<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-bestbar-teas-ns-packet-08" category="std">

  <front>
    <title abbrev="IP/MPLS Network Slicing">Realizing Network Slices in IP/MPLS Networks</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Juniper Networks</organization>
      <address>
        <email>tsaad@juniper.net</email>
      </address>
    </author>
    <author initials="V." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Dong" fullname="Jie Dong">
      <organization>Huawei Technologies</organization>
      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author initials="B." surname="Wen" fullname="Bin Wen">
      <organization>Comcast</organization>
      <address>
        <email>Bin_Wen@cable.comcast.com</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Ericsson</organization>
      <address>
        <email>daniele.ceccarelli@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Halpern" fullname="Joel Halpern">
      <organization>Ericsson</organization>
      <address>
        <email>joel.halpern@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Peng" fullname="Shaofu Peng">
      <organization>ZTE Corporation</organization>
      <address>
        <email>peng.shaofu@zte.com.cn</email>
      </address>
    </author>
    <author initials="R." surname="Chen" fullname="Ran Chen">
      <organization>ZTE Corporation</organization>
      <address>
        <email>chen.ran@zte.com.cn</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Volta Networks</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="R." surname="Rokui" fullname="Reza Rokui">
      <organization>Nokia</organization>
      <address>
        <email>reza.rokui@nokia.com</email>
      </address>
    </author>
    <author initials="L." surname="Jalil" fullname="Luay Jalil">
      <organization>Verizon</organization>
      <address>
        <email>luay.jalil@verizon.com</email>
      </address>
    </author>

    <date year="2022" month="February" day="02"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Network slicing provides the ability to partition a physical network into
multiple logical networks of varying sizes, structures, and functions so that
each slice can be dedicated to specific services or customers.  Network slices
need to co-exist on the same network while ensuring slice elasticity in terms of
network resource allocation. The Differentiated Service (Diffserv) model allows
for carrying multiple services on top of a single physical network by relying
on compliant domains and nodes to provide forwarding treatment (scheduling and drop
policy)  on to packets that carry the respective Diffserv code point. This document
adopts a similar approach to Diffserv and proposes a scalable approach
to realize network slicing in IP/MPLS networks. The solution does not mandate
Diffserv to be enabled in the network to provide a specific forwarding
treatment, but can co-exist with and complement it when enabled.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Network slicing allows a Service Provider to create
independent and logical networks on top of a common or shared physical
network infrastructure. Such network slices can be offered to customers or used
internally by the Service Provider to enhance the delivery of their service
offerings. A Service Provider can also use network slicing to structure and
organize the elements of its infrastructure. This document provides a path control
technology (e.g., RSVP, SR, or other) agnostic solution
that a Service Provider can deploy to realize network slicing in IP/MPLS networks.</t>

<t><xref target="I-D.ietf-teas-ietf-network-slices"/> provides the definition of a network
slice for use within the IETF and discusses the general framework for
requesting and operating IETF Network Slices, their characteristics, and the
necessary system components and interfaces. It also  discusses the function of
an IETF Network Slice Controller and the requirements on its northbound and
southbound interfaces.</t>

<t>This document introduces the notion of a Slice-Flow Aggregate which comprises
of one of more IETF network slice traffic streams. It also describes the
Network Resource Partition (NRP) and the NRP Policy that can be used to
instantiate control and data plane behaviors on select topological elements
associated with the NRP that supports a Slice-Flow
Aggregate - refer <xref target="SliceDefinition"/> for further details.</t>

<t>The IETF Network Slice Controller is responsible for the aggregation of
multiple IETF network traffic streams into a Slice-Flow Aggregate, and for
maintaining the mapping required between them. The mechanisms used by the
controller to determine the mapping of one or more IETF network slice to a
Slice-Flow Aggregate are outside the scope of this document. The focus of this
document is on the mechanisms required at the device level to address the
requirements of network slicing in packet networks.</t>

<t>In a Diffserv (DS) domain <xref target="RFC2475"/>, packets requiring the same forwarding
treatment (scheduling and drop policy) are classified and marked with the
respective Class Selector (CS) Codepoint (or the Traffic Class (TC) field for
MPLS packets <xref target="RFC5462"/>) at the DS domain ingress nodes.  Such packets are said
to belong to a Behavior Aggregates (BA) that has a common set of behavioral
characteristics or a common set of delivery requirements.  At transit nodes,
the CS is inspected to determine the specific forwarding treatment to be
applied before the packet is forwarded.  A similar approach is adopted in this
document to realize network slicing. The solution proposed in this document
does not mandate Diffserv to be enabled in the network to provide a specific
forwarding treatment.</t>

<t>When logical networks associated with an NRP are realized on top of a shared
physical network infrastructure, it is important to steer traffic on the
specific network resources partition that is allocated for a given Slice-Flow
Aggregate.  In packet networks, the packets of a specific Slice-Flow Aggregate
may be identified by one or more specific fields carried within the packet. An
NRP ingress boundary node (where Slice-Flow Aggregate traffic enters the NRP)
populates the respective field(s) in packets that are
mapped to a Slice-Flow Aggregate in order to allow interior NRP nodes to
identify and apply the specific Per NRP Hop Behavior (NRP-PHB) associated with the
Slice-Flow Aggregate. The NRP-PHB defines the scheduling treatment and, in some
cases, the packet drop probability.</t>

<t>If Diffserv is enabled within the network, the Slice-Flow Aggregate traffic can
further carry a Diffserv CS to enable differentiation of forwarding treatments
for packets within a Slice-Flow Aggregate.</t>

<t>For example, when using MPLS as a dataplane, it is possible to identify packets
belonging to the same Slice-Flow Aggregate by carrying an identifier in an MPLS Label Stack Entry (LSE).
Additional Diffserv classification may be indicated in the Traffic
Class (TC) bits of the global MPLS label to allow further differentiation of forwarding
treatments for traffic traversing the same NRP.</t>

<t>This document covers different modes of NRPs and discusses how
each mode can ensure proper placement of Slice-Flow Aggregate paths
and respective treatment of Slice-Flow Aggregate traffic.</t>

<section anchor="terminology" title="Terminology">

<t>The reader is expected to be familiar with the terminology specified in
<xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>

<t>The following terminology is used in the document:</t>

<t><list style="hanging">
  <t hangText="IETF Network Slice:"><vspace blankLines='0'/>
  refer to the definition of ‘IETF network slice’ in 
<xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>
  <t hangText="IETF Network Slice Controller (NSC):"><vspace blankLines='0'/>
  refer to the definition in <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>
  <t hangText="Network Resource Partition:"><vspace blankLines='0'/>
  the set of network resources that are used to support a Slice-Flow Aggregate
to meet the requested SLOs and SLEs.</t>
  <t hangText="Slice-Flow Aggregate:"><vspace blankLines='0'/>
  a collection of packets that match an NRP Policy selection 
criteria and are given the same forwarding treatment; a Slice-Flow
Aggregate comprises of one or more IETF network slice traffic 
streams; the mapping of one or more IETF network slices to a Slice-Flow
Aggregate is maintained by the IETF Network Slice Controller.</t>
  <t hangText="Network Resource Partition Policy (NRP):"><vspace blankLines='0'/>
  a policy construct that enables instantiation of mechanisms in support 
of IETF network slice specific control and data plane behaviors 
on select topological elements; the enforcement of an NRP Policy 
results in the creation of an NRP.</t>
  <t hangText="NRP Identifier (NRP-ID):"><vspace blankLines='0'/>
  an identifier that is globally unique within an NRP domain and that can
be used in the control or management plane to identify the resources associated with the NRP.</t>
  <t hangText="NRP Capable Node:"><vspace blankLines='0'/>
  a node that supports one of the NRP modes described in this document.</t>
  <t hangText="NRP Incapable Node:"><vspace blankLines='0'/>
  a node that does not support any of the NRP modes described in this document.</t>
  <t hangText="Slice-Flow Aggregate Path:"><vspace blankLines='0'/>
  a path that is setup over the NRP that is associated with a specific Slice-Flow Aggregate.</t>
  <t hangText="Slice-Flow Aggregate Packet:"><vspace blankLines='0'/>
  a packet that traverses over the NRP that is associated with a specific Slice-Flow Aggregate.</t>
  <t hangText="NRP Topology:"><vspace blankLines='0'/>
  a set of topological elements associated with a Network Resource Partition.</t>
  <t hangText="NRP state aware TE (NRP-TE):"><vspace blankLines='0'/>
  a mechanism for TE path selection that takes into account the available network resources associated with a specific NRP.</t>
</list></t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms-and-abbreviations" title="Acronyms and Abbreviations">

<t><list style='empty'>
  <t>BA: Behavior Aggregate</t>
</list></t>

<t><list style='empty'>
  <t>CS: Class Selector</t>
</list></t>

<t><list style='empty'>
  <t>NRP-PHB: NRP Per Hop Behavior as described in <xref target="SlicePHB"/></t>
</list></t>

<t><list style='empty'>
  <t>FAS: Flow Aggregate Selector</t>
</list></t>

<t><list style='empty'>
  <t>FASL: Flow Aggregate Selector Label as described in <xref target="SliceSelector"/></t>
</list></t>

<t><list style='empty'>
  <t>SLA: Service Level Agreements</t>
</list></t>

<t><list style='empty'>
  <t>SLO: Service Level Objectives</t>
</list></t>

<t><list style='empty'>
  <t>SLE: Service Level Expectations</t>
</list></t>

<t><list style='empty'>
  <t>Diffserv: Differentiated Services</t>
</list></t>

<t><list style='empty'>
  <t>MPLS: Multiprotocol Label Switching</t>
</list></t>

<t><list style='empty'>
  <t>LSP: Label Switched Path</t>
</list></t>

<t><list style='empty'>
  <t>RSVP: Resource Reservation Protocol</t>
</list></t>

<t><list style='empty'>
  <t>TE: Traffic Engineering</t>
</list></t>

<t><list style='empty'>
  <t>SR: Segment Routing</t>
</list></t>

<t><list style='empty'>
  <t>VRF: VPN Routing and Forwarding</t>
</list></t>

<t><list style='empty'>
  <t>AC: Attachment Circuit</t>
</list></t>

<t><list style='empty'>
  <t>CE: Customer Edge</t>
</list></t>

<t><list style='empty'>
  <t>PE: Provider Edge</t>
</list></t>

<t><list style='empty'>
  <t>PCEP: Path Computation Element (PCE) Communication Protocol (PCEP)</t>
</list></t>

</section>
</section>
<section anchor="network-resource-slicing-membership" title="Network Resource Slicing Membership">

<t>An NRP that supports a Slice-Flow Aggregate can be
instantiated over parts of an IP/MPLS network (e.g., all or specific network
resources in the access, aggregation, or core network), and can stretch across
multiple domains administered by a provider.  The NRP topology may
be comprised of dedicated and/or shared network resources (e.g., in
terms of processing power, storage, and bandwidth).</t>

<t>The physical network resources may be fully dedicated to a specific Slice-Flow
Aggregate.  For example, traffic belonging to a Slice-Flow Aggregate can traverse
dedicated network resources without being subjected to contention from traffic of
other Slice-Flow Aggregates.  Dedicated physical network resource slicing allows for simple
partitioning of the physical network resources amongst Slice-Flow Aggregates without
the need to distinguish packets traversing the dedicated network resources
since only one Slice-Flow Aggregate traffic stream can traverse the dedicated
resource at any time.</t>

<t>To optimize network utilization, sharing of the physical network resources may
be desirable. In such case, the same physical network resource capacity is
divided among multiple NRPs that support multiple Slice-Flow
Aggregates. The shared physical network resources can be
partitioned in the data plane (for example by applying hardware policers and
shapers) and/or partitioned in the control plane by providing a logical
representation of the physical link that has a subset of the network resources
available to it.</t>

</section>
<section anchor="NSRealization" title="IETF Network Slice Realization">

<t><xref target="ns-workflow"/> describes the steps required to realize an
IETF network slice service in a provider network  using the solution proposed
in this document. Each of the steps is further elaborated on in a subsequent
section.</t>

<figure title="IETF network slice realization steps." anchor="ns-workflow"><artwork><![CDATA[
                       --      --      --
    ----------        |CE|    |CE|    |CE|
   | Network  |        --      --      --
   | Slice    |      AC :    AC :    AC :
   | Orchstr  |      ----------------------        -------
    ----------      ( |PE|....|PE|....|PE| )      ( IETF  )
     | IETF        (   --:     --     :--   )    ( Network )
     | Network     (     :............:     )    (  Slice  )
     | Slice Svc    (  IETF Network Slice  )      (       )  Customer
     | Req           ----------------------        -------     View
   ..|....................................\........./..................
   --v----------   ----> Slice-Flow        \       /        Controller
   |Controllers|  |     Aggregation Mapping v     v            View
   |  -------  |  |    -----------------------------------------
   | |IETF   | |--    ( |PE|.......|PE|........|PE|.......|PE|  )
   | |Network| |     (   --:        --         :--         --    )
   | |Slice  | |     (     :...................:                 )
   | |Cntrlr | |      (           Slice-Flow Aggregate         )
   | |(NSC)  | |       -----------------------------------------
   |  -------  |---------.
   |  -------  |         | Path Placement
   | |       | |         v
   | |       | |       -----------------------------------------
   | |       | |      ( |PE|....-..|PE|        |PE|.......|PE|  )
   | |Network| |     (   --    |P|  --......-...--    -   :--    )
   | |Cntrlr | |     (          -:.........|P|.......|P|..:      )
   | |(NC)   | |      ( Path Set            -         -         )
   | |       | |       -----------------------------------------
   | |       | |-------.
   | |       | |       | Apply Topology Filters    
   | |       | |       v
   |  -------  |      -----------------------------      --------
   |           |     (|PE|..-..|PE|... ..|PE|..|PE|)    ( Policy )
    -----------     ( :--  |P|  --   :-:  --   :--  )  (  Filter  )
    |  |     |      ( :.-   -:.......|P|       :-   )  ( Topology )
    |  |     |      (  |P|...........:-:.......|P|  )   (        )
    |  |      \      (  -  Policy Filter Topology  )     --------
    |  |       \      -----------------------------       A
    |  |        \                       A                /
   ..............\.......................\............../..............
    |  | Path     v Service Mapping       \            /  Physical N/w
     \  \Inst     ------------------------------------------------
      \  \       ( |PE|.....-.....|PE|.......    |PE|.......|PE|  )
       \  \     (   --     |P|     --       :-...:--     -..:--    )
   NRP  \  --->(    :       -:..............|P|.........|P|         )
   Policy\     (    -.......................:-:..-       -          )
   Inst   ----->(  |P|..........................|P|......:         )
                 (  -                            -                )
                  ------------------------------------------------
]]></artwork></figure>

<section anchor="network-topology-filters" title="Network Topology Filters">

<t>The Physical Network may be filtered into a number of Policy Filter
Topologies.  Filter actions may include selection of specific nodes
and links according to their capabilities and are based on network-
wide policies.  The resulting topologies can be used to host IETF
Network Slices and provide a useful way for the network operator to
know that all of the resources they are using to plan a network
slice meet specific SLOs.  This step can be done offline during
planning activity, or could be performed dynamically
as new demands arise.</t>

<t><xref target="SlicePolicyTopology"/> describes how topology filters can be
associated with the NRP instantiated by the NRP Policy.</t>

</section>
<section anchor="NetworkSliceServiceRequest" title="IETF Network Slice Service Request">

<t>The customer requests an IETF Network Slice Service specifying the
CE-AC-PE points of attachment, the connectivity matrix, and the
SLOs/SLEs as described in <xref target="I-D.ietf-teas-ietf-network-slices"/>.
These capabilities are always provided based on a Service Level Agreement (SLA)
between the network slice costumer and the provider.</t>

<t>This defines the traffic flows that need to be supported
when the slice is realized.  Depending on the mechanism and
encoding of the Attachment Circuit (AC), the IETF Network Slice Service may also include
information that will allow the operator’s controllers to configure
the PEs to determine what customer traffic is intended
for this IETF Network Slice.</t>

<t>IETF Network Slice Service Requests are likely to arrive at various
times in the life of the network, and may also be modified.</t>

</section>
<section anchor="SliceAggregateMapping" title="Slice-Flow Aggregation Mapping">

<t>A network may be called upon to support very many IETF Network
Slices, and this could present scaling challenges in the operation
of the network.  In order to overcome this, the IETF Network Slice
streams may be aggregated into groups according to similar characteristics.</t>

<t>A Slice-Flow Aggregate is a construct that comprises the traffic flows of one or
more IETF Network Slices. The mapping of IETF Network Slices into an Slice-Flow
Aggregate is a matter of local operator policy is a function executed by the
Controller.  The Slice-Flow Aggregate may be preconfigured, created on demand, or
modified dynamically.</t>

</section>
<section anchor="PathPlacement" title="Path Placement over NRP Topology">

<t>Depending on the underlying network technology, the paths are selected in the
network in order to best deliver the SLOs for the different services carried by
the Slice-Flow Aggregate.  The path placement function (carried on ingress node
or by a controller) is performed on the Policy Filtered Topology that is
selected to support the Slice-Flow Aggregate.</t>

<t>Note that this step may indicate the need to increase the capacity of the
underlying Policy Filter Topology or to create a new Policy Filter Topology.</t>

</section>
<section anchor="nrp-policy-installation" title="NRP Policy Installation">

<t>A Controller function programs the physical network with policies for handling
the traffic flows belonging to the Slice-Flow Aggregate.  These policies instruct
underlying routers how to handle traffic for a specific Slice-Flow Aggregate: the
routers correlate markers present in the packets that belong to the Slice-Flow
Aggregate.  The way in which the NRP Policy is
installed in the routers and the way that the traffic is marked is
implementation specific. The NRP Policy instantiation in the network is
further described in <xref target="SlicePolicyInstantiation"/>.</t>

</section>
<section anchor="path-instantiation" title="Path Instantiation">

<t>Depending on the underlying network technology, a Controller function may
install the forwarding state specific to the Slice-Flow Aggregate so that traffic is
routed along paths derived in the Path Placement step described in
<xref target="PathPlacement"/>.  The way in which the paths are instantiated is
implementation specific.</t>

</section>
<section anchor="service-mapping" title="Service Mapping">

<t>The edge points (PEs) can be configured to support the network slice service by
mapping the customer traffic to Slice-Flow Aggregates, possibly using
information supplied when the IETF network slice service was requested.  The
edge points MAY also be instructed to mark the packets so that the network
routers will know which policies and routing instructions to apply.</t>

</section>
<section anchor="network-slice-flow-aggregate-relationships" title="Network Slice-Flow Aggregate Relationships">

<t>The following describes the generalization relationships between
the IETF network slice and different parts of the solution
as described in <xref target="ns-workflow"/>.</t>

<t>o A customer may request 1 or more IETF Network Slices.</t>

<t>o Any given Attachment Circuit (AC) may support the traffic for 1 or more IETF Network
  Slice, but if there is more than one IETF Network Slice using a
  single AC, the IETF Network Slice Service request must include
  enough information to allow the edge nodes to demultiplex the
  traffic for the different IETF Network Slices.</t>

<t>o By definition, multiple IETF Network Slices may be mapped to a
  single Slice-Flow Aggregate.  However, it is possible for an
  Slice-Flow Aggregate to contain just a single IETF Network Slice.</t>

<t>o The physical network may be filtered to multiple Policy Filter
  Topologies.  Each such Policy Filter Topology facilitates
  planning the placement and support of the Slice-Flow Aggregate by
  presenting only the subset of links and nodes that meet specific
  criteria.  Note, however, that a network operator does not need to
  derive any Policy Filter Topologies, choosing to operate directly
  on the full physical network.</t>

<t>o It is anticipated that there may be very many IETF Network Slices supported
  by a network operator over a single physical network.  A network may support a
  limited number of Slice-Flow Aggregates, with each of the Slice-Flow Aggregates
  grouping any number of the IETF Network Slices streams.</t>

</section>
</section>
<section anchor="SliceModes" title="Network Resource Partition Modes">

<t>An NRP Policy can be used to dictate if the network resource partitioning
of the shared network resources among multiple Slice-Flow Aggregates can be achieved:</t>

<t><list style="format %c)" counter="bar">
  <t>in data plane only,</t>
  <t>in control plane only, or</t>
  <t>in both control and data planes.</t>
</list></t>

<section anchor="DataplaneSlicing" title="Data plane Network Resource Partition Mode">

<t>The physical network resources can be partitioned on network devices
by applying a Per Hop forwarding Behavior (PHB) onto packets that traverse the
network devices. In the Diffserv model, a Class Selector Codepoint (CS) is carried in the
packet and is used by transit nodes to apply the PHB that
determines the scheduling treatment and drop probability for packets.</t>

<t>When data plane NRP mode is applied, packets need to be forwarded on the
specific NRP that supports the Slice-Flow Aggregate to ensure the proper
forwarding treatment dictated in the NRP Policy is applied (refer to
<xref target="SliceDefinition"/> below).  In this case, a Flow Aggregate Selector
(FAS) MUST be carried in each packet to identify the Slice-Flow Aggregate that
it belongs to.</t>

<t>The ingress node of an NRP domain MAY also add an FAS to each Slice-Flow
Aggregate packet. The transit nodes within an NRP domain MAY use the FAS to
associate packets with a Slice-Flow Aggregate and to determine the Network
Resource Partition Per Hop Behavior (NRP-PHB) that is applied to the packet
(refer to <xref target="SlicePHB"/> for further details). The CS MAY be used to apply a
Diffserv PHB on to the packet to allow differentiation of traffic treatment
within the same Slice-Flow Aggregate.</t>

<t>When data plane only NRP mode is used, routers may rely on a
network state independent view of the topology to determine the best paths.
In this case, the best path selection dictates the
forwarding path of packets to the destination. The FAS field carried in each
packet determines the specific NRP-PHB treatment along the
selected path.</t>

<t>For example, the Segment-Routing Flexible Algorithm <xref target="I-D.ietf-lsr-flex-algo"/>
may be deployed in a network to steer packets on the IGP computed lowest
cumulative delay path.  An NRP Policy may be used to
allow links along the least latency path to share its data plane resources
amongst multiple Slice-Flow Aggregates. In this case, the packets that are
steered on a specific NRP carry the FAS that
enables routers (along with the Diffserv CS) to determine the NRP-PHB to
enforce on the Slice-Flow Aggregate traffic streams.</t>

</section>
<section anchor="control-plane-network-resource-partition-mode" title="Control Plane Network Resource Partition Mode">

<t>Multiple NRPs can be realized over the same set of physical resources.  Each
NRP is identified by an identifier (NRP-ID) that is globally unique within the
NRP domain. The NRP state reservations for each NRP can be maintained on the
network element or on a controller.</t>

<t>The network reservation states for a specific partition can be represented
in a topology that contains all or a subset of the physical network
elements (nodes and links) and reflect the network state reservations in
that NRP. The logical network resources that appear in the NRP topology can
reflect a part, whole, or in-excess of the physical network resource capacity
(e.g., when oversubscription is desirable).</t>

<t>For example, the physical link bandwidth can be
divided into fractions, each dedicated to an NRP that supports a Slice-Flow Aggregate.
The topology associated with the NRP supporting a Slice-Flow Aggregate
can be used by routing protocols, or by the ingress/PCE when computing NRP state
aware TE paths.</t>

<t>To perform NRP state aware Traffic Engineering (NRP-TE), the resource reservation
on each link needs to be NRP aware. The NRP reservations state can be managed
locally on the device or off device (e.g. on a controller). Details of required
IGP extensions to support NRP-TE are described in
<xref target="I-D.bestbar-lsr-slice-aware-te"/>.</t>

<t>The same physical link may be member of multiple slice policies that
instantiate different NRPs. The NRP
reservable or utilized bandwidth on such a link is updated (and may be
advertised) whenever new paths are placed in the network. The NRP
reservation state, in this case, MAY be maintained on each device or off the
device on a resource reservation manager that holds reservation states for
those links in the network.</t>

<t>Multiple NRPs that support Slice-Flow Aggregates can form a group and share the available network
resources allocated to each. In this case, a node can update
the reservable bandwidth for each NRP to take into consideration
the available bandwidth from other NRPs in the same group.</t>

<t>For illustration purposes, <xref target="resource-sharing"/> describes bandwidth paritioning
or sharing amongst a group of NRPs. In Figure 2a, the NRPs indentified by the following NRP-IDs:
NRP1, NRP2, NRP3 and NRP4 are not sharing any bandwidths between each
other. In Figure 2b, the NRPs: NRP1 and NRP2 can share the
available bandwidth portion allocated to each amongst them.
Similarly, NRP3 and NRP4 can share amongst themselves any available bandwidth
allocated to them, but they cannot share available bandwidth allocated to
NRP1 or NRP2.  In both cases, the Max Reservable Bandwidth may exceed the
actual physical link resource capacity to allow for over subscription.</t>

<figure title="Bandwidth isolation/sharing among NRPs." anchor="resource-sharing"><artwork><![CDATA[
   I-----------------------------I       I-----------------------------I 
   <--NRP1->                     I       I-----------------I           I
   I---------I                   I       I <-NRP1->        I           I
   I         I                   I       I I-------I       I           I
   I---------I                   I       I I       I       I           I
   I                             I       I I-------I       I           I
   <-----NRP2------>             I       I                 I           I
   I-----------------I           I       I <-NRP2->        I           I
   I                 I           I       I I---------I     I           I
   I-----------------I           I       I I         I     I           I
   I                             I       I I---------I     I           I
   <---NRP3---->                 I       I                 I           I
   I-------------I               I       I NRP1 + NRP2     I           I
   I             I               I       I-----------------I           I
   I-------------I               I       I                             I
   I                             I       I                             I
   <---NRP4---->                 I       I-----------------I           I
   I-------------I               I       I <-NRP3->        I           I
   I             I               I       I I-------I       I           I
   I-------------I               I       I I       I       I           I
   I                             I       I I-------I       I           I
   I NRP1+NRP2+NRP3+NRP4         I       I                 I           I
   I                             I       I <-NRP4->        I           I
   I-----------------------------I       I I---------I     I           I
   <--Max Reservable Bandwidth-->        I I         I     I           I
                                         I I---------I     I           I
                                         I                 I           I
                                         I NRP3 + NRP4     I           I
                                         I-----------------I           I
                                         I NRP1+NRP2+NRP3+NRP4         I
                                         I                             I
                                         I-----------------------------I
                                         <--Max Reservable Bandwidth-->

   (a) No bandwidth sharing              (b) Sharing bandwidth between
       between NRPs.                         NRPs of the same group. 

]]></artwork></figure>

</section>
<section anchor="data-and-control-plane-network-resource-partition-mode" title="Data and Control Plane Network Resource Partition Mode">

<t>In order to support strict guarantees for Slice-Flow
Aggregates, the network resources can be partitioned in both the control plane
and data plane.</t>

<t>The control plane partitioning allows the creation of customized topologies per
NRP that each supports a Slice-Flow Aggregate. The ingress routers or a Path
Computation Engine (PCE) may use the customized topologies and the NRP state
to determine optimal path placement for specific demand flows using NRP-TE.</t>

<t>The data plane partitioning provides isolation for Slice-Flow Aggregate traffic, and
protection when resource contention occurs due to bursts of traffic from other Slice-Flow
Aggregate traffic that traverses the same shared network resource.</t>

</section>
</section>
<section anchor="SlicePolicyInstantiation" title="Network Resource Partition Instantiation">

<t>A network slice can span multiple technologies and multiple administrative
domains.  Depending on the network slice customer requirements, a network
slice can be differentiated from other network slices in terms of data, control,
and management planes.</t>

<t>The customer of a network slice service expresses their intent
by specifying requirements rather than mechanisms to realize the slice as described
in <xref target="NetworkSliceServiceRequest"/>.</t>

<t>The network slice controller is fed with the network slice service
intent and realizes it with an appropriate Network Resource Partition Policy (NRP Policy).
Multiple IETF network slices MAY be mapped to the same Slice-Flow Aggregate as described in <xref target="SliceAggregateMapping"/>.</t>

<t>The network wide consistent NRP Policy definition is distributed to the
devices in the network as shown in <xref target="ns-workflow"/>. The specification of
the network slice intent on the northbound interface of the controller and the
mechanism used to map the network slice to a Slice-Flow Aggregate are outside the scope
of this document and will be addressed in separate documents.</t>

<section anchor="SliceDefinition" title="NRP Policy Definition">

<t>The NRP Policy is network-wide construct that is supplied to network devices,
and may include rules that control the following:</t>

<t><list style="symbols">
  <t>Data plane specific policies: This includes the FAS, any firewall rules or
flow-spec filters, and QoS profiles associated with the NRP Policy and any
classes within it.</t>
  <t>Control plane specific policies: This includes bandwidth reservations, any
network resource sharing amongst slice policies, and reservation preference to
prioritize reservations of a specific NRP over others.</t>
  <t>Topology membership policies: This defines the topology filter policies that dictate
node/link/function membership to a specific NRP.</t>
</list></t>

<t>There is a desire for flexibility in realizing network slices to support the
services across networks consisting of implementations from multiple vendors.  These
networks may also be grouped into disparate domains and deploy various path
control technologies and tunnel techniques to carry traffic across the network.
It is expected that a standardized data model for NRP
Policy will facilitate the instantiation and management of the NRP
on the topological elements selected by the NRP
Policy topology filter.  A YANG data model for the Network Resource
Partition Policy instantiation on the controller and network devices is
described in <xref target="I-D.bestbar-teas-yang-slice-policy"/>.</t>

<t>It is also possible to distribute the NRP Policy to
network devices using several mechanisms, including protocols such as NETCONF
or RESTCONF, or exchanging it using a suitable routing protocol that network
devices participate in (such as IGP(s) or BGP). The extensions to enable
specific protocols to carry an NRP Policy definition will
be described in separate documents.</t>

<section anchor="SliceSelector" title="Network Resource Partition Data Plane Selector">

<t>A router MUST be able to identify a packet belonging to a Slice-Flow Aggregate
before it can apply the associated dataplane forwarding treatment or NRP-PHB.
One or more fields within the packet MAY be used as an FAS to do this.</t>

<t>Forwarding Address Based Selector:</t>

<t><list style='empty'>
  <t>It is possible to assign a different forwarding address (or MPLS forwarding
 label in case of MPLS network) for each Slice-Flow Aggregate on a specific node
 in the network. <xref target="RFC3031"/> states in Section 2.1 that: ‘Some routers
 analyze a packet’s network layer header not merely to choose the packet’s
 next hop, but also to determine a packet’s “precedence” or “class of
 service”’. Assigning a unique forwarding address (or MPLS forwarding label)
 to each Slice-Flow Aggregate allows Slice-Flow Aggregate packets destined to a node
 to be distinguished by the destination address (or
 MPLS forwarding label) that is carried in the packet.</t>
</list></t>

<t><list style='empty'>
  <t>This approach requires maintaining per Slice-Flow Aggregate state
for each destination in the network in both the control and data plane and on
each router in the network. For example, consider a network slicing provider
with a network composed of ‘N’ nodes, each with ‘K’ adjacencies to its
neighbors.  Assuming a node can be reached over ‘M’ different Slice-Flow Aggregates,
the node assigns and advertises reachability to ‘N’ unique
forwarding addresses, or MPLS forwarding labels.
Similarly, each node assigns a unique forwarding address
(or MPLS forwarding label) for each of its ‘K’ adjacencies to enable strict
steering over the adjacency for each slice.  The total number of control and data plane states that
need to be stored and programmed in a router’s forwarding is (N+K)*M states.
Hence, as ‘N’, ‘K’, and ‘M’ parameters increase, this approach suffers from scalability challenges
in both the control and data planes.</t>
</list></t>

<t>Global Identifier Based Selector:</t>

<t><list style='empty'>
  <t>An NRP Policy MAY include a Global Identifier FAS (GIS) field as defined in <xref target="I-D.kompella-mpls-mspl4fa"/> that is carried
in each packet in order to associate it to the NRP supporting a Slice-Flow Aggregate,
independent of the forwarding address or MPLS forwarding label that is bound to
the destination. Routers within the NRP domain can use the forwarding
address (or MPLS forwarding label) to determine the forwarding next-hop(s),
and use the GIS field in the packet to infer the specific forwarding treatment that needs to be applied on
the packet.</t>
</list></t>

<t><list style='empty'>
  <t>The GIS can be carried in one of multiple fields within the packet, depending on
the dataplane used. For example, in MPLS networks, the GIS can be
encoded within an MPLS label that is carried in the packet’s MPLS label stack.
All packets that belong to the same Slice-Flow Aggregate MAY carry the same GIS in the
MPLS label stack. It is also possible to have multiple GIS’s map
to the same Slice-Flow Aggregate.</t>
</list></t>

<t><list style='empty'>
  <t>The GIS can be encoded in an MPLS label and may appear in several positions in the MPLS label stack.
For example, the VPN service label may act as a GIS to allow VPN packets
to be mapped to the Slice-Flow Aggregate. In this case, a single VPN service label
acting as a GIS MAY be allocated by all Egress PEs of a VPN.
Alternatively, multiple VPN service labels MAY act as GIS’s that map a single VPN to the same Slice-Flow Aggregate to
allow for multiple Egress PEs to allocate different VPN service labels for a VPN.
In other cases, a range of VPN service labels acting as multiple GIS’s MAY map multiple VPN traffic to
a single Slice-Flow Aggregate. An example of such deployment is shown in <xref target="bottom-stack"/>.</t>
</list></t>

<figure title="GIS or VPN label at bottom of label stack." anchor="bottom-stack"><artwork><![CDATA[
  SR Adj-SID:          GIS (VPN service label) on PE2: 1001
     9012: P1-P2
     9023: P2-PE2

         /-----\        /-----\        /-----\       /-----\
         | PE1 | -----  | P1  | ------ | P2  |------ | PE2 |
         \-----/        \-----/        \-----/       \-----/

In 
packet: 
+------+       +------+         +------+        +------+
| IP   |       | 9012 |         | 9023 |        | 1001 |
+------+       +------+         +------+        +------+
| Pay- |       | 9023 |         | 1001 |        | IP   | 
| Load |       +------+         +------+        +------+
+----- +       | 1001 |         | IP   |        | Pay- |
               +------+         +------+        | Load |
               | IP   |         | Pay- |        +------+
               +------+         | Load |
               | Pay- |         +------+
               | Load |
               +------+
]]></artwork></figure>

<t><list style='empty'>
  <t>In some cases, the position of the GIS may not be at a fixed position
in the MPLS label header. In this case, the GIS label can show up in any
position in the MPLS label stack. To enable a transit router to identify
the position of the GIS label, a special purpose label (ideally a base
special purpose label (bSPL)) can be used to indicate the presence of a GIS
in the MPLS label stack. <xref target="I-D.kompella-mpls-mspl4fa"/>
proposes a new bSPL called Forwarding Actions Identifier (FAI) that is assigned
to alert of the presence of multiple actions and action data (including the
presence of the GIS). The NRP ingress boundary node, in
this case, imposes two labels: the FAI label and a forwarding actions label that includes the GIS
to identify the Slice-Flow Aggregate packets as shown in
<xref target="sli-sl"/>.</t>
</list></t>

<t><list style='empty'>
  <t><xref target="I-D.decraene-mpls-slid-encoded-entropy-label-id"/> also proposes to repurpose 
the ELI/EL <xref target="RFC6790"/> to carry the Slice Identifier in order to minimize the
size of the MPLS stack and ease incremental deployment.</t>
</list></t>

<figure title="FAI and GIS label in the label stack." anchor="sli-sl"><artwork><![CDATA[
     SR Adj-SID:          GIS: 1001
        9012: P1-P2
        9023: P2-PE2

            /-----\        /-----\        /-----\       /-----\
            | PE1 | -----  | P1  | ------ | P2  |------ | PE2 |
            \-----/        \-----/        \-----/       \-----/

   In
   packet:
   +------+       +------+         +------+        +------+
   | IP   |       | 9012 |         | 9023 |        | FAI  |
   +------+       +------+         +------+        +------+
   | Pay- |       | 9023 |         | FAI  |        | 1001 |
   | Load |       +------+         +------+        +------+
   +------+       | FAI  |         | 1001 |        | IP   |
                  +------+         +------+        +------+
                  | 1001 |         | IP   |        | Pay- |
                  +------+         +------+        | Load |
                  | IP   |         | Pay- |        +------+
                  +------+         | Load |
                  | Pay- |         +------+
                  | Load |
                  +------+
]]></artwork></figure>

<t><list style='empty'>
  <t>When the slice is realized over an IP dataplane, the GIS can be encoded in
the IP header. For example, the GIS can be encoded in portion of the IPv6
Flow Label field as described in <xref target="I-D.filsfils-spring-srv6-stateless-slice-id"/>.</t>
</list></t>

<t>A detailed review of NRP scale considerations is presented in <xref target="I-D.dong-teas-nrp-scalability"/>.</t>

</section>
<section anchor="network-resource-partition-resource-reservation" title="Network Resource Partition Resource Reservation">

<t>Bandwidth and network resource allocation strategies for slice policies are
essential to achieve optimal placement of paths within the
network while still meeting the target SLOs.</t>

<t>Resource reservation allows for the management of available bandwidth and the
prioritization of existing allocations to enable preference-based preemption
when contention on a specific network resource arises. Sharing of a network
resource’s available bandwidth amongst a group of NRPs
may also be desirable.  For example, a Slice-Flow Aggregate may not be using all of
the NRP reservable bandwidth; this allows other NRPs in
the same group to use the available bandwidth resources for other Slice-Flow
Aggregates.</t>

<t>Congestion on shared network resources may result from sub-optimal placement
of paths in different slice policies. When this occurs, preemption
of some Slice-Flow Aggregate paths may be desirable to alleviate congestion.
A preference-based allocation scheme enables prioritization of Slice-Flow Aggregate paths
that can be preempted.</t>

<t>Since network characteristics and its state can change over time, the NRP
topology and its network state need to be propagated in the network to enable
ingress TE routers or Path Computation Engine (PCEs) to perform accurate path placement
based on the current state of the NRP network resources.</t>

</section>
<section anchor="SlicePHB" title="Network Resource Partition Per Hop Behavior">

<t>In Diffserv terminology, the forwarding behavior that is assigned to a specific
class is called a Per Hop Behavior (PHB). The PHB defines the forwarding
precedence that a marked packet with a specific CS receives in relation to
other traffic on the Diffserv-aware network.</t>

<t>The NRP Per Hop Behavior (NRP-PHB) is the externally
observable forwarding behavior applied to a specific packet belonging to a
Slice-Flow Aggregate. The goal of an NRP-PHB is to provide a specified amount
of network resources for traffic belonging to a specific Slice-Flow Aggregate.
A single NRP may also support multiple forwarding
treatments or services that can be carried over the same logical network.</t>

<t>The Slice-Flow Aggregate traffic may be identified at NRP ingress boundary
nodes by carrying a FAS to allow routers to apply a specific forwarding
treatment that guarantee the SLA(s).</t>

<t>With Differentiated Services (Diffserv) it is possible to carry  multiple
services over a single converged network. Packets requiring the same forwarding
treatment are marked with a CS at domain ingress nodes. Up to
eight classes or Behavior Aggregates (BAs) may be supported for a given
Forwarding Equivalence Class (FEC) <xref target="RFC2475"/>.  To support multiple
forwarding treatments over the same Slice-Flow Aggregate, a Slice-Flow Aggregate packet MAY
also carry a Diffserv CS to identify the specific Diffserv forwarding treatment
to be applied on the traffic belonging to the same NRP.</t>

<t>At transit nodes, the CS field carried inside the packets are used to determine the
specific PHB that determines the forwarding and scheduling
treatment before packets are forwarded, and in some cases, drop probability for
each packet.</t>

</section>
<section anchor="SlicePolicyTopology" title="Network Resource Partition Topology">

<t>A key element of the NRP Policy is a customized topology that may include the
full or subset of the physical network topology. The NRP topology
could also span multiple administrative domains and/or multiple dataplane
technologies.</t>

<t>An NRP topology can overlap or share a subset of links
with another NRP topology. A number of topology
filtering policies can be defined as part of the NRP
Policy to limit the specific topology elements that belong to the NRP.
For example, a topology filtering policy can leverage Resource
Affinities as defined in <xref target="RFC2702"/> to include or exclude certain links that
the NRP is instantiated on in supports of the Slice-Flow
Aggregate.</t>

<t>The NRP Policy may also include a reference to a
predefined topology (e.g., derived from a Flexible Algorithm Definition (FAD)
as defined in <xref target="I-D.ietf-lsr-flex-algo"/>, or Multi-Topology ID as defined
<xref target="RFC4915"/>. A YANG data model that covers generic topology filters is described
in <xref target="I-D.bestbar-teas-yang-topology-filter"/>. Also, the Path Computation Element (PCE) Communication Protocol (PCEP) extensions to carry
topology filters are defined in <xref target="I-D.xpbs-pce-topology-filter"/>.</t>

</section>
</section>
<section anchor="network-resource-partition-boundary" title="Network Resource Partition Boundary">

<t>A network slice originates at the edge nodes of a network slice provider.
Traffic that is steered over the corresponding NRP
supporting a Slice-Flow Aggregate may traverse NRP
capable as well as NRP incapable interior nodes.</t>

<t>The network slice may encompass one or more domains administered by a provider.
For example, an organization’s intranet or an ISP.  The network provider
is responsible for ensuring that adequate network resources are
provisioned and/or reserved to support the SLAs offered by the network
end-to-end.</t>

<section anchor="network-resource-partition-edge-nodes" title="Network Resource Partition Edge Nodes">

<t>NRP edge nodes sit at the boundary of a network slice provider network
and receive traffic that requires steering over network resources specific to a
NRP that supports a Slice-Flow Aggregate. These edge nodes are responsible for identifying Slice-Flow
Aggregate specific traffic flows by possibly inspecting multiple fields from
inbound packets (e.g., implementations may inspect IP traffic’s network 5-tuple
in the IP and transport protocol headers) to decide on which NRP it
can be steered.</t>

<t>Network slice ingress nodes may condition the inbound traffic at network boundaries in
accordance with the requirements or rules of each service’s SLAs.  The
requirements and rules for network slice services are set using
mechanisms which are outside the scope of this document.</t>

<t>When data plane NRP mode is employed, the NRP
ingress nodes are responsible for adding a suitable FAS onto
packets that belong to specific Slice-Flow Aggregate.  In addition, edge nodes
MAY mark the corresponding Diffserv CS to differentiate between different types
of traffic carried over the same Slice-Flow Aggregate.</t>

</section>
<section anchor="network-resource-partition-interior-nodes" title="Network Resource Partition Interior Nodes">

<t>An NRP interior node receives slice traffic and MAY be able to identify the
packets belonging to a specific Slice-Flow Aggregate by inspecting the FAS
field carried inside each packet, or by inspecting other fields
within the packet that may identify the traffic streams that belong to a specific
Slice-Flow Aggregate. For example, when data plane NRP mode is applied, interior
nodes can use the FAS carried within the packet to apply the corresponding NRP-PHB
forwarding behavior. Nodes within the network slice provider network may also
inspect the Diffserv CS within each packet to apply a per Diffserv class PHB
within the NRP Policy, and allow differentiation of forwarding treatments
for packets forwarded over the same NRP that supports the
Slice-Flow Aggregate.</t>

</section>
<section anchor="network-resource-partition-incapable-nodes" title="Network Resource Partition Incapable Nodes">

<t>Packets that belong to a Slice-Flow Aggregate may need to traverse nodes that are
NRP incapable. In this case, several options are possible to
allow the slice traffic to continue to be forwarded over such devices
and be able to resume the NRP forwarding treatment once the traffic
reaches devices that are NRP-capable.</t>

<t>When data plane NRP mode is employed, packets carry a FAS to
allow slice interior nodes to identify them. To support end-to-end network
slicing, the FAS MUST be maintained in the packets as they traverse
devices within the network – including NRP capable and incapable devices.</t>

<t>For example, when the FAS is an MPLS label at the bottom of the MPLS label
stack, packets can traverse over devices that are NRP incapable 
without any further considerations. On the other hand when the FASL
is at the top of the MPLS label stack, packets can be bypassed (or tunneled)
over the NRP incapable devices towards the next device that
supports NRP as shown in <xref target="sl-interworking"/>.</t>

<figure title="Extending network slice over NRP incapable device(s)." anchor="sl-interworking"><artwork><![CDATA[
  SR Node-SID:           FASL: 1001    @@@: NRP Policy enforced
     1601: P1                          ...: NRP Policy not enforced
     1602: P2
     1603: P3
     1604: P4
     1605: P5

            @@@@@@@@@@@@@@ ........................
                                                  .
           /-----\        /-----\        /-----\  .
           | P1  | -----  | P2  | ----- | P3  |   .
           \-----/        \-----/        \-----/  .
                                            |     @@@@@@@@@@
                                            |     
                                         /-----\        /-----\ 
                                         | P4  | ------ | P5  |
                                         \-----/        \-----/


            +------+       +------+        +------+     
            | 1001 |       | 1604 |        | 1001 |     
            +------+       +------+        +------+     
            | 1605 |       | 1001 |        | IP   |     
            +------+       +------+        +------+     
            | IP   |       | 1605 |        | Pay- |     
            +------+       +------+        | Load |     
            | Pay- |       | IP   |        +------+     
            | Load |       +------+                     
            +----- +       | Pay- |                     
                           | Load |                     
                           +------+                     
]]></artwork></figure>

</section>
<section anchor="combining-network-resource-partition-modes" title="Combining Network Resource Partition Modes">

<t>It is possible to employ a combination of the NRP modes that were
discussed in <xref target="SliceModes"/> to realize a network slice. For example, data and
control plane NRP modes can be employed in parts of a network, while
control plane NRP mode can be employed in the other parts of the
network. The path selection, in such case, can take into
account the NRP available network resources.  The FAS carried within
packets allow transit nodes to enforce the corresponding NRP-PHB on the parts of the
network that apply the data plane NRP mode. The FAS can be
maintained while traffic traverses nodes that do not enforce data plane NRP
mode, and so slice PHB enforcement can resume once traffic traverses
capable nodes.</t>

</section>
</section>
<section anchor="mapping-traffic-on-slice-flow-aggregates" title="Mapping Traffic on Slice-Flow Aggregates">

<t>The usual techniques to steer traffic onto paths can be applicable when
steering traffic over paths established for a specific Slice-Flow Aggregate.</t>

<t>For example, one or more (layer-2 or layer-3) VPN services can be directly
mapped to paths established for a Slice-Flow Aggregate. In this case, the per
Virtual Routing and Forwarding (VRF) instance traffic that arrives on the
Provider Edge (PE) router over external interfaces can be directly mapped to a
specific Slice-Flow Aggregate path. External interfaces can be further
partitioned (e.g., using VLANs) to allow mapping one or more VLANs to specific
Slice-Flow Aggregate paths.</t>

<t>Another option is steer traffic to specific destinations directly over multiple
slice policies. This allows traffic arriving on any external interface and
targeted to such destinations to be directly steered over the slice paths.</t>

<t>A third option that can also be used is to utilize a data plane firewall filter
or classifier to enable matching of several fields in the incoming packets to
decide whether the packet belongs to a specific Slice-Flow Aggregate. This option
allows for applying a rich set of rules to identify specific packets to be
mapped to a Slice-Flow Aggregate. However, it requires data plane network resources to
be able to perform the additional checks in hardware.</t>

</section>
</section>
<section anchor="path-selection-and-instantiation" title="Path Selection and Instantiation">

<section anchor="applicability-of-path-selection-to-slice-flow-aggregates" title="Applicability of Path Selection to Slice-Flow Aggregates">

<t>The path selection in the network can be network state dependent, or network state
independent as described in Section 5.1 of <xref target="I-D.ietf-teas-rfc3272bis"/>.
The latter is the choice commonly used by IGPs when selecting a best path to
a destination prefix, while the former is used by ingress TE routers, or Path
Computation Engines (PCEs) when optimizing the placement of a flow based on the
current network resource utilization.</t>

<t>When path selection is network state dependent, the path computation can 
leverage Traffic Engineering mechanisms (e.g., as defined in <xref target="RFC2702"/>)
to compute feasible paths taking into account the incoming traffic demand
rate and current state of network. This allows avoiding overly utilized
links, and reduces the chance of congestion on traversed links.</t>

<t>To enable TE path placement, the link state is advertised with current
reservations, thereby reflecting the available bandwidth on each link.  Such
link reservations may be maintained centrally on a network wide network
resource manager, or distributed on devices (as usually done with RSVP). TE
extensions exist today to allow IGPs (e.g., <xref target="RFC3630"/> and <xref target="RFC5305"/>), and
BGP-LS <xref target="RFC7752"/> to advertise such link state reservations.</t>

<t>When the network resource reservations are maintained for NRPs,
the link state can carry per NRP state (e.g.,
reservable bandwidth).  This allows path computation to take into account the
specific network resources available for an NRP.  In this
case, we refer to the process of path placement and path provisioning as NRP
aware TE (NRP-TE).</t>

</section>
<section anchor="applicability-of-path-control-technologies-to-slice-flow-aggregates" title="Applicability of Path Control Technologies to Slice-Flow Aggregates">

<t>The NRP modes described in this document are agnostic to the
technology used to setup paths that carry Slice-Flow Aggregate traffic.
One or more paths connecting the endpoints of the mapped IETF network
slices may be selected to steer the corresponding traffic streams
over the resources allocated for the NRP that
supports a Slice-Flow Aggregate.</t>

<t>The feasible paths can be computed using the NRP topology and network state
subject the optimization metrics and constraints.</t>

<section anchor="rsvp-te-based-slice-flow-aggregate-paths" title="RSVP-TE Based Slice-Flow Aggregate Paths">

<t>RSVP-TE <xref target="RFC3209"/> can be used to signal LSPs over the computed feasible paths
in order to carry the Slice-Flow Aggregate traffic. The specific extensions to the RSVP-TE
protocol required to enable signaling of NRP aware RSVP LSPs are
outside the scope of this document.</t>

</section>
<section anchor="sr-based-slice-flow-aggregate-paths" title="SR Based Slice-Flow Aggregate Paths">

<t>Segment Routing (SR) <xref target="RFC8402"/> can be used to setup and steer traffic over
the computed Slice-Flow Aggregate feasible paths.</t>

<t>The SR architecture defines a number of building blocks that can be leveraged to support
the realization of NRPs that support Slice-Flow Aggregates in an SR network.</t>

<t>Such building blocks include:</t>

<t><list style="symbols">
  <t>SR Policy with or without Flexible Algorithm.</t>
  <t>Steering of services (e.g. VPN) traffic over SR paths</t>
  <t>SR Operation, Administration and Management (OAM) and Performance Management (PM)</t>
</list></t>

<t>SR allows a headend node to steer packets onto specific SR paths using
a Segment Routing Policy (SR Policy). The SR policy supports various
optimization objectives and constraints and can be used to steer Slice-Flow Aggregate
traffic in the SR network.</t>

<t>The SR policy can be instantiated with or without the IGP Flexible Algorithm
(Flex-Algorithm) feature.  It may be possible to dedicate a single SR
Flex-Algorithm to compute and instantiate SR paths for one Slice-Flow Aggregate
traffic. In this case, the SR Flex-Algorithm computed paths and Flex-Algorithm
SR SIDs are not shared by other Slice-Flow Aggregates traffic. However, to allow for better
scale, it may be desirable for multiple Slice-Flow Aggregates traffic to share the
same SR Flex-Algorithm computed paths and SIDs. Further details on how the
NRP modes presented in this document can be realized in an SR network
are discussed in <xref target="I-D.bestbar-spring-scalable-ns"/>, and
<xref target="I-D.bestbar-lsr-spring-sa"/>.</t>

</section>
</section>
</section>
<section anchor="network-resource-partition-protocol-extensions" title="Network Resource Partition Protocol Extensions">

<t>Routing protocols may need to be extended to carry additional per NRP link
state. For example, <xref target="RFC5305"/>, <xref target="RFC3630"/>, and <xref target="RFC7752"/> are ISIS, OSPF, and BGP
protocol extensions to exchange network link state information to allow
ingress TE routers and PCE(s) to do proper path placement in the network.  The
extensions required to support network slicing may be defined in other
documents, and are outside the scope of this document.</t>

<t>The instantiation of an NRP Policy may need to be automated. Multiple options
are possible to facilitate automation of distribution of an NRP Policy to
capable devices.</t>

<t>For example, a YANG data model for the NRP Policy may be
supported on network devices and controllers. A suitable transport (e.g.,
NETCONF <xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>, or gRPC) may be used to enable
configuration and retrieval of state information for slice policies on network
devices. The NRP Policy YANG data model is outside the scope of this
document, and is defined in <xref target="I-D.bestbar-teas-yang-slice-policy"/>.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document has no IANA actions.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The main goal of network slicing is to allow for varying treatment of
traffic from multiple different network slices that are utilizing a common
network infrastructure and to allow for different levels of services to be
provided for traffic traversing a given network resource.</t>

<t>A variety of techniques may be used to achieve this, but the end result will be
that some packets may be mapped to specific resources and may receive
different (e.g., better) service treatment than others.  The mapping of network
traffic to a specific NRP is indicated primarily by the FAS, and hence an
adversary may be able to utilize resources allocated to a specific 
NRP by injecting packets carrying the same FAS field in their packets.</t>

<t>Such theft-of-service may become a denial-of-service attack when the modified
or injected traffic depletes the resources available to forward legitimate
traffic belonging to a specific NRP.</t>

<t>The defense against this type of theft and denial-of-service attacks consists
of a combination of traffic conditioning at NRP domain boundaries
with security and integrity of the network infrastructure within an NRP
domain.</t>

</section>
<section anchor="acknowledgement" title="Acknowledgement">

<t>The authors would like to thank Krzysztof Szarkowicz, Swamy SRK, Navaneetha
Krishnan, Prabhu Raj Villadathu Karunakaran, Jie Dong, and Mohamed Boucadair
for their review of this document and for providing valuable feedback on it.
The authors would also like to thank Adrian Farrel for detailed discussions
that resulted in <xref target="NSRealization"/>.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The following individuals contributed to this document:</t>

<figure><artwork><![CDATA[
   Colby Barth
   Juniper Networks
   Email: cbarth@juniper.net

   Srihari R.  Sangli
   Juniper Networks
   Email: ssangli@juniper.net

   Chandra Ramachandran
   Juniper Networks
   Email: csekar@juniper.net
]]></artwork></figure>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>


<reference anchor='I-D.ietf-lsr-flex-algo'>
   <front>
      <title>IGP Flexible Algorithm</title>
      <author fullname='Peter Psenak'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Shraddha Hegde'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Ketan Talaulikar'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Arkadiy Gulko'>
	 <organization>Edward Jones</organization>
      </author>
      <date day='25' month='October' year='2021'/>
      <abstract>
	 <t>   IGP protocols traditionally compute best paths over the network based
   on the IGP metric assigned to the links.  Many network deployments
   use RSVP-TE based or Segment Routing based Traffic Engineering to
   steer traffic over a path that is computed using different metrics or
   constraints than the shortest IGP path.  This document proposes a
   solution that allows IGPs themselves to compute constraint-based
   paths over the network.  This document also specifies a way of using
   Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets
   along the constraint-based paths.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lsr-flex-algo-18'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-lsr-flex-algo-18.txt' type='TXT'/>
</reference>


<reference anchor='I-D.bestbar-teas-yang-slice-policy'>
   <front>
      <title>YANG Data Model for Slice Policy</title>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Daniele Ceccarelli'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Ran Chen'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Luis M. Contreras'>
	 <organization>Telefonica</organization>
      </author>
      <author fullname='Xufeng Liu'>
	 <organization>Volta Networks</organization>
      </author>
      <date day='25' month='October' year='2021'/>
      <abstract>
	 <t>   A slice policy is a policy construct that enables instantiation of
   mechanisms in support of IETF network slice specific control and data
   plane behaviors on select topological elements.  This document
   defines a YANG data model for the management of slice policies on
   slice policy capable nodes and controllers in IP/MPLS networks.


	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-teas-yang-slice-policy-02'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-teas-yang-slice-policy-02.txt' type='TXT'/>
</reference>



<reference anchor='RFC3031' target='https://www.rfc-editor.org/info/rfc3031'>
<front>
<title>Multiprotocol Label Switching Architecture</title>
<author fullname='E. Rosen' initials='E.' surname='Rosen'><organization/></author>
<author fullname='A. Viswanathan' initials='A.' surname='Viswanathan'><organization/></author>
<author fullname='R. Callon' initials='R.' surname='Callon'><organization/></author>
<date month='January' year='2001'/>
<abstract><t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3031'/>
<seriesInfo name='DOI' value='10.17487/RFC3031'/>
</reference>


<reference anchor='I-D.kompella-mpls-mspl4fa'>
   <front>
      <title>Multi-purpose Special Purpose Label for Forwarding Actions</title>
      <author fullname='Kireeti Kompella'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Israel Meilik'>
	 <organization>Broadcom</organization>
      </author>
      <date day='12' month='July' year='2021'/>
      <abstract>
	 <t>   A Slice Selector is packet metadata that dictates the packet&#39;s
   forwarding handling in order to conform to its slice requirements.
   There are multiple proposals for carrying slice selectors in MPLS
   networks.  One of the more practical proposals is the &quot;Global
   Identifier for Slice Selector&quot; (GISS).  Global uniqueness requires
   the GISS label be identified as such, via a special purpose label
   (ideally a base special purpose label (bSPL)).  However, bSPLs are a
   precious commodity, and there are many requests for them.  This
   document serves two purposes: to define a bSPL for carrying a GISS,
   and to show how this bSPL can consolidate many current requests for
   special purpose labels while carrying associated data compactly and
   efficiently.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kompella-mpls-mspl4fa-01'/>
   <format target='https://www.ietf.org/archive/id/draft-kompella-mpls-mspl4fa-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC6790' target='https://www.rfc-editor.org/info/rfc6790'>
<front>
<title>The Use of Entropy Labels in MPLS Forwarding</title>
<author fullname='K. Kompella' initials='K.' surname='Kompella'><organization/></author>
<author fullname='J. Drake' initials='J.' surname='Drake'><organization/></author>
<author fullname='S. Amante' initials='S.' surname='Amante'><organization/></author>
<author fullname='W. Henderickx' initials='W.' surname='Henderickx'><organization/></author>
<author fullname='L. Yong' initials='L.' surname='Yong'><organization/></author>
<date month='November' year='2012'/>
<abstract><t>Load balancing is a powerful tool for engineering traffic across a network.  This memo suggests ways of improving load balancing across MPLS networks using the concept of &quot;entropy labels&quot;.  It defines the concept, describes why entropy labels are useful, enumerates properties of entropy labels that allow maximal benefit, and shows how they can be signaled and used for various applications.  This document updates RFCs 3031, 3107, 3209, and 5036.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6790'/>
<seriesInfo name='DOI' value='10.17487/RFC6790'/>
</reference>



<reference anchor='RFC4915' target='https://www.rfc-editor.org/info/rfc4915'>
<front>
<title>Multi-Topology (MT) Routing in OSPF</title>
<author fullname='P. Psenak' initials='P.' surname='Psenak'><organization/></author>
<author fullname='S. Mirtorabi' initials='S.' surname='Mirtorabi'><organization/></author>
<author fullname='A. Roy' initials='A.' surname='Roy'><organization/></author>
<author fullname='L. Nguyen' initials='L.' surname='Nguyen'><organization/></author>
<author fullname='P. Pillay-Esnault' initials='P.' surname='Pillay-Esnault'><organization/></author>
<date month='June' year='2007'/>
<abstract><t>This document describes an extension to Open Shortest Path First (OSPF) in order to define independent IP topologies called Multi- Topologies (MTs).  The Multi-Topologies extension can be used for computing different paths for unicast traffic, multicast traffic, different classes of service based on flexible criteria, or an in- band network management topology.</t><t>An optional extension to exclude selected links from the default topology is also described.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4915'/>
<seriesInfo name='DOI' value='10.17487/RFC4915'/>
</reference>



<reference anchor='RFC3630' target='https://www.rfc-editor.org/info/rfc3630'>
<front>
<title>Traffic Engineering (TE) Extensions to OSPF Version 2</title>
<author fullname='D. Katz' initials='D.' surname='Katz'><organization/></author>
<author fullname='K. Kompella' initials='K.' surname='Kompella'><organization/></author>
<author fullname='D. Yeung' initials='D.' surname='Yeung'><organization/></author>
<date month='September' year='2003'/>
<abstract><t>This document describes extensions to the OSPF protocol version 2 to support intra-area Traffic Engineering (TE), using Opaque Link State Advertisements.</t></abstract>
</front>
<seriesInfo name='RFC' value='3630'/>
<seriesInfo name='DOI' value='10.17487/RFC3630'/>
</reference>



<reference anchor='RFC5305' target='https://www.rfc-editor.org/info/rfc5305'>
<front>
<title>IS-IS Extensions for Traffic Engineering</title>
<author fullname='T. Li' initials='T.' surname='Li'><organization/></author>
<author fullname='H. Smit' initials='H.' surname='Smit'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document describes extensions to the Intermediate System to Intermediate System (IS-IS) protocol to support Traffic Engineering (TE).  This document extends the IS-IS protocol by specifying new information that an Intermediate System (router) can place in Link State Protocol Data Units (LSP).  This information describes additional details regarding the state of the network that are useful for traffic engineering computations.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5305'/>
<seriesInfo name='DOI' value='10.17487/RFC5305'/>
</reference>



<reference anchor='RFC7752' target='https://www.rfc-editor.org/info/rfc7752'>
<front>
<title>North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP</title>
<author fullname='H. Gredler' initials='H.' role='editor' surname='Gredler'><organization/></author>
<author fullname='J. Medved' initials='J.' surname='Medved'><organization/></author>
<author fullname='S. Previdi' initials='S.' surname='Previdi'><organization/></author>
<author fullname='A. Farrel' initials='A.' surname='Farrel'><organization/></author>
<author fullname='S. Ray' initials='S.' surname='Ray'><organization/></author>
<date month='March' year='2016'/>
<abstract><t>In a number of environments, a component external to a network is called upon to perform computations based on the network topology and current state of the connections within the network, including Traffic Engineering (TE) information.  This is information typically distributed by IGP routing protocols within the network.</t><t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol.  This is achieved using a new BGP Network Layer Reachability Information (NLRI) encoding format.  The mechanism is applicable to physical and virtual IGP links.  The mechanism described is subject to policy control.</t><t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t></abstract>
</front>
<seriesInfo name='RFC' value='7752'/>
<seriesInfo name='DOI' value='10.17487/RFC7752'/>
</reference>



<reference anchor='RFC3209' target='https://www.rfc-editor.org/info/rfc3209'>
<front>
<title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
<author fullname='D. Awduche' initials='D.' surname='Awduche'><organization/></author>
<author fullname='L. Berger' initials='L.' surname='Berger'><organization/></author>
<author fullname='D. Gan' initials='D.' surname='Gan'><organization/></author>
<author fullname='T. Li' initials='T.' surname='Li'><organization/></author>
<author fullname='V. Srinivasan' initials='V.' surname='Srinivasan'><organization/></author>
<author fullname='G. Swallow' initials='G.' surname='Swallow'><organization/></author>
<date month='December' year='2001'/>
<abstract><t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching).  Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels.  A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3209'/>
<seriesInfo name='DOI' value='10.17487/RFC3209'/>
</reference>



<reference anchor='RFC8402' target='https://www.rfc-editor.org/info/rfc8402'>
<front>
<title>Segment Routing Architecture</title>
<author fullname='C. Filsfils' initials='C.' role='editor' surname='Filsfils'><organization/></author>
<author fullname='S. Previdi' initials='S.' role='editor' surname='Previdi'><organization/></author>
<author fullname='L. Ginsberg' initials='L.' surname='Ginsberg'><organization/></author>
<author fullname='B. Decraene' initials='B.' surname='Decraene'><organization/></author>
<author fullname='S. Litkowski' initials='S.' surname='Litkowski'><organization/></author>
<author fullname='R. Shakir' initials='R.' surname='Shakir'><organization/></author>
<date month='July' year='2018'/>
<abstract><t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called &quot;segments&quot;.  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t><t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t><t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t></abstract>
</front>
<seriesInfo name='RFC' value='8402'/>
<seriesInfo name='DOI' value='10.17487/RFC8402'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-teas-ietf-network-slices'>
   <front>
      <title>Framework for IETF Network Slices</title>
      <author fullname='Adrian Farrel'>
	 <organization>Old Dog Consulting</organization>
      </author>
      <author fullname='Eric Gray'>
	 <organization>Independent</organization>
      </author>
      <author fullname='John Drake'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Reza Rokui'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Shunsuke Homma'>
	 <organization>NTT</organization>
      </author>
      <author fullname='Kiran Makhijani'>
	 <organization>Futurewei</organization>
      </author>
      <author fullname='Luis M. Contreras'>
	 <organization>Telefonica</organization>
      </author>
      <author fullname='Jeff Tantsura'>
	 <organization>Microsoft Inc.</organization>
      </author>
      <date day='25' month='October' year='2021'/>
      <abstract>
	 <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term &quot;IETF Network
   Slice&quot; and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slices-05'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-teas-ietf-network-slices-05.txt' type='TXT'/>
</reference>



<reference anchor='RFC2475' target='https://www.rfc-editor.org/info/rfc2475'>
<front>
<title>An Architecture for Differentiated Services</title>
<author fullname='S. Blake' initials='S.' surname='Blake'><organization/></author>
<author fullname='D. Black' initials='D.' surname='Black'><organization/></author>
<author fullname='M. Carlson' initials='M.' surname='Carlson'><organization/></author>
<author fullname='E. Davies' initials='E.' surname='Davies'><organization/></author>
<author fullname='Z. Wang' initials='Z.' surname='Wang'><organization/></author>
<author fullname='W. Weiss' initials='W.' surname='Weiss'><organization/></author>
<date month='December' year='1998'/>
<abstract><t>This document defines an architecture for implementing scalable service differentiation in the Internet.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2475'/>
<seriesInfo name='DOI' value='10.17487/RFC2475'/>
</reference>



<reference anchor='RFC5462' target='https://www.rfc-editor.org/info/rfc5462'>
<front>
<title>Multiprotocol Label Switching (MPLS) Label Stack Entry: &quot;EXP&quot; Field Renamed to &quot;Traffic Class&quot; Field</title>
<author fullname='L. Andersson' initials='L.' surname='Andersson'><organization/></author>
<author fullname='R. Asati' initials='R.' surname='Asati'><organization/></author>
<date month='February' year='2009'/>
<abstract><t>The early Multiprotocol Label Switching (MPLS) documents defined the form of the MPLS label stack entry.  This includes a three-bit field called the &quot;EXP field&quot;.  The exact use of this field was not defined by these documents, except to state that it was to be &quot;reserved for experimental use&quot;.</t><t>Although the intended use of the EXP field was as a &quot;Class of Service&quot; (CoS) field, it was not named a CoS field by these early documents because the use of such a CoS field was not considered to be sufficiently defined.  Today a number of standards documents define its usage as a CoS field.</t><t>To avoid misunderstanding about how this field may be used, it has become increasingly necessary to rename this field.  This document changes the name of the field to the &quot;Traffic Class field&quot; (&quot;TC field&quot;).  In doing so, it also updates documents that define the current use of the EXP field.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5462'/>
<seriesInfo name='DOI' value='10.17487/RFC5462'/>
</reference>


<reference anchor='I-D.bestbar-lsr-slice-aware-te'>
   <front>
      <title>IGP Extensions for Support of Slice Aggregate Aware Traffic Engineering</title>
      <author fullname='William Britto'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Rajesh Shetty'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Colby Barth'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Ran Chen'>
	 <organization>ZTE Corporation</organization>
      </author>
      <date day='22' month='February' year='2021'/>
      <abstract>
	 <t>   A slice aggregate is a collection of packets that match a slice
   policy selection criteria and are given the same forwarding
   treatment.  Slice Aggregate aware Traffic Engineering (SA-TE) is a
   mechanism that facilitates Traffic Engineering (TE) path selection to
   take into account the available network resources associated with a
   specific slice aggregate.  This document specifies the Interior
   Gateway Protocol (IGP) extensions for support of SA-TE.  This
   includes the generalization of the semantics of a number of IGP
   extensions already defined for existing MPLS Traffic Engineering in
   [RFC3630], [RFC4124], [RFC5305] and additional IGP extensions beyond
   those.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-lsr-slice-aware-te-00'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-lsr-slice-aware-te-00.txt' type='TXT'/>
</reference>


<reference anchor='I-D.decraene-mpls-slid-encoded-entropy-label-id'>
   <front>
      <title>Using Entropy Label for Network Slice Identification in MPLS networks.</title>
      <author fullname='Bruno Decraene'>
	 <organization>Orange</organization>
      </author>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Wim Henderickx'>
	 <organization>Nokia</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Luay Jalil'>
	 <organization>Verizon</organization>
      </author>
      <date day='6' month='August' year='2021'/>
      <abstract>
	 <t>   This document defines a solution to encode a slice identifier in MPLS
   in order to distinguish packets that belong to different slices, to
   allow enforcing per network slice policies (.e.g, Qos).

   The slice identification is independent of the topology.  It allows
   for QoS/DiffServ policy on a per slice basis in addition to the per
   packet QoS/DiffServ policy provided by the MPLS Traffic Class field.

   In order to minimize the size of the MPLS stack and to ease
   incremental deployment the slice identifier is encoded as part of the
   Entropy Label.

   This document also extends the use of the TTL field of the Entropy
   Label in order to provide a flexible set of flags called the Entropy
   Label Control field.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-decraene-mpls-slid-encoded-entropy-label-id-02'/>
   <format target='https://www.ietf.org/archive/id/draft-decraene-mpls-slid-encoded-entropy-label-id-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.filsfils-spring-srv6-stateless-slice-id'>
   <front>
      <title>Stateless and Scalable Network Slice Identification for SRv6</title>
      <author fullname='Clarence Filsfils'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Francois Clad'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Pablo Camarillo'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Kamran Raza'>
	 <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Daniel Voyer'>
	 <organization>Bell Canada</organization>
      </author>
      <author fullname='Reza Rokui'>
	 <organization>Ciena</organization>
      </author>
      <date day='30' month='January' year='2022'/>
      <abstract>
	 <t>   This document defines a stateless and scalable solution to achieve
   network slicing with SRv6.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-filsfils-spring-srv6-stateless-slice-id-05'/>
   <format target='https://www.ietf.org/archive/id/draft-filsfils-spring-srv6-stateless-slice-id-05.txt' type='TXT'/>
</reference>


<reference anchor='I-D.dong-teas-nrp-scalability'>
   <front>
      <title>Scalability Considerations for Network Resource Partition</title>
      <author fullname='Jie Dong'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Zhenbin Li'>
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Liyan Gong'>
	 <organization>China Mobile</organization>
      </author>
      <author fullname='Guangming Yang'>
	 <organization>China Telecom</organization>
      </author>
      <author fullname='James N Guichard'>
	 <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Gyan Mishra'>
	 <organization>Verizon Inc.</organization>
      </author>
      <author fullname='Fengwei Qin'>
	 <organization>China Mobile</organization>
      </author>
      <date day='17' month='December' year='2021'/>
      <abstract>
	 <t>   IETF network slice service aims to meet the connectivity demands of a
   network slice customer with specific Service Level Objectives (SLOs)
   and Service Level Expectations (SLEs) over a common underlay network.
   A Network Resource Partition is a set of network resources that are
   allocated from the underlay network to carry a specific set of
   network traffic and meet the required SLOs and SLEs.  One or multiple
   IETF network slice services can be mapped to one network resource
   partition.

   With the demand for IETF network slice services increases,
   scalability would become an important factor for the large scale
   deployment of IETF network slices.  Although the scalability of IETF
   network slices can be improved by mapping a group of IETF network
   slices to one network resource partition, there are concerns about
   the scalability of network resource partitions.  This document
   describes the scalability considerations about network resource
   partition in the network control plane and data plane, and some
   optimization mechanisms are proposed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-dong-teas-nrp-scalability-00'/>
   <format target='https://www.ietf.org/archive/id/draft-dong-teas-nrp-scalability-00.txt' type='TXT'/>
</reference>



<reference anchor='RFC2702' target='https://www.rfc-editor.org/info/rfc2702'>
<front>
<title>Requirements for Traffic Engineering Over MPLS</title>
<author fullname='D. Awduche' initials='D.' surname='Awduche'><organization/></author>
<author fullname='J. Malcolm' initials='J.' surname='Malcolm'><organization/></author>
<author fullname='J. Agogbua' initials='J.' surname='Agogbua'><organization/></author>
<author fullname='M. O&apos;Dell' initials='M.' surname='O&apos;Dell'><organization/></author>
<author fullname='J. McManus' initials='J.' surname='McManus'><organization/></author>
<date month='September' year='1999'/>
<abstract><t>This document presents a set of requirements for Traffic Engineering over Multiprotocol Label Switching (MPLS).  It identifies the functional capabilities required to implement policies that facilitate efficient and reliable network operations in an MPLS domain.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2702'/>
<seriesInfo name='DOI' value='10.17487/RFC2702'/>
</reference>


<reference anchor='I-D.bestbar-teas-yang-topology-filter'>
   <front>
      <title>YANG Data Model for Topology Filter</title>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Rakesh Gandhi'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Xufeng Liu'>
	 <organization>Volta Networks</organization>
      </author>
      <date day='25' month='October' year='2021'/>
      <abstract>
	 <t>   This document defines a YANG data model for the management of
   topology filters/filter-sets on network elements and controllers.


	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-teas-yang-topology-filter-02'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-teas-yang-topology-filter-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.xpbs-pce-topology-filter'>
   <front>
      <title>PCEP Extensions for Topology Filter</title>
      <author fullname='Quan Xiong'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Mike Koldychev'>
	 <organization>Cisco Systems</organization>
      </author>
      <date day='8' month='October' year='2021'/>
      <abstract>
	 <t>   This document proposes a set of extensions for PCEP to support the
   topology filter during path computation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-xpbs-pce-topology-filter-01'/>
   <format target='https://www.ietf.org/archive/id/draft-xpbs-pce-topology-filter-01.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-teas-rfc3272bis'>
   <front>
      <title>Overview and Principles of Internet Traffic Engineering</title>
      <author fullname='Adrian Farrel'>
	 <organization>Old Dog Consulting</organization>
      </author>
      <date day='8' month='November' year='2021'/>
      <abstract>
	 <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-rfc3272bis-13'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-teas-rfc3272bis-13.txt' type='TXT'/>
</reference>


<reference anchor='I-D.bestbar-spring-scalable-ns'>
   <front>
      <title>Scalable Network Slicing over SR Networks</title>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Ran Chen'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Daniele Ceccarelli'>
	 <organization>Ericsson</organization>
      </author>
      <date day='16' month='September' year='2021'/>
      <abstract>
	 <t>   Multiple network slices can be realized on top of a single shared
   network.  A router that requires forwarding of a packet that belongs
   to a slice aggregate may have to decide on the forwarding action to
   take based on selected next-hop(s), and the forwarding treatment
   (e.g., scheduling and drop policy) to enforce based on the slice
   aggregate per-hop behavior.  Segment Routing is a technology that
   enables the steering of packets in a network by encoding pre-
   established segments within the network into the packet header.  This
   document introduces mechanisms to enable forwarding of packets over a
   specific slice aggregate along a Segment Routing (SR) path.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-spring-scalable-ns-02'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-spring-scalable-ns-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.bestbar-lsr-spring-sa'>
   <front>
      <title>IGP Extensions for SR Slice Aggregate SIDs</title>
      <author fullname='Tarek Saad'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Vishnu Pavan Beeram'>
	 <organization>Juniper Networks</organization>
      </author>
      <author fullname='Ran Chen'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Shaofu Peng'>
	 <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Bin Wen'>
	 <organization>Comcast</organization>
      </author>
      <author fullname='Daniele Ceccarelli'>
	 <organization>Ericsson</organization>
      </author>
      <date day='16' month='September' year='2021'/>
      <abstract>
	 <t>   Segment Routing (SR) defines a set of topological &quot;segments&quot; within
   an IGP topology to enable steering over a specific SR path.  These
   segments are advertised by the link-state routing protocols (IS-IS
   and OSPF).

   This document describes extensions to the IS-IS that enable
   advertising Slice Aggregate SR segments that share the same IGP
   computed forwarding path but offer a forwarding treatment (e.g.
   scheduling and drop policy) that is associated with a specific Slice
   Aggregate.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bestbar-lsr-spring-sa-01'/>
   <format target='https://www.ietf.org/archive/id/draft-bestbar-lsr-spring-sa-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

