-1">
          <name>Outbound Edge Resource Control</name>
          <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights (equal to 5Q QoS
   CIRs within the slice) CIRs must not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   must not exceed the physical capacity of the attachment circuit.</t>
          <figure anchor="_figure-22">
            <name>Egress Slice Admission Control (5QI-aware)</name>
            <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────▶ 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──▶ 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────▶ 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────▶ Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based in TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-planes-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator might define various tunnel groups, where each
   tunnel group is created with specific optimization criteria and
   constraints.  This document refers to such tunnel groups as
   'transport planes'.  For example, a transport plane "A" might represent
   tunnels optimized for latency, and transport plane "B" might represent tunnels optimized for high capacity.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes.  These transport planes might be realized via various IP/MPLS
   techniques, for example Flex-Algo or RSVP/SR traffic engineering
   tunnels with or without PCE, and with or without bandwidth
   reservations.</t>
      <t><xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════▶│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════▶│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════▶│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════▶│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there could be multiple tunnels within a single transport plane
   between any pair of PEs. For readability, <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  In essence, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model), or
   flows with different 5G QoS Classes, even if they are from the same
   slice, might be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │IETF NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │IETF NS 2 ├──────┐   ├───▶  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │IETF NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───▶  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │IETF NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │IETF NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that there is no strict correlation between TN QoS
   Classes and Transport Planes.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following IGP metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network, while
   Transport Plane determines the path, optimized or constrained based
   on operator's business criteria, that the packets use to transit
   through the provider network.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
     ┃   SDP           ┃                         │
     ┃│  ┌──────────┐ │┃
     ┃   │ 5G QoS A ├──────┐                     │
   I ┃│  └──────────┘ │┃   │
   E ┃   ┌──────────┐  ┃   │                     │
   T ┃│  │ 5G QoS B ├──────┤
   F ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────▶  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
     ┃   ┌──────────┐  ┃   │    │
     ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   I ┃   └──────────┘  ┃   │    │    │         │
   E ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   T ┃   │ 5G QoS E ├──────┘    ├────▶  Plane  │
   F ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   transport controller with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The transport controller has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
{::include ./drawings/multi-DC.txt}
]]></artwork>
        </figure>
        <t>Let us consider 5G Slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC is to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G Slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and optionally delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information will be discussed in a future
   version of this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G Slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the IETF NSC.  The IETF
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="I-D.ietf-opsawg-sap"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the IETF NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the IETF NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo or a particular set of TE LSPs), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="I-D.ietf-teas-rfc3272bis"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="I-D.ietf-lsr-flex-algo"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of network slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE or SR-TE LSPs with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the transport controller, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The transport controller needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the transport controller to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   transport controller may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   transport controller can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of network slices with a network imply
   a set OAM functions (<xref target="RFC6291"/>) to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per network slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist in tracing resources that
are bound to a given network slice, tracing resources that are invoked
when forwarding a given flow bound to a given network slice,
assessing whether flow isolation characteristics are in
conformance with the network slice service requirements, or assessing
the compliance of the allocated network slice resource against flow/
customer service requirements.  </t>
          <t><xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology-
specific feature that would be address their needs.  </t>
          <t>
SFC OAM <xref target="I-D.ietf-sfc-oam-packet"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="I-D.ietf-sfc-multi-layer-oam"/>.</t>
        </li>
        <li>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given network slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</li>
        <li>Providers may deploy means to dynamically discover the set of network slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
must be undertaken accordingly. For example, a provider may rely
upon L3NM <xref target="RFC9182"/> or L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver network slice services.
The correlation between an LxVPN instance and a network slice service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>.</li>
        <li>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. For example,
<xref target="I-D.ietf-opsawg-yang-vpn-service-pm"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g. YANG Push <xref target="RFC8641"/>) can be used.</li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>IETF Network Slices considerations are discussed in Section 6 of <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
      <t>Adequate admission control policies should be configured in the edge of the provider network to control access to specific slice resources. Likewise, access to classification and mapping tables must be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices must check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-teas-ietf-network-slices">
          <front>
            <title>A Framework for IETF Network Slices</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma" initials="S." surname="Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Microsoft Inc.</organization>
            </author>
            <date day="21" month="January" year="2023"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-19"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen">
              <organization/>
            </author>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
              <organization/>
            </author>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 03.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2022" month="February"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
              <organization/>
            </author>
            <author fullname="L. Munoz" initials="L." surname="Munoz">
              <organization/>
            </author>
            <author fullname="A. Aguado" initials="A." surname="Aguado">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson">
              <organization/>
            </author>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen">
              <organization/>
            </author>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs).  This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu">
              <organization/>
            </author>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
              <organization/>
            </author>
            <author fullname="D. Lopez" initials="D." surname="Lopez">
              <organization/>
            </author>
            <author fullname="C. Xie" initials="C." surname="Xie">
              <organization/>
            </author>
            <author fullname="L. Geng" initials="L." surname="Geng">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked.  Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance).  Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the IETF Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Liuyan Han" initials="L." surname="Han">
              <organization>China Mobile</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-04"/>
        </reference>
        <reference anchor="I-D.boro-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   prior or during service provisioning (e.g., Network Slice Service).
   The document specifies also a module that updates other service and
   network modules with the required information to bind specific
   services to ACs that are created using the AC service model.

   Also, the document specifies a set of reusable groupings.  Whether a
   service model reuses structures defined in the AC models or simply
   include an AC reference is a design choice of these service models.
   Relying upon the AC service model to manage ACs over which a service
   is delivered has the merit to decorrelate the management of a service
   vs. upgrade the AC components to reflect recent AC technologies or
   features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boro-opsawg-teas-attachment-circuit-05"/>
        </reference>
        <reference anchor="I-D.gcdrb-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="7" month="March" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features in 5G, which provides
   different network service as independent logical networks.  To
   provide 5G network slices service, an end-to-end network slice needs
   to consists of 3 major types of network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of IETF network slice in
   providing 5G end-to-end network slices, including the network slice
   identification mapping, network slice parameter mapping and 5G IETF
   Network Slice NBI.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-gcdrb-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.henry-tsvwg-diffserv-to-qci">
          <front>
            <title>Diffserv to QCI Mapping</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Szigeti" initials="T." surname="Szigeti">
              <organization>Cisco</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="April" year="2020"/>
            <abstract>
              <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-henry-tsvwg-diffserv-to-qci-04"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." surname="Previdi">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen">
              <organization/>
            </author>
            <author fullname="R. Guerin" initials="R." surname="Guerin">
              <organization/>
            </author>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd">
              <organization/>
            </author>
            <author fullname="S. Rabie" initials="S." surname="Rabie">
              <organization/>
            </author>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services.  This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services.  The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="R. Pan" initials="R." surname="Pan">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms.  While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-sap">
          <front>
            <title>A YANG Network Model for Service Attachment Points (SAPs)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="18" month="January" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an abstract
   view of the provider network topology that contains the points from
   which its services can be attached (e.g., basic connectivity, VPN,
   network slices).  Also, the model can be used to retrieve the points
   where the services are actually being delivered to customers
   (including peer networks).

   This document augments the 'ietf-network' data model by adding the
   concept of Service Attachment Points (SAPs).  The SAPs are the
   network reference points to which network services, such as Layer 3
   Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network
   (L2VPN), can be attached.  One or multiple services can be bound to
   the same SAP.  Both User-Network Interface (UNI) and Network-to-
   Network Interface (NNI) are supported in the SAP data model.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-sap-15"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu">
              <organization/>
            </author>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski">
              <organization/>
            </author>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki">
              <organization/>
            </author>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki">
              <organization/>
            </author>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service.  This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364.  This model is intended to be instantiated at the management system to deliver the overall service.  It is not a configuration model to be used directly on network elements.  This model provides an abstracted view of the Layer 3 IP VPN service configuration components.  It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service.  How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible.  The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen">
              <organization/>
            </author>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola">
              <organization/>
            </author>
            <author fullname="C. Xie" initials="C." surname="Xie">
              <organization/>
            </author>
            <author fullname="L. Jalil" initials="L." surname="Jalil">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service.  It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service.  How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="S. Barguil" initials="S." surname="Barguil">
              <organization/>
            </author>
            <author fullname="L. Munoz" initials="L." surname="Munoz">
              <organization/>
            </author>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc3272bis">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <date day="27" month="October" year="2022"/>
            <abstract>
              <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-22"/>
        </reference>
        <reference anchor="I-D.ietf-lsr-flex-algo">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="Peter Psenak" initials="P." surname="Psenak">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Shraddha Hegde" initials="S." surname="Hegde">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Arkadiy Gulko" initials="A." surname="Gulko">
              <organization>Edward Jones</organization>
            </author>
            <date day="17" month="October" year="2022"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links.  Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path.  This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network.  This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-flex-algo-26"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson">
              <organization/>
            </author>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort">
              <organization/>
            </author>
            <author fullname="R. Bonica" initials="R." surname="Bonica">
              <organization/>
            </author>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu">
              <organization/>
            </author>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood.  Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM.  There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term.  This memo documents an Internet Best Current  Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi">
              <organization/>
            </author>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher">
              <organization/>
            </author>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba">
              <organization/>
            </author>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement.  Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document.  Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools  defined in the IETF.  At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="I-D.ietf-sfc-oam-packet">
          <front>
            <title>OAM Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document clarifies an ambiguity in the Network Service Header
   (NSH) specification related to the handling of O bit.  In particular,
   this document clarifies the meaning of "OAM packet".

   This document updates RFC 8300.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-oam-packet-03"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern">
              <organization/>
            </author>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="I-D.ietf-sfc-multi-layer-oam">
          <front>
            <title>Active OAM for Service Function Chaining (SFC)</title>
            <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Wei Meng" initials="W." surname="Meng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ting Ao" initials="T." surname="Ao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Bhumip Khasnabish" initials="B." surname="Khasnabish">
              <organization>Individual contributor</organization>
            </author>
            <author fullname="Kent Leung" initials="K." surname="Leung">
              <organization>Individual contributor</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   A set of requirements for active Operation, Administration, and
   Maintenance (OAM) of Service Function Chains (SFCs) in a network is
   presented in this document.  Based on these requirements, an
   encapsulation of active OAM messages in SFC and a mechanism to detect
   and localize defects are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-multi-layer-oam-23"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas">
              <organization/>
            </author>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin">
              <organization/>
            </author>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG).  The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure.  Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand">
              <organization/>
            </author>
            <author fullname="S. Bryant" initials="S." surname="Bryant">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths.  Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding.  This document is not an  Internet Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi">
              <organization/>
            </author>
            <author fullname="B. Decraene" initials="B." surname="Decraene">
              <organization/>
            </author>
            <author fullname="R. Shakir" initials="R." surname="Shakir">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-yang-vpn-service-pm">
          <front>
            <title>A YANG Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <date day="11" month="November" year="2022"/>
            <abstract>
              <t>   The data model for network topologies defined in RFC 8345 introduces
   vertical layering relationships between networks that can be
   augmented to cover network and service topologies.  This document
   defines a YANG module for performance monitoring (PM) of both
   underlay networks and overlay VPN services that can be used to
   monitor and manage network performance on the topology of both
   layers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-yang-vpn-service-pm-15"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment.  The construction of Metrics and Methods can be described as either "Active" or "Passive".  Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods".  This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm">
              <organization/>
            </author>
            <author fullname="E. Voit" initials="E." surname="Voit">
              <organization/>
            </author>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore.  Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen">
              <organization/>
            </author>
            <author fullname="J. Soininen" initials="J." surname="Soininen">
              <organization/>
            </author>
            <author fullname="B. Patil" initials="B." surname="Patil">
              <organization/>
            </author>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen">
              <organization/>
            </author>
            <author fullname="G. Bajko" initials="G." surname="Bajko">
              <organization/>
            </author>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed.  Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6.  This document describes the support for IPv6 in 3GPP network architectures.  This document is  not an Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>IP: Internet Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>SMO: Service Management and Orchestration</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-intro">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</li>
              <li>the SMF controls the 5GC UPF via the N4 interface</li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────▶(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</li>
          <li>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</li>
          <li>The Antenna converts the electric signal received from the RU to
radio waves</li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</li>
          <li>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</li>
          <li>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern and Tarek
   Saad for their reviews of this document and for providing valuable
   feedback on it.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>jdrake@juniper.net</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amit.dhamija@rakuten.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
