<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.7.0) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dhody-teas-ietf-network-slice-mapping-01" category="std" consensus="true" tocInclude="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Slice-Mapping">IETF Network Slice Service Mapping YANG Model</title>
    <seriesInfo name="Internet-Draft" value="draft-dhody-teas-ietf-network-slice-mapping-01"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Divyashree Techno Park, Whitefield</street>
          <city>Bangalore</city>
          <code>560066</code>
          <country>IN</country>
        </postal>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>CN</country>
        </postal>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <date/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <abstract>
      <t>This document provides a YANG data model to map IETF network slice service to Traffic Engineering (TE) models (e.g., the Virtual Network (VN) model or the TE Tunnel etc). It also supports mapping to the VPN Network models and Network Resource Partition (NRP) models. These models are referred to as IETF network slice service mapping model and are applicable generically for the seamless control and management of the IETF network slice service with underlying TE/VPN support.</t>
      <t>The models are principally used for monitoring and diagnostics of the management systems to show how the IETF network slice service requests are mapped onto underlying network resource and TE/VPN models.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Data models are a representation of objects that can be configured or monitored within a system.  Within the IETF, YANG <xref target="RFC7950"/> is the language of choice for documenting data models, and YANG models have been produced to allow configuration or modeling of a variety of network devices, protocol instances, and network services.</t>
      <t>The YANG model discussed in this document augments the IETF Network Slice Service YANG model <xref target="I-D.ietf-teas-ietf-network-slices"/>, which is used to operate IETF Network Slices during the IETF Network Slice instantiation.  This provides a way to map IETF network slice service to Traffic Engineering (TE) models (e.g., the Virtual Network (VN) model or the TE Tunnel etc). Alternatively, it also supports mapping to the VPN Network models and Network Resource Partition (NRP) models.</t>
      <t>The model supports:</t>
      <ul spacing="normal">
        <li>A mapping of the IETF Network Slice with the Network Resource Partition (NRP). As per <xref target="I-D.ietf-teas-ietf-network-slices"/>, NRP is a collection of resources (bufferage, queuing, scheduling, etc.) in the underlay network.  The NRP YANG model is specified in <xref target="I-D.wd-teas-nrp-yang"/>. The IETF Network Slice can be mapped to the NRP directly.</li>
        <li>A mapping of the IETF Network Slice with the VPN network models - LxNM. This mapping can be populated at the time of IETF network service realization. This mapping information is internal and used for monitoring and diagnostics purpose such as telemetry, auto-scaling, closed-loop automation. Note that the LxNM may further map to other TE resources as specified in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>. Optionally, a mapping to the NRP can also be populated.</li>
        <li>A mapping of the IETF Network Slice with the underlying TE resources directly.  The TE resources could be in a form of VN, set of TE tunnels, TE abstract topology etc.  This mapping can be populated by the network at the time of realization of the IETF network slice service.  It is also possible to configure the mapping provided one is aware of NRP/VN/tunnels.  This mapping mode is used only when the there is an awareness of VN or TE by the consumer of the model.  Otherwise this mapping information is internal and used for monitoring and diagnostics purpose such as telemetry, auto-scaling, closed-loop automation.</li>
        <li>Possibility to request creation of a new VN/Tunnel to be binded to
IETF network slice.</li>
        <li>Indication to share the VN/Tunnel sharing (with or without
modification) for the IETF network slice.</li>
        <li>Support for configuration of underlying TE properties (as opposed
to existing VN or tunnels).</li>
      </ul>
      <t>Note: The RFC Editor will replace XXXX with the number assigned to the RFC once this draft becomes an RFC.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <section anchor="tree-diagrams">
        <name>Tree Diagrams</name>
        <t>A simplified graphical representation of the data model is used in this document.  The meaning of the symbols in these diagrams is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefixes-in-data-node-names">
        <name>Prefixes in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects are often used without a prefix, as long as it is clear from the context in which YANG module each name is defined.  Otherwise, names are prefixed using the standard prefix associated with the corresponding YANG module, as shown in Table 1.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="center">YANG module</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">nw</td>
              <td align="center">ietf-network</td>
              <td align="right">
                <xref target="RFC8345"/></td>
            </tr>
            <tr>
              <td align="left">tsmt</td>
              <td align="center">ietf-te-service-mapping-types</td>
              <td align="right">
                <xref target="I-D.ietf-teas-te-service-mapping-yang"/></td>
            </tr>
            <tr>
              <td align="left">l3vpn-ntw</td>
              <td align="center">ietf-l3vpn-ntw</td>
              <td align="right">
                <xref target="RFC9182"/></td>
            </tr>
            <tr>
              <td align="left">l2vpn-ntw</td>
              <td align="center">ietf-l2vpn-ntw</td>
              <td align="right">
                <xref target="I-D.ietf-opsawg-l2nm"/></td>
            </tr>
            <tr>
              <td align="left">ietf-ns</td>
              <td align="center">ietf-network-slice</td>
              <td align="right">
                <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/></td>
            </tr>
            <tr>
              <td align="left">nrp</td>
              <td align="center">ietf-nrp</td>
              <td align="right">
                <xref target="I-D.wd-teas-nrp-yang"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="references-in-the-model">
        <name>References in the Model</name>
        <t>Following additional documents are referenced in the model defined in this document -</t>
        <table>
          <thead>
            <tr>
              <th align="left">Document</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Framework for IETF Network Slices</td>
              <td align="center">
                <xref target="I-D.ietf-teas-ietf-network-slices"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="model-design">
      <name>Model Design</name>
      <t>The YANG model specified in this document augments the IETF network slice service YANG model <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
      <t>Currently following mapping are supported:</t>
      <ul spacing="normal">
        <li>L3NM: The L3 network model (L3NM) describes a L3VPN Service in the Service Provider Network.  It contains information of the Service Provider network and might include allocated resources. It can be used by network controllers to manage and control the L3VPN Service configuration in the Service Provider network. This model maps an IETF network slice to a L3VPN ID.</li>
        <li>L2NM: The L2 network model (L2NM) describes a L2VPN Service in the Service Provider Network.  It contains information of the Service Provider network and might include allocated resources. It can be used by network controllers to manage and control the L2VPN Service configuration in the Service Provider network. This model maps an IETF network slice to a L2VPN ID.</li>
        <li>
          <t>TE: The TE mapping is specified in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>. The mapping can be done to the following TE resouces:
          </t>
          <ul spacing="normal">
            <li>Virtual Networks (VN) <xref target="RFC8453"/></li>
            <li>TE-Tunnels</li>
            <li>TE-Topology</li>
          </ul>
        </li>
        <li>NRP: <xref target="I-D.ietf-teas-ietf-network-slices"/> defines IETF network slice services that provide connectivity coupled with network resources commitment between a number of endpoints over a shared network infrastructure and, for scalability concerns, defines NRP to host one or a group of network slice services according to characteristics including SLOs and SLEs. Along with mapping to VPN, this model maps an IETF network slice to a NRP ID.</li>
      </ul>
      <section anchor="open-questions">
        <name>Open Questions</name>
        <t>The following open questions needs to be addressed in a future revision:</t>
        <ul spacing="normal">
          <li>Is there a need/use-case to map IETF Network slice Connection Group and/or Connectivity Construct as well?</li>
          <li>Is there a need/use-case to map IETF Network slice Endpoints?</li>
          <li>Is there a need to indicate "map-type" (new, share) for NRP and VPNs?</li>
        </ul>
      </section>
    </section>
    <section anchor="tree-structure">
      <name>Tree Structure</name>
      <sourcecode type="Tree"><![CDATA[
module: ietf-network-slice-mapping

  augment /ietf-ns:network-slices/ietf-ns:network-slice:
    +--rw mapping!
       +--rw ns-mapping
          +--rw map-to?                               identityref
          +--rw (map)?
             +--:(nrp)
             |  +--rw nrp-id?
             |          -> /nw:networks/network/nrp:nrp/nrp-id
             +--:(l3vpn)
             |  +--rw l3vpn-id?                       leafref
             |  +--rw l3vpn-nrp-id?
             |          -> /nw:networks/network/nrp:nrp/nrp-id
             +--:(l2vpn)
             |  +--rw l2vpn-id?                       leafref
             |  +--rw l2vpn-nrp-id?
             |          -> /nw:networks/network/nrp:nrp/nrp-id
             +--:(te)
                +--rw type?                           identityref
                +--rw te-policy
                |  +--rw path-affinities-values
                |  |  +--rw path-affinities-value* [usage]
                |  |        ...
                |  +--rw path-affinity-names
                |  |  +--rw path-affinity-name* [usage]
                |  |        ...
                |  +--rw protection-type?          identityref
                |  +--rw availability-type?        identityref
                +--rw (te)?
                |  +--:(vn)
                |  |  +--rw vn*
                |  |          -> /vn:virtual-network/vn/vn-id
                |  +--:(te-topo)
                |  |  +--rw te-topology-identifier
                |  |  |     ...
                |  |  +--rw abstract-node?
                |  |          -> /nw:networks/network/node/node-id
                |  +--:(te-tunnel)
                |     +--rw te-tunnel*                te:tunnel-ref
                |     +--rw sr-policy*
                |             [headend color-ref endpoint-ref]
                |             {sr-policy}?
                |           ...
                +--rw template-ref?                   leafref
                        {template}?

]]></sourcecode>
    </section>
    <section anchor="yang-model">
      <name>YANG Model</name>
      <sourcecode type="YANG"><![CDATA[
<CODE BEGINS> file "ietf-network-slice-mapping@2022-07-11.yang"
module ietf-network-slice-mapping {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping";
  prefix ietf-nsm;

  import ietf-network {
    prefix nw;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies";
  }
  import ietf-network-slice {
    prefix ietf-ns;
    reference
      "I-D.ietf-teas-ietf-network-slice-nbi-yang: IETF Network Slice
       Service YANG Model";
  }
  import ietf-te-service-mapping-types {
    prefix tsmt;
    reference
      "I-D.ietf-teas-te-service-mapping-yang: Traffic Engineering
       (TE) and Service Mapping YANG Data Model";
  }
  import ietf-l3vpn-ntw {
    prefix l3vpn-ntw;
    reference
      "RFC9182: A YANG Network Data Model for Layer 3 VPNs";
  }
  import ietf-l2vpn-ntw {
    prefix l2vpn-ntw;
    reference
      "I-D.ietf-opsawg-l2nm: A Layer 2 VPN Network YANG Model";
  }
  import ietf-nrp {
    prefix nrp;
    reference
      "I-D.wd-teas-nrp-yang: A YANG Data Model for Network
       Resource Partition (NRP)";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:  <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>
     Editor: Dhruv Dhody <dhruv.ietf@gmail.com>
             Bo Wu <lana.wubo@huawei.com>";
  description
    "This module contains a YANG module to map the IETF Network
     Slice with Traffic Engineering (TE) or VPN Network models.

     Copyright (c) 2022 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2022-07-11 {
    description
      "initial version.";
    reference
      "RFC XXXX: IETF Network Slice Service Mapping YANG Model";
  }

  identity map-to {
    description
      "Base identity from which specific map-to are derived.";
  }

  identity map-to-nrp {
    base map-to;
    description
      "Map to Network Resource Partition (NRP)";
  }

  identity map-to-vpn {
    base map-to;
    description
      "Map to VPN";
  }

  identity map-to-l3vpn {
    base map-to-vpn;
    description
      "Map to L3VPN";
  }

  identity map-to-l2vpn {
    base map-to-vpn;
    description
      "Map to L2VPN";
  }

  identity map-to-l1vpn {
    base map-to-vpn;
    description
      "Map to L1VPN";
  }

  identity map-to-te {
    base map-to;
    description
      "Map to TE directly";
  }

  grouping ns-mapping {
    description
      "Mapping between IETF network slice and Network
       Resource Partition (NRP)/VPN/TE";
    container ns-mapping {
      description
        "The container for the mapping";
      leaf map-to {
        type identityref {
          base map-to;
        }
        description
          "Mapping to NRP/VPN/TE";
      }
      choice map {
        description
          "Mapping to NRP/VPN/TE";
        case nrp {
          leaf nrp-id {
            type leafref {
              path "/nw:networks/nw:network"
                 + "/nrp:nrp/nrp:nrp-id";
            }
            description
              "A reference to NRP ID";
            reference
              "I-D.ietf-teas-ietf-network-slices: Framework
               for IETF Network Slices";
          }
        }
        case l3vpn {
          leaf l3vpn-id {
            type leafref {
              path "/l3vpn-ntw:l3vpn-ntw"
                 + "/l3vpn-ntw:vpn-services"
                 + "/l3vpn-ntw:vpn-service"
                 + "/l3vpn-ntw:vpn-id";
            }
            description
              "A reference to VPN ID";
          }
          leaf l3vpn-nrp-id {
            type leafref {
              path "/nw:networks/nw:network"
                 + "/nrp:nrp/nrp:nrp-id";
            }
            description
              "An optional reference to NRP ID";
            reference
              "I-D.ietf-teas-ietf-network-slices: Framework
               for IETF Network Slices";
          }
          description
            "Mapping to L3NM";
          reference
            "RFC9182: A YANG Network Data Model for
             Layer 3 VPNs";
        }
        case l2vpn {
          leaf l2vpn-id {
            type leafref {
              path "/l2vpn-ntw:l2vpn-ntw"
                 + "/l2vpn-ntw:vpn-services"
                 + "/l2vpn-ntw:vpn-service"
                 + "/l2vpn-ntw:vpn-id";
            }
            description
              "A reference to VPN ID";
          }
          leaf l2vpn-nrp-id {
            type leafref {
              path "/nw:networks/nw:network"
                 + "/nrp:nrp/nrp:nrp-id";
            }
            description
              "An optional reference to NRP ID";
            reference
              "I-D.ietf-teas-ietf-network-slices: Framework
               for IETF Network Slices";
          }
          description
            "Mapping to L2NM";
          reference
            "I-D.ietf-opsawg-l2nm: A Layer 2 VPN
             Network YANG Model";
        }
        case te {
          uses tsmt:te-mapping;
          description
            "Mapping to TE directly";
          reference
            "I-D.ietf-teas-te-service-mapping-yang:
             Traffic Engineering (TE) and Service
             Mapping YANG Model";
        }
      }
    }
  }

  augment "/ietf-ns:network-slices/ietf-ns:network-slice" {
    description
      "IETF Network Slice augmented to include the mapping
       information to the network slice realization";
    container mapping {
      presence "Indicates Mapping information";
      description
        "Container to augment IETF network slice to
         include NRP / VPN / TE mappings";
      uses ns-mapping;
    }
  }
}


<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following allocation for the URIs in the "ns" subregistry within the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   URI: urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace.
   --------------------------------------------------------------------
]]></artwork>
      <t>IANA is requested to make the following allocation for the YANG module in the "YANG Module Names" registry <xref target="RFC6020"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   name:         ietf-network-slice-mapping
   namespace:    urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping
   prefix:       ietf-nsm
   reference:    RFC XXXX
   --------------------------------------------------------------------
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8345" target="https://www.rfc-editor.org/info/rfc8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm">
              <organization/>
            </author>
            <author fullname="J. Medved" initials="J." surname="Medved">
              <organization/>
            </author>
            <author fullname="R. Varga" initials="R." surname="Varga">
              <organization/>
            </author>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur">
              <organization/>
            </author>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan">
              <organization/>
            </author>
            <author fullname="X. Liu" initials="X." surname="Liu">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories.  The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9182" target="https://www.rfc-editor.org/info/rfc9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
              <organization/>
            </author>
            <author fullname="L. Munoz" initials="L." surname="Munoz">
              <organization/>
            </author>
            <author fullname="A. Aguado" initials="A." surname="Aguado">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang" target="https://www.ietf.org/archive/id/draft-ietf-teas-ietf-network-slice-nbi-yang-02.txt">
          <front>
            <title>IETF Network Slice Service YANG Model</title>
            <author fullname="Bo Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Liuyan Han">
              <organization>China Mobile</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   This document defines a YANG model for the IETF Network Slice
   service.  The model can be used by an IETF Network Slice customer to
   manage IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-02"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang" target="https://www.ietf.org/archive/id/draft-ietf-teas-te-service-mapping-yang-11.txt">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Giuseppe Fioccola">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Qin Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Daniele Ceccarelli">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Jeff Tantsura">
              <organization>Microsoft</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resource and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-11"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-l2nm" target="https://www.ietf.org/archive/id/draft-ietf-opsawg-l2nm-19.txt">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Luis Angel Munoz">
              <organization>Vodafone</organization>
            </author>
            <date day="2" month="June" year="2022"/>
            <abstract>
              <t>   This document defines an L2VPN Network YANG Model (L2NM) which can be
   used to manage the provisioning of Layer 2 Virtual Private Network
   services within a network (e.g., service provider network).  The L2NM
   complements the Layer 2 Service Model (L2SM) by providing a network-
   centric view of the service that is internal to a service provider.
   The L2NM is particularly meant to be used by a network controller to
   derive the configuration information that will be sent to relevant
   network devices.

   Also, this document defines a YANG module to manage Ethernet segments
   and the initial versions of two IANA-maintained modules that include
   a set of identities of BGP Layer 2 encapsulation types and pseudowire
   types.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-l2nm-19"/>
        </reference>
        <reference anchor="I-D.wd-teas-nrp-yang" target="https://www.ietf.org/archive/id/draft-wd-teas-nrp-yang-01.txt">
          <front>
            <title>A YANG Data Model for Network Resource Partition (NRP)</title>
            <author fullname="Bo Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ying Cheng">
              <organization>China Unicom</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   This document defines a YANG data model for managing Network Resource
   Partition (NRP) topologies and associated resource allocation.  The
   model can be used for the realization of IETF network slice services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wd-teas-nrp-yang-01"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8453" target="https://www.rfc-editor.org/info/rfc8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli">
              <organization/>
            </author>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane.  They also have a range of management and provisioning protocols to configure and activate network resources.  These mechanisms represent key technologies for enabling flexible and dynamic networking.  The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slices" target="https://www.ietf.org/archive/id/draft-ietf-teas-ietf-network-slices-12.txt">
          <front>
            <title>Framework for IETF Network Slices</title>
            <author fullname="Adrian Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura">
              <organization>Microsoft Inc.</organization>
            </author>
            <date day="30" month="June" year="2022"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-12"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-ip-mpls" target="https://www.ietf.org/archive/id/draft-ietf-teas-ns-ip-mpls-00.txt">
          <front>
            <title>Realizing Network Slices in IP/MPLS Networks</title>
            <author fullname="Tarek Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Jie Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Bin Wen">
              <organization>Comcast</organization>
            </author>
            <author fullname="Daniele Ceccarelli">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Joel Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Shaofu Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ran Chen">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Xufeng Liu">
              <organization>Volta Networks</organization>
            </author>
            <author fullname="Luis M. Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Luay Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="16" month="June" year="2022"/>
            <abstract>
              <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-00"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Jie Dong for the initial discussion behind this document.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>TO be added in future revisions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+077XLbRpL/8RSzzI+TvAIpUbbjwCk7tMg42pIor8jEm0pt
XQ2BETlrcIDFAKR5jvIs9yz3ZNfdMwMCJEjRSrKVvTpWHBGDmenvnu6epu/7
npfLPBYBa10Oxt+yociXSfaBjWIZCjYS2QL/XvM0lWrKfuwN37LrJBJxy+OT
SSYWgZnp2xlelISKz2G7KON3uR/Nkmjl54JrX4r8zldme1/TorlZ5J+eeRHP
YdGnfm88uPdCeJgm2SpgOo88mWYBy7NC593T069Oux7PBA/YbVLkCBH3m2ZJ
kQZsPOiN2Ht4Rlzf4pjn6Zyr6D95nCjYfyW0l8qA/ZQn4QnTq3km7vQJA6Qt
Kn/3PF7ksyQLPM/3GJNKB6zfZn2kA54Nbf1ZVizKsSSbBuy7gi+FZGMRzlQS
J1MJkBignwmRwwK5WHE9gwc7g73j2YcT9n4mc3EnRRzB5FDmQPEbrqaAbSZw
BDgNgnn2/PT0+fMWDRQqR75cDuFJzLmMgdOITRvZ+80UR9phMvd8xhz6b9rs
fVHi/iYxTwdgfXZ6xkbJXb4EhrPeQqhCnLAfi1nBgSCYJMO8RHvI1T9QGiXS
3bPT07NuDemLCtIxV7y9LCbJNzPCAZFmnqeSbM5zuRCBx26/veienX1lvp0/
f/HCfHt+2j0NGH398qtn7uuL86eVr8/M1K/OXnRx8NLvE392KqKaSH8FjA82
5+bC18YGSmWledVNk1Tz5dSPu2ruxpeRWa6y1O4r1V2dtBdPn50fgpvenqRg
XurP01iDlnrANdBV32d8AjLhIBNvPJMalbqYC5WzNEsWMhKacWO/YGqczdGI
WZ4wIIuR5VuojKAySzXOGIMl38mQDdRUKiEyNK6j8eDY7KHZkWhP2ycsnwn2
g8zygselFzn6YWingb7RjPGAjQulYEDk4XGbXeaMxzphukjTJMs1s2xGwLTj
u2G5m4UH9lwO3QqdFBngCfYEfkwmih0Nb9853NpsPBNalCtBj8HiRZaJCAFw
vY90h4nBH6HiehiEWXwSCzYVCrgR8jhesTtLnxZ8HgutQetB6ROzbg7KPhUk
jOSOpu0Bu5T5jBUqElm8QvDjQQeZYBnURunWCEpBIKFMCYtCA2GIyjxRMk9I
VIhAJPlUJTqXoXYYVHDSK52LuUaO6FmyZPjvASQz8c9C6NxggIwCuEBwUkXc
rcycjBATS40Vj9XcuYyiWHjeF+wSmRYVIUrS8/qlphpAHPZKYTtAmpOsgZZk
8g8RAiL5jOcs5IpNBPL+Tk4LlPKaF/CArJUKtjEUtxl7b0YctSfGQj59ss7l
/p5JTW/BX00LYBiCDGcJ8gD57IwM6V3bFRwpSCvtZdGf8YUA1IRCcwQCrQLG
MfDaoWtpyswa3BKAcbbgGdj+Ch8cSyOBUgAwsBkcZaBm4OnhoKMxBF1KzchL
W7VZYwQqocNCo74Q/VWHwYsp/tVrJWiOCiq7ffr0oB+7vz9hy5kMZ8hSUlRg
QJIKILsJCuBTkP7uQMIQnEtiGkiSfF7F1S356g/g3npxLjJFbj9enTD5O3u7
inMoYcD5Accue8JYrwRX9UJ1tpL3wXcPwQTagN8iO1T0sAYFz0Hb41iEznyd
cwA+T4o7cM1gYycMnEsBeEKIFs5EVMT0HTjaPmbWWo2fARlbSKQBgqBU1BIA
6lSEEkIs0nOD6+bpfH9P50QTO6xDsR7OSgmBRDIDIuJV+3HcRUGruqB9dvVx
eN02iuy2svDTJC1isBM4gnJan8s5uaK6apfOmcfyv6xh1LYroxBgPgxLRdpp
DqlDzo60yNIEzlNdgBnD6ZmLGI4QCO7A6xR54ms4DElWYQzTIj9OkpTezC02
wwSMnVw1UoEEA25wehYZPGdkregV6AFsaa0dvFGSDwZqKNqbFGHj+QhYbloc
yhKZTGZZ5TQo1ONEWzu6KxSsNYaUrfYOQuQ4QvB0OqGMENIPQzAAQTEDzM7J
r4B/h+8u1AMqUozbV2Qc7AHdmawIQacuG6pU0ZqHoxSABZEb2jPyDXRCS4yI
gKnl2WujDIOLdcwYJAhaRjkFgAH+d34YdixxmySgaZTHRaIgwlnOhHEAqCJm
K2V2Uxh1EdfQGQOTLLmAkIZzLSsDHzQ3AHSDOyylFub0+6OYiNO5d8RTGUN2
hWy1ARcLQUxORBxkswR6O/bIyUmDJ1JF5KtwI/hsC7GEcakiCF9pO4r9uJXa
ekscowOR1Bsox7+QeNu9gZdgkWaL4zIG3gNxZA4lmroR9txtWA6oDBwvucSj
AfiYpMjWyAIGdMVHyEFxrhG41aBjAIVOJiAjgzCODSIUFSAexxg+xhy0+G/w
WVusKuYT0A8ODJ+qtZvHxYkKrX5QPQP4C3mqIKWD120MWS8StcAIENTMHL8f
BKhpkkWata6/H41bJ+YvG97Q99vBX7+/vB308fvou97VVfnFszNG3918f9Vf
f1uvvLi5vh4M+2YxjLLakNe67v3YMgFg6+bd+PJm2LtqNcR3mbC6QtoNETWd
LNqDyCnM5MR42DcX7/7nv8+egqf9k83EIRo2Dy/OvnwKD2iLBlppmhQnrTw8
LnlG3gy4HvJU5pyiYk0ZhmJovBj9f/EFxF9CsD5YUMbnwMEe0xJSW+PoYSyd
YYbVEPijiCqprPMSm9RadzsXXFUcuF7NJ0msbTQB5hpZBHCfSNxJ5Y4ZW1uA
g4SwfQf5o/woaCWlJ0N0UUMOSuF5lxuwT6jmQl6JMFUJxabIMDrhKui7NMa4
xRycHFFjzQ1MPSXAxMI4Qb+jMZoEYGGMrL7Lkrlzd7n4mCN+Jtp24VAB/llw
GECcKmRWXaFD2OSVRCl6PReGUy2NZ5F9hxaThJLOltKYwgSya50m4FpcwdAA
r0gfcBtTBn0GTP3Z8tQY9s81fM3ILabsAi2RnmFFgFkjcyvggwN+UB0xHxrF
FWq5nl+NUOHRyfgZqLTZPtfzvJxuY4yt8CJfpcCpnw+PRGjr+HyRKl/lS4dH
dYAwwaKVm9zdnNytTm6qQNmVhkTdQLAJyRvw3lMWs5tCvFxuRl93hdMwG22l
lJuzM1M69rxvE8x76fSMImmis9JoKmUaXBu5tTZtXdtm3an5qEl99+T04PNV
B6Z8C45AkHLgMdWUmh7CPY18YHhCENWsL/B42crDa1HtQ3l4cxL7WXl4RaiY
u1wUYK4qpwqWE4oLhVAONosUEZYhPTjCr86H1+ZwvTqvpzDsCN8dM3eKYLJ3
dY6ZjisYWEm6x3cmKMwcd01QiQ6MQ3Zfi8Ss295aWcayWGWT0xn6vTAuwCVj
aSUk11SG2VRttFExeddJmT66cl0sMm3KBlgdo21dIY8Slho59QBmF3Flgmoi
W+IUcJhiiAahYlXIwrnsU3YJPO+WPO9u8by7xfPu/y2ed/9FPO/WeD4eBC5P
K1ODx+eg40ouZLkRYSpkQ8217bm00Bb+KWreKDtpU3cyx9bTZ+fgZ+zE8cA3
cbuuDNgMkYiCbCs40HUZR7uvQG5rrja1Q8korOssMGOBhDaNXViwWQjGfHc+
lzk5uQm8xLIod2E4qJ1QUZpI9HzJAgNzk5qsq5qgpRmHDLgIc0w0QWNOyFVj
bsVtzhRi6J4pvN2zlGCqD/yeQaJGaWiCO9PNYbW0ukEiDyGgiWzBIAQ0IOsW
mTS5ntF7fDm6ujGB3ehqoLHshyEaEV+pN4B+ndhk8yCNRIRRHxmVIuBAvUmB
UX/FPBCzDVvtW+tOgq//Wb5WQkTaBvpwzgL3bXzM2V1BjMvEQmqYG2B69oRd
aptVc1rbAXv1Q65FrY46rOF5YYUOtkj3rciDDjD2oqoM8GCEhRHgUsTx68eC
GzjFeM2atsCV0uS0grVgDwrSWuwI8uQTo0QmS0XOorRAIvo1piEmCxk5lfK8
X375BYc8E4gGDSGUs3HknT2pWcfGXUHdnJqHAzLSP/t+tnRa8ieb3tpRpUsg
65C2XODnyWu2/wN2CZlpvoJoamuHI9ji+LVXmw9vgiOI447rwz+XCEGIJ6PX
W2/dx3/FOmrpyNQd+6UD6wL41zHrG2BSFLwLqgmRAe4OKiEBuqtTuL3698O8
uw/z7q/CvPu7Yp6LDbSZA4xWs0+1mtWqtoPw4diR4WrrfUldyvOZj1cvSmKR
x1/wuBC6af7+JU/YT4WGwOHvO5aaT7vdPgyVlU8p8MF4mPm/BRJZkhtX6m/w
fx+7y+V8waU7/OobPCwtVIXXO7YOjhab6r3BjYV6spdqo6ILFSxMHOPcKAzB
f1u6WYEMWoQF7v3g7SSMcXxDKsRn2Y4lBqkdcljz0pbXfSzYNDLmEPuDtfS/
hyikiK2RRlalkaY92ZyVi8C88XdoR7mHzqxJNkqr8vlpJjjwEaPwOMlw3zIg
w4dGFa98PpWA7htZV36apODInad4ZYHgmvxQo9usouA2AAzwJMcDft26RkP4
6H19cdMfsDeDt5fD0St2J2OIGnYf9N90T7td//RL/+ysjXF9ywYHe2ID9glw
xLk+xLEYabGz9tlL24ulUx4KoqFVZCrAXYKUYxEy+DiPAwgXqHVo9+4t3MmW
4myEMX+J4YicU5G9Vuf6RJDsbLV8SY9llcWysoU1b+qfYj3DMapxmgIGBU52
N5tVgBMmJO6bgdpaUw20RXQH/MM7tRrqMk4fav0JpluxCcmdNb0avlgLPAjZ
na1iDQ0GDlPqM6C0oanRcs37RvzXlcMawuXwbhGbvjgrYcfCDUlf8RWkXucU
IjeD7zaD7+4H39w217PwurUWiAcEiEXIulpn6R6oW015+3XcyWhXA4RFybRS
cmWvTo09k242NZb0shBbPsu8lY3kVNGFIOpCb2SPgVoPKwGiCk1o7t1a79+y
92ISMPb1LM9THXQ6eJOAR9YHkRF324BTZzntIMGdV3bTt+wKEldchj2YeRLg
22/cdDvLXJfVelzZ100tpq/q7pf6StnXTX2dr4gCU6JK10xytRl0oWUBitfq
/zYT3LxyN5Ar9+47e3hAnNs9NeY2kkFemq4yKmAdhccMvTuzgit0TtJBwCl4
bkyny9iCrspoA9MqXLbUYecrZOs9vGjEbTVWPMCwReQg3oqIGmcnBemRvVPG
nLzSIjeRimfUUTjXJ8xevJr17jqoeu96gnUpQHIuc6y8pUWmC66wNcDczemC
rpbKC2HqZgPOKcy0YZl2zKfigGl0usXCADy/GfVBZ8xcLeytLyAGKAHOI5v5
P22HtY4B4t9/aHYlpjw2RTlN16OWB3Ay24oITXdFe/v+yOk0tXwLsdZni7WP
Rcpjx1LSIne6EhbwXNUh5A5YLr7D0w2vfl8CMXTTbTGCYZlrEd+R/d8VIMCY
cFdJTt1zLTpWXbmErQMB6382dRu0m3IU2MKi1m7tOXERp6YDbV//fel9XHhv
SwK7MXqDtZVyNl0YmhtCW9QM3Q5Y94/AiFBxd8KpeN8JbmxGX+4Cfm06ex7q
KtsNDk6VzwcHtr97Rzoot/dESA/tS/X5PTt3H79zd//OZ4/f+Wzvzrn4fPaO
B2VX03pjqqhS/6+uhcG7NqIJrgrcUAqtNEA+dCRja3FnPLCm5txato1JEy50
IonKKtfOUo228YPZR93YyK1C6FhNtSuvGniKn/vyWxMyFeag3WCbVJW49XLb
jYzn5KdftyPshXiuDbtCr6ki1cYtzTYZ23jFqEjCWvXUuPze2s7d/oyT1zWr
wECsIFfn2W4qidLe2tNaatllf2OzTV9cLj7gNxnlHfEmITuujGug7xt0gFhf
dUnmQ8x3BdBHsL/MBoLy2w7er2fiX3cB8jmTD5r7m4nU3Nbt4GuNcf92uguB
jO1Z/ffQ4t3UVD0OdgfUNmjG/MAEtY7xVra6iaIxr26zeXUfb17d0ry6D5hX
93PMq2nyQXP/tebV/X/z+uOYV/cw8zqgAFNHd0c1ZhNLc3UrasKG5FZTBS3I
y6rYy8+kazPIPJS8vUW5OoU7yweV0lx9xY6ErM4T8/feBcbukrj1WbfErd3B
c0PCaGG4q3DTllMJYh2O1T4f24NSj7orvwbYCqc3Y2nTmQuLWrahHITuGFQB
VHKoMfa+KLfHDNSyqrEzYi0JRyAaboc8VqfSr7M2J1LDdRLwsiIXkIy9BhgM
+6NX7rZgJMIic70L2FLEXYP3mz79TrE37G29o0GpXa++EcKcfxAbPT62TQp5
73KM728vyybJltItrNpkYorFopX72SK9I4787foKciDztmUagfD30ff3gbnu
YNT4+qs/uA8gFrDHXU/gcosl1qMuTAUzsD+1Gr2l2x8gJWDDTs/UndacA7j2
xx1IbHld0v7NaCNB/wqJ1UpMVjjOG+AYtYS3WClEkhL+dv33kJL5aX9pFntF
UvKSFjxetKbmHtRg6rlX9cz00hW4flvJ0e+GJzz8gNbYCz+oZBmLyPTLYl8U
Vx+o9+kvUrA+NmM5ubm6nP39K4p0IsC8os2fDeDGg498nsbY2j++sW1UpoVq
o4GKfsn8v9PSv8xNQwAA

-->

</rfc>
