<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.22 (Ruby 3.2.3) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dhody-teas-ietf-network-slice-mapping-06" category="std" consensus="true" tocInclude="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="Slice-Mapping">IETF Network Slice Service Mapping YANG Model</title>
    <seriesInfo name="Internet-Draft" value="draft-dhody-teas-ietf-network-slice-mapping-06"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>IN</country>
        </postal>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>CN</country>
        </postal>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <date/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <abstract>
      <?line 55?>

<t>This document provides a YANG data model to map IETF network slice service to Traffic Engineering (TE) models (e.g., the Virtual Network (VN) model or the TE Tunnel, etc). It also supports mapping to the VPN Network models and Network Resource Partition (NRP) models. These models are referred to as the IETF network slice service mapping model and are applicable generically for the seamless control and management of the IETF network slice service with underlying TE/VPN support.</t>
      <t>The models are principally used for monitoring and diagnostics of the management systems to show how the IETF network slice service requests are mapped onto underlying network resources and TE/VPN models.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Data models are a representation of objects that can be configured or monitored within a system.  Within the IETF, YANG <xref target="RFC7950"/> is the language of choice for documenting data models, and YANG models have been produced to allow the configuration or modeling of a variety of network devices, protocol instances, and network services.</t>
      <t>The YANG model discussed in this document augments the IETF Network Slice Service YANG model <xref target="I-D.ietf-teas-ietf-network-slices"/>, which is used to operate IETF Network Slices during the IETF Network Slice instantiation.  This provides a way to map IETF network slice service to Traffic Engineering (TE) models (e.g., the Virtual Network (VN) model or the TE Tunnel, etc). Alternatively, it also supports mapping to the VPN Network models and Network Resource Partition (NRP) models.</t>
      <t>The model supports:</t>
      <ul spacing="normal">
        <li>
          <t>A mapping of the IETF Network Slice with the Network Resource Partition (NRP). As per <xref target="I-D.ietf-teas-ietf-network-slices"/>, NRP is a collection of resources (bufferage, queuing, scheduling, etc.) in the underlay network.  The NRP YANG model is specified in <xref target="I-D.ietf-teas-nrp-yang"/>. The IETF Network Slice can be mapped to the NRP directly.</t>
        </li>
        <li>
          <t>A mapping of the IETF Network Slice with the VPN network models - LxNM. This mapping can be populated at the time of IETF network service realization. This mapping information is internal and used for monitoring and diagnostics purposes such as telemetry, auto-scaling, and closed-loop automation. Note that the LxNM may further map to other TE resources as specified in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>. Optionally, a mapping to the NRP can also be populated.</t>
        </li>
        <li>
          <t>A mapping of the IETF Network Slice with the underlying TE resources directly.  The TE resources could be in a form of VN, set of TE tunnels, TE abstract topology, etc.  This mapping can be populated by the network at the time of realization of the IETF network slice service.  It is also possible to configure the mapping provided one is aware of NRP/VN/tunnels.  This mapping mode is used only when there is an awareness of VN or TE by the consumer of the model.  Otherwise, this mapping information is internal and used for monitoring and diagnostics purposes such as telemetry, auto-scaling, and closed-loop automation.</t>
        </li>
        <li>
          <t>Possibility to request the creation of a new VN/Tunnel to be bound to
IETF network slice.</t>
        </li>
        <li>
          <t>Indication to share the VN/Tunnel sharing (with or without
modification) for the IETF network slice.</t>
        </li>
        <li>
          <t>Support for configuration of underlying TE properties (as opposed
to existing VN or tunnels).</t>
        </li>
      </ul>
      <t>Note: The RFC Editor will replace XXXX with the number assigned to the RFC once this draft becomes an RFC.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <section anchor="tree-diagrams">
        <name>Tree Diagrams</name>
        <t>A simplified graphical representation of the data model is used in this document.  The meaning of the symbols in these diagrams is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefixes-in-data-node-names">
        <name>Prefixes in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects are often used without a prefix, as long as it is clear from the context in which the YANG module each name is defined.  Otherwise, names are prefixed using the standard prefix associated with the corresponding YANG module, as shown in Table 1.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="center">YANG module</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">nw</td>
              <td align="center">ietf-network</td>
              <td align="right">
                <xref target="RFC8345"/></td>
            </tr>
            <tr>
              <td align="left">tsmt</td>
              <td align="center">ietf-te-service-mapping-types</td>
              <td align="right">
                <xref target="I-D.ietf-teas-te-service-mapping-yang"/></td>
            </tr>
            <tr>
              <td align="left">l3vpn-ntw</td>
              <td align="center">ietf-l3vpn-ntw</td>
              <td align="right">
                <xref target="RFC9182"/></td>
            </tr>
            <tr>
              <td align="left">l2vpn-ntw</td>
              <td align="center">ietf-l2vpn-ntw</td>
              <td align="right">
                <xref target="RFC9291"/></td>
            </tr>
            <tr>
              <td align="left">ietf-ns</td>
              <td align="center">ietf-network-slice</td>
              <td align="right">
                <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/></td>
            </tr>
            <tr>
              <td align="left">nrp</td>
              <td align="center">ietf-nrp</td>
              <td align="right">
                <xref target="I-D.ietf-teas-nrp-yang"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="references-in-the-model">
        <name>References in the Model</name>
        <t>The following additional documents are referenced in the model defined in this document -</t>
        <table>
          <thead>
            <tr>
              <th align="left">Document</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Framework for IETF Network Slices</td>
              <td align="center">
                <xref target="I-D.ietf-teas-ietf-network-slices"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="model-design">
      <name>Model Design</name>
      <t>The YANG model specified in this document augments the IETF network slice service YANG model <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
      <t>Currently, the following mapping are supported:</t>
      <ul spacing="normal">
        <li>
          <t>L3NM: The L3 network model (L3NM) describes a L3VPN Service in the Service Provider Network.  It contains information on the Service Provider network and might include allocated resources. It can be used by network controllers to manage and control the L3VPN Service configuration in the Service Provider network. This model maps an IETF network slice to a L3VPN ID.</t>
        </li>
        <li>
          <t>L2NM: The L2 network model (L2NM) describes a L2VPN Service in the Service Provider Network.  It contains information on the Service Provider network and might include allocated resources. It can be used by network controllers to manage and control the L2VPN Service configuration in the Service Provider network. This model maps an IETF network slice to a L2VPN ID.</t>
        </li>
        <li>
          <t>TE: The TE mapping is specified in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>. The mapping can be done to the following TE resources:
          </t>
          <ul spacing="normal">
            <li>
              <t>Virtual Networks (VN) <xref target="RFC8453"/></t>
            </li>
            <li>
              <t>TE-Tunnels</t>
            </li>
            <li>
              <t>TE-Topology</t>
            </li>
          </ul>
        </li>
        <li>
          <t>NRP: <xref target="I-D.ietf-teas-ietf-network-slices"/> defines IETF network slice services that provide connectivity coupled with network resources commitment between a number of endpoints over a shared network infrastructure and, for scalability concerns, defines NRP to host one or a group of network slice services according to characteristics including SLOs and SLEs. Along with mapping to VPN, this model maps an IETF network slice to an NRP ID.</t>
        </li>
      </ul>
      <section anchor="open-questions">
        <name>Open Questions</name>
        <t>The following open questions need to be addressed in a future revision:</t>
        <ul spacing="normal">
          <li>
            <t>Is there a need/use-case to map the IETF Network slice Connection Group and/or Connectivity Construct as well?</t>
          </li>
          <li>
            <t>Is there a need/use-case to map IETF Network slice Service Demarcation Points (SDPs)?</t>
          </li>
          <li>
            <t>Is there a need to indicate "map-type" (new, share) for NRP and VPNs?</t>
          </li>
          <li>
            <t>Is there a need to link this model to the AC models?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="tree-structure">
      <name>Tree Structure</name>
      <sourcecode type="Tree"><![CDATA[
module: ietf-network-slice-mapping

  augment /ietf-nss:network-slice-services/ietf-nss:slice-service:
    +--rw mapping!
       +--rw ns-mapping
          +--rw map-to?                               identityref
          +--rw (map)?
             +--:(nrp)
             |  +--rw nrp?
             |          -> /nw:networks/nrp:nrp-policies/nrp-policy/name
             +--:(l3vpn)
             |  +--rw l3vpn-id?                       leafref
             |  +--rw l3vpn-nrp?
             |          -> /nw:networks/nrp:nrp-policies/nrp-policy/name
             +--:(l2vpn)
             |  +--rw l2vpn-id?                       leafref
             |  +--rw l2vpn-nrp?
             |          -> /nw:networks/nrp:nrp-policies/nrp-policy/name
             +--:(te)
                +--rw type?                           identityref
                +--rw te-policy
                |  +--rw path-affinities-values
                |  |  +--rw path-affinities-value* [usage]
                |  |        ...
                |  +--rw path-affinity-names
                |  |  +--rw path-affinity-name* [usage]
                |  |        ...
                |  +--rw protection-type?          identityref
                |  +--rw availability-type?        identityref
                +--rw (te)?
                |  +--:(vn)
                |  |  +--rw vn*
                |  |          -> /vn:virtual-network/vn/id
                |  +--:(te-topo)
                |  |  +--rw te-topology-identifier
                |  |  |     ...
                |  |  +--rw abstract-node?
                |  |          -> /nw:networks/network/node/node-id
                |  +--:(te-tunnel)
                |     +--rw te-tunnel*                te:tunnel-ref
                |     +--rw sr-policy* [headend color-ref endpoint-ref]
                |             {sr-policy}?
                |           ...
                +--rw template-ref?                   leafref
                        {template}?

]]></sourcecode>
    </section>
    <section anchor="yang-model">
      <name>YANG Model</name>
      <sourcecode type="YANG"><![CDATA[
<CODE BEGINS> file "ietf-network-slice-mapping@2025-01-29.yang"
module ietf-network-slice-mapping {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping";
  prefix ietf-nsm;

  import ietf-network {
    prefix nw;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies";
  }
  import ietf-network-slice-service {
    prefix ietf-nss;
    reference
      "I-D.ietf-teas-ietf-network-slice-nbi-yang: A YANG Data
       Model for the IETF Network Slice Service";
  }
  import ietf-te-service-mapping-types {
    prefix tsmt;
    reference
      "I-D.ietf-teas-te-service-mapping-yang: Traffic Engineering
       (TE) and Service Mapping YANG Data Model";
  }
  import ietf-l3vpn-ntw {
    prefix l3vpn-ntw;
    reference
      "RFC 9182: A YANG Network Data Model for Layer 3 VPNs";
  }
  import ietf-l2vpn-ntw {
    prefix l2vpn-ntw;
    reference
      "RFC 9291: A Layer 2 VPN Network YANG Model";
  }
  import ietf-nrp {
    prefix nrp;
    reference
      "I-D.ietf-teas-nrp-yang: A YANG Data Model for Network
       Resource Partitions (NRPs)";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:  <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>
     Editor: Dhruv Dhody <dhruv.ietf@gmail.com>
             Bo Wu <lana.wubo@huawei.com>";
  description
    "This module contains a YANG module to map the IETF Network
     Slice with Traffic Engineering (TE) or VPN Network models.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2025-01-29 {
    description
      "initial version.";
    reference
      "RFC XXXX: IETF Network Slice Service Mapping YANG Model";
  }

  identity map-to {
    description
      "Base identity from which specific map-to are derived.";
  }

  identity map-to-nrp {
    base map-to;
    description
      "Map to Network Resource Partition (NRP)";
  }

  identity map-to-vpn {
    base map-to;
    description
      "Map to VPN";
  }

  identity map-to-l3vpn {
    base map-to-vpn;
    description
      "Map to L3VPN";
  }

  identity map-to-l2vpn {
    base map-to-vpn;
    description
      "Map to L2VPN";
  }

  identity map-to-l1vpn {
    base map-to-vpn;
    description
      "Map to L1VPN";
  }

  identity map-to-te {
    base map-to;
    description
      "Map to TE directly";
  }

  grouping ns-mapping {
    description
      "Mapping between IETF network slice and Network
       Resource Partition (NRP)/VPN/TE";
    container ns-mapping {
      description
        "The container for the mapping";
      leaf map-to {
        type identityref {
          base map-to;
        }
        description
          "Mapping to NRP/VPN/TE";
      }
      choice map {
        description
          "Mapping to NRP/VPN/TE";
        case nrp {
          leaf nrp {
            type leafref {
              path "/nw:networks/nrp:nrp-policies"
                 + "/nrp:nrp-policy/nrp:name";
            }
            description
              "A reference to NRP name";
            reference
              "I-D.ietf-teas-nrp-yang: A YANG Data Model for
               Network Resource Partitions (NRPs)";
          }
        }
        case l3vpn {
          leaf l3vpn-id {
            type leafref {
              path "/l3vpn-ntw:l3vpn-ntw"
                 + "/l3vpn-ntw:vpn-services"
                 + "/l3vpn-ntw:vpn-service"
                 + "/l3vpn-ntw:vpn-id";
            }
            description
              "A reference to VPN ID";
          }
          leaf l3vpn-nrp {
            type leafref {
              path "/nw:networks/nrp:nrp-policies"
                 + "/nrp:nrp-policy/nrp:name";
            }
            description
              "An optional reference to NRP name";
            reference
              "I-D.ietf-teas-ietf-network-slices: Framework
               for IETF Network Slices";
          }
          description
            "Mapping to L3NM";
          reference
            "RFC9182: A YANG Network Data Model for
             Layer 3 VPNs";
        }
        case l2vpn {
          leaf l2vpn-id {
            type leafref {
              path "/l2vpn-ntw:l2vpn-ntw"
                 + "/l2vpn-ntw:vpn-services"
                 + "/l2vpn-ntw:vpn-service"
                 + "/l2vpn-ntw:vpn-id";
            }
            description
              "A reference to VPN ID";
          }
          leaf l2vpn-nrp {
            type leafref {
              path "/nw:networks/nrp:nrp-policies"
                 + "/nrp:nrp-policy/nrp:name";
            }
            description
              "An optional reference to NRP";
            reference
              "I-D.ietf-teas-ietf-network-slices: Framework
               for IETF Network Slices";
          }
          description
            "Mapping to L2NM";
          reference
            "RFC 9291: A Layer 2 VPN Network YANG Model";
        }
        case te {
          uses tsmt:te-mapping;
          description
            "Mapping to TE directly";
          reference
            "I-D.ietf-teas-te-service-mapping-yang:
             Traffic Engineering (TE) and Service
             Mapping YANG Model";
        }
      }
    }
  }

  augment "/ietf-nss:network-slice-services/ietf-nss:slice-service" {
    description
      "IETF Network Slice augmented to include the mapping
       information to the network slice realization";
    container mapping {
      presence "Indicates Mapping information";
      description
        "Container to augment IETF network slice to
         include NRP / VPN / TE mappings";
      uses ns-mapping;
    }
  }
}

<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following allocation for the URIs in the "ns" subregistry within the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   URI: urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace.
   --------------------------------------------------------------------
]]></artwork>
      <t>IANA is requested to make the following allocation for the YANG module in the "YANG Module Names" registry <xref target="RFC6020"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   name:         ietf-network-slice-mapping
   namespace:    urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping
   prefix:       ietf-nsm
   reference:    RFC XXXX
   --------------------------------------------------------------------
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="27" month="January" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="29" month="January" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-17"/>
        </reference>
        <reference anchor="I-D.ietf-teas-nrp-yang">
          <front>
            <title>YANG Data Models for Network Resource Partitions (NRPs)</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <date day="5" month="July" year="2024"/>
            <abstract>
              <t>   RFC 9543 describes a framework for Network Slices in networks built
   from IETF technologies.  In this framework, the network resource
   partition (NRP) is introduced as a collection of network resources
   allocated from the underlay network to carry a specific set of
   Network Slice Service traffic and meet specific Service Level
   Objective (SLO) and Service Level Expectation (SLE) characteristics.

   This document defines YANG data models for Network Resource
   Partitions (NRPs), applicable to devices and network controllers.
   The models can be used, in particular, for the realization of the
   RFC9543 Network Slice Services in IP/MPLS and Segment Routing (SR)
   networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-nrp-yang-02"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slices">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma" initials="S." surname="Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="14" month="September" year="2023"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" to describe this type of network slice, and establishes the
   general principles of network slicing in the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-25"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-ip-mpls">
          <front>
            <title>Realizing Network Slices in IP/MPLS Networks</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ran Chen" initials="R." surname="Chen">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Luay Jalil" initials="L." surname="Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="28" month="May" year="2024"/>
            <abstract>
              <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-04"/>
        </reference>
      </references>
    </references>
    <?line 461?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Jie Dong and Adrian Farrel for the initial discussion behind this document.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>To be added in future revisions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9087XLbRpL/+RSzzI+TvAIpUXbWhlN2aJFxtCVRWpGJN7W1
dTUEhuSsQQCLAUjzFOVZ7lnuya67ZwYfJEDRipPaXVY5wsdMT39Pd08jjuO0
WqlMA+Gy9uVw8h0biXQdJR/ZOJCeYGORrPDvNY9jGc7ZT/3Re3Yd+SJot/h0
moiVq0c6ZkTLj7yQLwGcn/BZ6viLyN84qeDKkSKdOaEG7yiatNSTnNOvWz5P
YdL9oD8ZPrQ8uJlHycZlKvVbMk5cliaZSnunp69Oey2eCO6yuyhLcUWEN0+i
LHbZZNgfsw9wj7i+x2etlkp56P83D6IQ4G+EasXSZX9LI++Eqc0yETN1wgBp
g8rfWy2epYsocVstp8WYDJXLBh02QDrgXtM2WCTZKn8WJXOXfZ/xtZBw50VZ
mCLqlyO4E0suA2AGTuggB76d45OOFy0L+O867EOWA38X6bsSWDYR3iKMgmgu
gQAGXEmESF12dnrGxtEsXQNHWH8lwkycsJ+yRcbZQMIg6aWIkUwBnREP/4Hs
Qgx9FHfv7PT0rNcuo3xRQjngIe+ss2n07YJwIJRbYZQseSpXwm2xu+8uemdn
r/TV+dcvX+qrr097p/rqT69emKuX58+Lqxf66tXZy5656r06g6tLZ0AsalSX
cCqdDQ/nO2NT4SitqblK1Y4Lk9i8kOGsSsnL5y/OD8BB7cKEYbGzjAN4pX+O
4zA+BfZzYH9rspAKFSxbijBlcRKtpC8U49qWQO05W6JBsTRigDwjKzRrMlqT
GdpwxASsaiY9NgznMhQiQUU/mgyPNQzFjkRn3jlh6UKwH2WSZjzILfrox5EZ
BqpFIyZDNsnCUAQnTKTecYddpowHKmIqi+MoSRUz3MSVCeTtKAdnFgTjyh/d
CRVlCSB6yxNwKjIK2dHo7tYi12GThVAinwk6C+YnkkT4uABXtMYe+i02mghc
GWHAQxjFp4FgcxECSzweBBs2M0QqwZeBUAq0HJQ80vOWoNxzQRKJZo8tu5bp
gmWhL5Jgg8tPhl1khGFSB0VcISoGqXgyJiwyBcQhKssolGlE8kIEfMnnYaRS
6SmLQQkntVGpWCrkilpEa4b/HkEyEf/MhEo1BsgoWBcIjsqI25mJkZOWniHH
yMjo71L6fiBara/YJXLNzzwUZ6s1yPVVr8QBWAzwAGtOAgdiouk/hJeiNHnK
PB6yqUDmz+Q8Q1EXzIAb5K0MAYwmucPYB/3Eknui7eT+3viThwcmtaKAg5pn
wDFc0ltEyARktDU1JLiwLnDySCvBMugv+EoAaiJEowQCjRYGgWG2RdnQleh5
CBYW5GzFE3ACG7yxfPUFigKWAoCwwYCugXuH7Yee4fK56LTQlNGdAivQC+Vl
CpWGeFB2HTyb49+SldTv1SVo9/eP+rOHhxO2XkhvgWwlbQUmRLEAsutWAXwy
UuIGJDTBqSSmgTTJ+5Wc3ppv/hUcXT9IRRKS+w82J0z+tn6v5CHyJWCzYIw9
Y6yfL1b2RFWukgfCd4+tCJQBu0VyqORhDsqdg7IHgfCsBRcO4miazcBFg5md
MHAwGeAJcZO3EH4W0DXws3PMjMFqXwMiNiuRAghapaSVsKCKhSdnUqv5Nq52
l354oB2jjiHGqxg/Z6SEy/gyATKCTedJ7EU5h1U5O+zq0+i6oxXZgjLLx1Gc
BWAnsA+lND+VS3JHVdXOPTQP5P8Yw6iAy4MR4D48liEpp96pDtlA4iyJIwXS
UhnYMe6jIoCNBEI6cDtZGjkKtkSSFs70AhjrO0EUxfR2aVAaRWDx5LORFKQa
EIR9NEvgPiGTRddAN2BQpU3kEXk2RGco3psY18adEnDbtjqUJ3KaTLPM7qcJ
t7KDl9DPVUYra+UdRMaBj2vTHoVSwpV+HIENCAodYHRKngU8PFzbsA9IiDFc
32gDYY+oz3RDGFqN2dKmkuI8Hq3AWhDFoU0j10AtlMTICFiab8Em2tC4GN+M
wYKgaZRLwDLA/e6Po66hbpsEtI58x4hCiHTWC0FOINFgQg0pxMiLWIa+GDhk
SAVkFGxrSR78oLXBIjcIYS2VONG737+UiVi1uyWuygDyKmSsCb00XSAsKygO
EloD5V299+BQkPoUki10WQgLfruSzJe5DH2IZQkaBYLciK6AiM9oYyQlBw7g
X0iLDWxgKhilBnGcB8R7VhzrzYmGboU/sy37Ab2BfSaVuEcAO6MY2eubhQFd
8QkSUByrJW/U6BiWQj/jkqlBSMeGPooMEA8CDCUDDqr8V/gVdhtmyykoCgee
z8PC2+PkKMRggaIkrDYAeyFJpbAWX3cwfL2IwhVGg6Bvehv+KEBXo8RXrH39
w3jSPtF/2eiGru+Gf/nh8m44wOvx9/2rq/yiZUaMv7/54WpQXBUzL26ur4ej
gZ4MT1nlUat93f+prRWsfXM7ubwZ9a/aNXFeIoyqkJZDdE07jGpBBOUlcqqd
7LuL2//737Pn4Gz/YPJwiIz1zcuzPz2HGzRIvVpunxQvbVq4a/KEfBpw3eOx
TDlFyIrSjZChFWMm8NVXEIcJwQZgSQlfAgf7TEnIdbWvh2fxAtOtmiQARVRK
bq2r2KbWON2l4GHJjavNchoFyoQVkDL6BgGE44uZDO1OY2oLsJcQtreQUMpP
gmZSqjJCPzXioBSt1uXW2idUcCH3RJiGkW9SIr3JldC3KY32jSl4OqLGmBtY
ekwLEwuDCP2PwqASFvMCZPUsiZbW76XiU4r46ag7LcX/GThqweEh4lUiteoX
NdI60SRq0QPakJyqXTzxzTu0msiTtMnkBuVFkHKrOAL3Ykt6evGSBgB+E0qp
z4CxPxu+auP+uYKvfnKHebxAa6R7mOFiFsnsDPjhA8ctP9E/eoozwnUxvhyu
wq2V8wtQaw0+Vcs0H25CjZ0oI93EwKmfDw9ICHRwvopDJ0zXFo/yA8IEK1d2
cG97cG97cO/VmRmsqVI1NOqQvAbVPVUwAxSi5RwYXTaH0zAejSQXljUwXdHV
7nEWYQJMW6jvSx2d5RZTKtrgfN/ON7lrYZhVj+agCg3snVWAz9YZGPEdOAFB
SoFbVF16eggLlWGFppsNBO4sO6l4JaZ9LBWvz2M/KxUvCRZs7iIDIw1TDIzT
ilhsRISSMMmk8DGbfMauzkfXeme9Oq/mMewI3x0zu4Vgynd1jumOrRoYSdrb
Wx0WJpa9OqxE78Uhxa+EY1HDzDyaxXqbnC/Q6XlBBv4Yaywe+aQ80qbao4mL
ybVO8yTSFu4CkShdO8A6mY7TTEmPEpYKOdXopYm4PE3VsS1xCvhLAUSNWLE8
ZNa5HHQ0y3s5y3s7LO/tsLz3n8Xy3u/E8l6Z5ZOhaxO1PDt4egY6KeVChhk+
pkImyizsrpwXuhTnPtuuPCldetK71fMX5w8PZtxk6OiIXZUemAyRaIJkyz3Q
cWkvq/a4HVN5NZkdyiXE0s4K0xVIaOPABgO79WAIn5cyJR83hZdYHOU2AIcw
SYR+HEl0fNEKQ3KdlBR1TdDRhEMGnHkp5pmgLyfkqDG54iZh8jBoT0I8dTOU
YJ4P7F5AqkZZaISQ6USvXFzdIpF7EMb4plrgARqQdYtE6mxPaz2+HF/d6JBu
fDVUWPfD4IyILxUbQLtsunmIPoaEMakj7KY3MTDpL5gAFjlGoTURvv2nfQvA
dAIDWgbbK/DdxMSczTJiWSJWUsFQKg8+Y5fKpNScpnbBTh2PK2FrqDs1D43l
hRE52CGdgiIHusDWi7IqwI0WFUZ9axEEbw9asmY5a+QDseSJyVhvtZ4cjQe3
6rgWMgKUOsUVrA2gKV5rsyPImk+0ZumkFbmNIgQxqUZIkLx/LMvQ2G//whTy
3mI6o7OZsVXQVuuXX37BRy0dzLo1MZl1GCgPs+2zrgnklFsdapWzeF95rr3G
Hx0nWVvt+4NJmM3TUOXLFQFyPsFJo7ds/w/sHXLddAMh2g6EIwBBkmCVN+4R
BIjH1cc/5wgl8dudV/bnvGHdcG15oLow2MVgE/ya9KSgB/pm08WkpWZpCq2b
Ftdxt/SbiIbMalYldHf2b05Abx8BvV9FQO/3ICAVW9gzuz5a4z59q9e1CgRh
Ft95nxMZ83Th4ElPKLGW5Kx4kAlVN37/lGfsb5mCGOXvDVP1r9PpHIbKxqEs
+2A89PgvgUQSpdpzO1v838fufDpfcWl32iqAx6WFqvC2AbR7tNrW8i1urMJn
e6nWyroK3ZWOmayXhUdd6TcuCyqEpfT9a5tBGE05mk4IBJOGKRqjBiEUjDSF
fAeLQrVc2WeGhjScS/9xHqGQYsNaGlmZRhr2bHtUKlz9xmlQjRyGSow9gqIu
BAdOYTwfRAnOzIM7vKnV4NLvPgf1UMuc/FfHZ0vQMsbTD1yuzs3UOscyChYA
YID7OG7vRXsaPcLb1jcXN4Mhezd8fzkav2EzGUCw0bzNf9s77b1wTs+c3qsO
pghtExrsiQzYPeCIYx2IiTF2Y2eds9emnUvF3NNut50loYtQ3JhjKdP9tAzc
ULnUj9QMvY2QTDHPhBXL1xiMyCWV6iuVsntayYwO16/pNi/XGFa2sXJObVis
rzlGlVJdC6F4y0AzGQr4WELioX7RauxTRcHGQQ2IHN7wVcbUakSB8P6GiFrk
G6uFFfyxyngQ7k0NaHVtDBZ/6mag1KSuybKQSS3+RU2ygnD+eI/oqe/OMtRy
bEsFrvgG8rtzCrnr1+/Vr987YH3s9oP19Rq9SnNFqb+0VuWSeEvHk/gg+eSN
f/tV3opmt71CUX+FOjZo6fZMHppjWW3gpIJ1fSv9xFtI3NZNUszGch7ScSMq
QX9sPH+lcZUWouKPp4/z2h/esw9i6jL2zSJNY+V2u3hAgbvUR5EQrR3Aqbue
d5Hk7hsD9D27gqwYp2FfZxq5+PZbO9yM0qdwlcZW9k1d0+qbqj+mXlX2TV2v
6BuiQFe/4oJJtuyDPjWvbfHKkUJDbqtXLh3qN7YIgUB3O3b0ISeDtDfeJFQb
O/KOGbp7ZgSXqZSkgwvH4MpR6nk4QSdwBED3B+dte9hN22Gsj+eXCFZhOQUs
2rYpoDb51Iw7zSgzNkfWmPYbLcMnUxnyhLoWl+qEmfNcPd+eMpWPc0+w5gVI
LmWKRb04S1TGQ+w70Ed+KqMTq/ycmRrmgHMhJvIwTVnmU/1B15jvsPYA9+/G
A9AZPVYJc5gMiAFKgPPYFBaed7xKNwLx778UuxJzHuh6n6KKiOEBbNWm3ELD
7XGAeX9kdZr6vIUo9Nlg7WD989iylLTIbreEBdyXdQi5A7aL79Dn4InyayCG
DtANRvBYpkoEM/IAswwEGBDuYZRSc16b9llbkWFFZGB80LZug3ZTTgIgDGqd
9h4/iDi5+xr5apruc+9jw3lTF2jG6B2WbvLRdA6pDx5NwdSzEPA8wQcjQsVt
XKfkgacIWD993bT4te4ZeqxrrXk52E0+fzmw/WaItEPuwsSVHoNLlf89kHtP
h9zbD/ns6ZDP9kJOxeezdzLMW6YKwFSupR5jVYmLmwDRAFtirqmzltormzdl
rT3YvdydDI2pWbeW7GJShwvtSKI0y8aT5fAbf5iOVI2N3CrEjOXUuvSqhqf4
e8iv6pApMQftBluwysQV003DM+6T978OIsBCPAvDLtG7/dAQbFKzrVeMKiKs
vbci1d7N5/6IU8rDNvoWsqcSklXeNVNLFPcLj2uoZjXgtr1yPv2zYsdtgpqd
XSWG3KXpoSqQsqPSPxKJLYo+QS55cuDmVw3iKEbiX1vW/pzBB42V/hcSsD4e
bOBrhXH/thoNYY7plf2Sul33gVPRZLFNWUPPRSPfm+gpeyTsS6gAqMe8bT8Y
25+4VjHeyWK3UdSG1qs3tN7TDa2XG1rvEUPrfY6h1Q0+aOzva2i9/1RD+7e1
sd7BNvY51ZltZPQpsajINsOeayyjuWleGnv9mehvB5yPUHHop6HlX2MpoVSf
q85oSM6qPNF/H2yQbM+P2088QG43h9Q1aaRZzR606z6gUmhrsS03FplT82os
Xvr+YCfI3o6wdRswTGqb7nUQv2VVaaGcV7UR+UUOHvNSw7TaZoxCJpZA3A+7
pLXdUodQYT+kkEVq8LokIZCRPiwYjgbjN/ZMYSy8LLH9EtjCxG2jx7sBfR/Z
H/V33tFDqeynAVoGS/5RbDUVmbYsZL1NPH64u8z7MtuhamMpJxFzrCBt7OeS
9I4Y8tfrK4g09du27jzCL7EfHlx9KMKowfZX/xAOIOaypx1i4HSDJRapLnRZ
0zVfd43f0xkRkOKyUbevi1EF52Bd80UJEpsfqnS+GG0k6F8hsUrdyQjHugV8
Ru3nbZYLkaSEX8n/FlLS/w+B3Cr2iiTnJU14umh1Md6trKmWrbKLppe26vVl
JUffK0+59xGtse99DKN1IHzdoIvtWDz8SE2Mf5aCDSLzbVDfTyRo1Hc8SUqH
SLZ8Z77CRSFPBRicv/XRAq40/MSXcYDfFUxsP5fu5drq5KJPqv8fnHyan2hD
AAA=

-->

</rfc>
