<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of RFC XXXX Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-01"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2023" month="October" day="16"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 162?>

<t>5G slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks. This feature covers slicing
   requirements for all mobile domains, including the Radio Access
   Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a basic RFC XXXX Network Slice realization model
   in IP/MPLS networks with a focus on the Transport Network fulfilling
   5G slicing connectivity requirements. This realization model reuses many building blocks currently commonly used
   in service provider networks.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please update "RFC XXXX Network Slice"  with the RFC number assigned to I-D.ietf-teas-ietf-network-slices.</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> defines a framework for
   network slicing in the context of networks built using IETF
   technologies.  The RFC XXXX network slicing framework introduces the
   concept of a Network Resource Partition (NRP), which is simply a
   collection of resources identified in the underlay network.  There
   could be multiple realizations of RFC XXXX Network Slice and
   NRP concepts, where each realization might be optimized for the
   different network slicing use cases.</t>
      <t>This document describes an RFC XXXX Network Slice realization model
   in IP/MPLS networks, using a single NRP and with a focus on
   fulfilling 5G slicing connectivity requirements.
   This realization model leverages many building blocks currently
   commonly used in service provider networks.</t>
      <t>This document focuses on the technical realization of RFC XXXX Network Slices. The realization is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Network Slice Service mapping considerations (e.g., mapping between 3GPP to IETF service parameters) are discussed in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>Note that 5G slicing can be implemented with or without Transport Network (TN) slicing. However, implementing TN slicing as part of 5G slicing allows operators to better control Service Level Agreements (SLAs). See <xref target="sec-5g"/>.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-intro"/> for readers' convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more
   details about 3GPP network architectures.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-intro"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a Network Function (NF) instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a Wide Area Network (WAN) (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the RFC XXXX Network Slices apply.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
     +----------------------------------+
  +--+         5G NF (RAN or CN)        +--+
  |  +----------------------------------+  |
  |                                        |
  v                                        v
.--.  +--------------------------------+  .--.
|NF+--+      Transport Network         +--+NF|
'--'  +--------------------------------+  '--'
          |             |            |
          v             v            v
  +---Data Center--+ +-MPLS-VPN-+  +-Public-+
  |                | | Backbone |  | Cloud  |
  |   .--..--.     |.--.      .--..--.      |
  |   '--''--'     |'--'      '--''--'      |
  |                | |          |  |        |
  |.--..--..--..--.|.--.      .--. |        |
  |'--''--''--''--'|'--'      '--' |        |
  |                | |          |  |        |
  +----------------+ +----------+  +--------+
]]></artwork>
        </figure>
        <t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. End-to-End 5G Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN Slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different options to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design: Customer Sites and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site             │                     │       │      Site       
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the End-to-End 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt>Customer Sites:</dt>
          <dd>
            <t>A customer manages and deploys 5G Network Functions (RAN and CN) in Customer Sites. On top of 5G Network Functions (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, switches, or VPC Gateways) within a Customer Site. A Customer Site can be either a physical or a virtual location. Examples of Customer Sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within provider or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Orchestration of the TN within Customer Sites involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). The detail of these controllers is out of the scope of this document.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting Customer Sites. The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect Customer Sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G Network Functions (i.e., an element of 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)). This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data model terminology (e.g., <xref target="RFC9182"/>), this document assumes that an AC is configured on a “bearer”, which represents the underlying connectivity. Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a definition of CE/PE/AC that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of such a distribution is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed. An example of a distributed PE is the “Managed CE service”. For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters (e.g., the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies)). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although we may consider that the AC stitching logic happens internally within the CE device itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs), a CE may also connect to the provider network using MPLS -potentially over IP tunnels- or SRv6. The CE has awareness of provider services configuration (e.g., control plane identifiers such as Route Targets and Route Distinguishers). An example of such an AC is depicted in <xref target="_figure-51"/>. This is a source of confusion since these configurations are typically enforced on PEs. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │              
│                                     │               │
               │ ◀──────MP-BGP─────▶        
│          ┌────┐                  ┌──┴─┐             │
           │    │   MPLS-based AC  │    │              
│          │ CE ├ ─ ─ ─ ─ ─ ─ ─ ─ ─│ PE │             │
        ┏━━┻━━━━┻━━┓               │    │ 
│       ┃  VRF foo ┃               └──┬─┘             │
 ─ ─ ─ ─┗━ ━━━━━━━━┛                   ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
          </figure>
          <t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>End-to-End 5G Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of an end-to-end 5G Slice with a zoom on TN parts. This framework helps to delimit the realization scope of RFC XXXX Network Slices and identify interactions that are required for the realization of such slices.</t>
          <ul empty="true">
            <li>
              <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
            </li>
          </ul>
          <t>In reference to <xref target="_figure-orch"/>, an end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating end-to-end 5G Slices. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G Slice spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>
          <ul spacing="normal">
            <li>
              <t>Provider Network Orchestration domain: as defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>, the provider relies on an RFC XXXX Network Slice Controller (NSC) to manage and orchestrate RFC XXXX Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </li>
            <li>
              <t>Customer Site Orchestration domain: the Orchestration of TN elements of the Customer Sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this segment does not involve the Transport Network Orchestration.</t>
            </li>
          </ul>
          <t>A TN Slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <figure anchor="_figure-orch">
            <name>End-to-end 5G Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         +-----------+                          
                         │  5G NSO   │                          
                         +-----------+                          
                            │   │                               
                            │   │                               
                            v   │                               
              +---------------+ │                               
              │ 3GPP domains  │ │                               
  +-----------+ Orchestration +----------------------------+    
  │           │ (RAN and CN)  │ │                          │    
  │           +---------------+ │                          │    
  │                             │                          │    
  │    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━│━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   │    
  │      TN Orchestration       │                          │    
  │    ┃        ┌───────────────┼──────────────┐       ┃   │    
  │             v               v              v           │    
  │    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   │    
  │     │ Customer Site ││RFCXXXX NSC││ Customer Site │    │    
  │    ┃│ Orchestration ││           ││ Orchestration │┃   │    
  │     └──┬────────────┘└─────┬─────┘└──────────────┬┘    │    
  │    ┗ ━ │ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        v                   v                     v     │    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─│─ ─ 
  │                          Provider                      │   │
│ v           │       ┌─┴──┐ Network   ┌──┴─┐      ┌┴───┐  │    
 ┌──┐     ┌────┐  AC  │    │           │    │  AC  │ NF <──┘   │
││NF● ─ ─ ┤ CE ├ ─ ─ ─■ PE │           │ PE ■ ─ ─ ─●(CE)│       
 └──┘     └────┘      │    │           │    │      └────┘      │
│             │       └─┬──┘           └──┬─┘       │           
    Customer                                          Customer │
│     Site    │         │                 │         │   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC XXXX                          
                      ■────Network Slice───■                   
                                                                
     ●──────────────────TN Slice────────────────────●           
                                                                
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to architecture in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main types of segments that are shown in <xref target="fig-end-to-end"/>:</t>
          <ul spacing="normal">
            <li>
              <t>Customer Site: Either connects two NFs located in the same Customer Site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE. The realization of this segment is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration. The realization of this segment does not involve the Transport Network Orchestration.</t>
            </li>
            <li>
              <t>Provider Network: Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC XXXX NSC.</t>
            </li>
            <li>
              <t>Attachment Circuit: Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC XXXX NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </li>
          </ul>
          <t>As depicted in <xref target="fig-end-to-end"/>, the realization of an RFC XXXX Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new Network Slice may rely on a partial or full pre-provisioned segment (e.g., a new Network Slice may rely on an existing AC). The Customer Site segment is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the Customer Site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the Network Slice between PE interfaces connected to the AC.</t>
          <figure anchor="fig-end-to-end">
            <name>Segmentation of the Transport Network</name>
            <artwork align="center"><![CDATA[
                                                                  
       |──────────────────────TN Slice────────────────|           
                                                                  
                        o───RFC XXXX Network──o                   
                        │        Slice        │                   
                        │          │          │                   
                        │          |          │                   
                        v          v          v                   
       o──CS──□ □───AC──o □────────PN───────□ o───AC──o           
  +-------------+          +---------------+          +----------+
  |   Customer  |          |     Provider  |          | Customer │
  │     Site    │          │    Network    │          │   Site   |
  |             |       +----+           +----+       |          │
  │+---+    +----+  AC  │    │           │    │  AC  +---+       |
CS|│NF1├────┤ CE +------+ PE │           │ PE ├ ─ ─ ─│NF3│       │
□ │+-+-+    +----+      │    │           │    │      +---+       |
│ |  │                  +----+           +----+       |          │
│ │  │          │          │               │          │          |
□ |+-+-+        │          │               │          │          |
  ││NF2│        │          │               │          │          |           
  |+---+        │          │               │          │          |
  +-------------+          +---------------+          +----------+  
                                                                  
  □──────□  TN segments:                                          
            CS= Customer Site                                     
            AC= AC                                                
            PN= Provider Network                                  
]]></artwork>
          </figure>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC XXXX NSC).  More precisely, a PE and a CE connected via an AC must be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the RFC XXXX Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.boro-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of TN Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
      +-------------+                +------------------+ 
      │Customer Site│  IETF APIs/DM  │  RFC XXXX NSC    │ 
      │Orchestration│ <------------> │(Provider Network │ 
      │             │                │ Orcherstration)  │ 
      │             │                │                  │ 
      +-------------+                +------------------+ 
                   │                  │                   
                   │                  │                   
+ ─ ─ ─ ─ ─ ─ ─ ─ ─│+                +│------------------+
|                  │|                |│+----+            |
│ +--+       +----+v│   192.0.2.0/31 │v│    │            │
| │NF|-------| CE +--------------------+ PE │            | 
│ +--+       +----+.1    VLAN 100    .0│    │            │
|     Customer      |                | +----+Provider    | 
│       Site        │                │       Network     │
+-------------------+                +-------------------+
                  |──────────AC────────|                  
                                                          
]]></artwork>
          </figure>
        </section>
        <section anchor="additional-segmentation-and-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Realization Schemes for RFC XXXX Network Slices</name>
        <t>There are multiple options for mapping a 5G Network Slice to RFC XXXX Network Slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
 A single 5G Network Slice can map to multiple RFC XXXX Network
 Slices (1 to N).  One example of such a case is the separation of
 the 5G Control Plane and User Plane: this use case is represented
 in <xref target="_figure-5"/> where a slice (eMBB) is deployed with a separation of
 User Plane and Control Plane at the TN.</t>
          </li>
          <li>
            <t>N to 1:
 Multiple 5G Network Slices may rely upon the same RFC XXXX Network
 Slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>N to M:
 The 5G to RFC XXXX Network Slice mapping combines both
 approaches with a mix of shared and dedicated associations.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC XXXX Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
. ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ .
|                                                               |
│                        5G Slice eMBB                          │
|                                                               |
│            . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ .            │
| .─────. N3 | . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ . | N3 .─────. |
│ │CU-UP├─────── RFC XXXX Network Slice UP_eMBB  ───────┤ UPF │ |
| '─────'    | ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ' |    '─────' |
│            |                                     |            |
| .─────. N2 | . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ . | N2 .─────. |
│ │CU-CP├───────   RFC XXXX Network Slice CP     ───────┤ AMF │ |
| '─────'    | ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ' |    '─────' |
' ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ '
             │                                     │
             │                                     │
             |         Transport Network           |
             │                                     │
             │                                     │
             ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ '
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC XXXX Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  .-------------.
                  |  Edge Cloud |
                  |             |
                  | .---------. |
                  | │UPF_URLLC│ |
                  | '-----+---' |
                  '-------│-----'
.---------------. .-------|----------------------.
|               | | .-----+--------------------. │ .--------------.
|   Cell Site   │ | |                          │ | |              |
|               | | │                          | │ │   Regional   |
| .-----------. │ │ |                          | | |     Cloud    |
| │CU-UP_URLLC+-----+                          | │ │ .----------. |
| '-----------' │ │ |    RFC XXXX Network      +-----+  5GC CP  │ |
|               | | │        Slice ALL         | │ │ '----------' |
| .-----------. | │                            | | | |            |
| │CU-UP_eMBB +-----+                          | | | .----------. |
│ '-----------' | | |                          +-----+ UPF_eMBB │ |
'---------------' | |                          | | | '----------' |
                  | '--------------------------' | |              |
                  |                              | '--------------'
                  |      Transport Network       |
                  '------------------------------'
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
        <t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate few Network Slices and accommodate the need of few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize Network Slices (including the adjustment of slice services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="first-5g-slice-versus-subsequent-slices">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G Control Plane and User Plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and CU-CP must be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic compared with the subsequent slices. Referring to the example in <xref target="_figure-7"/>, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for Control and User Planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a User Plane Function (NF-UP2) together with a dedicated User Plane TN slice (INS-UP2). The Control Plane of the first 5G slice is also updated to integrate the second slice: the TN Slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2023), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="520" viewBox="0 0 520 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,176" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,416" fill="none" stroke="black"/>
                <path d="M 8,544 L 8,560" fill="none" stroke="black"/>
                <path d="M 72,64 L 72,96" fill="none" stroke="black"/>
                <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
                <path d="M 120,128 L 120,160" fill="none" stroke="black"/>
                <path d="M 120,400 L 120,432" fill="none" stroke="black"/>
                <path d="M 120,464 L 120,496" fill="none" stroke="black"/>
                <path d="M 128,576 L 128,608" fill="none" stroke="black"/>
                <path d="M 160,48 L 160,72" fill="none" stroke="black"/>
                <path d="M 160,88 L 160,136" fill="none" stroke="black"/>
                <path d="M 160,184 L 160,240" fill="none" stroke="black"/>
                <path d="M 160,384 L 160,408" fill="none" stroke="black"/>
                <path d="M 160,424 L 160,472" fill="none" stroke="black"/>
                <path d="M 160,488 L 160,560" fill="none" stroke="black"/>
                <path d="M 160,664 L 160,720" fill="none" stroke="black"/>
                <path d="M 176,64 L 176,96" fill="none" stroke="black"/>
                <path d="M 176,128 L 176,160" fill="none" stroke="black"/>
                <path d="M 176,400 L 176,432" fill="none" stroke="black"/>
                <path d="M 176,464 L 176,496" fill="none" stroke="black"/>
                <path d="M 176,576 L 176,608" fill="none" stroke="black"/>
                <path d="M 392,64 L 392,96" fill="none" stroke="black"/>
                <path d="M 392,128 L 392,160" fill="none" stroke="black"/>
                <path d="M 392,576 L 392,608" fill="none" stroke="black"/>
                <path d="M 408,184 L 408,240" fill="none" stroke="black"/>
                <path d="M 408,432 L 408,448" fill="none" stroke="black"/>
                <path d="M 408,664 L 408,720" fill="none" stroke="black"/>
                <path d="M 440,576 L 440,608" fill="none" stroke="black"/>
                <path d="M 448,64 L 448,96" fill="none" stroke="black"/>
                <path d="M 448,128 L 448,160" fill="none" stroke="black"/>
                <path d="M 496,128 L 496,160" fill="none" stroke="black"/>
                <path d="M 512,32 L 512,48" fill="none" stroke="black"/>
                <path d="M 512,368 L 512,384" fill="none" stroke="black"/>
                <path d="M 512,544 L 512,656" fill="none" stroke="black"/>
                <path d="M 8,32 L 512,32" fill="none" stroke="black"/>
                <path d="M 72,64 L 120,64" fill="none" stroke="black"/>
                <path d="M 176,64 L 392,64" fill="none" stroke="black"/>
                <path d="M 448,64 L 496,64" fill="none" stroke="black"/>
                <path d="M 120,80 L 176,80" fill="none" stroke="black"/>
                <path d="M 392,80 L 448,80" fill="none" stroke="black"/>
                <path d="M 72,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 176,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 448,96 L 496,96" fill="none" stroke="black"/>
                <path d="M 72,128 L 120,128" fill="none" stroke="black"/>
                <path d="M 176,128 L 392,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 496,128" fill="none" stroke="black"/>
                <path d="M 120,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 392,144 L 448,144" fill="none" stroke="black"/>
                <path d="M 72,160 L 120,160" fill="none" stroke="black"/>
                <path d="M 176,160 L 392,160" fill="none" stroke="black"/>
                <path d="M 448,160 L 496,160" fill="none" stroke="black"/>
                <path d="M 8,176 L 512,176" fill="none" stroke="black"/>
                <path d="M 8,368 L 512,368" fill="none" stroke="black"/>
                <path d="M 72,400 L 120,400" fill="none" stroke="black"/>
                <path d="M 176,400 L 392,400" fill="none" stroke="black"/>
                <path d="M 448,400 L 496,400" fill="none" stroke="black"/>
                <path d="M 120,416 L 176,416" fill="none" stroke="black"/>
                <path d="M 72,432 L 120,432" fill="none" stroke="black"/>
                <path d="M 176,432 L 392,432" fill="none" stroke="black"/>
                <path d="M 448,432 L 496,432" fill="none" stroke="black"/>
                <path d="M 72,464 L 120,464" fill="none" stroke="black"/>
                <path d="M 176,464 L 392,464" fill="none" stroke="black"/>
                <path d="M 448,464 L 496,464" fill="none" stroke="black"/>
                <path d="M 120,480 L 176,480" fill="none" stroke="black"/>
                <path d="M 72,496 L 120,496" fill="none" stroke="black"/>
                <path d="M 176,496 L 392,496" fill="none" stroke="black"/>
                <path d="M 448,496 L 496,496" fill="none" stroke="black"/>
                <path d="M 8,512 L 152,512" fill="none" stroke="black"/>
                <path d="M 168,512 L 512,512" fill="none" stroke="black"/>
                <path d="M 8,544 L 152,544" fill="none" stroke="black"/>
                <path d="M 168,544 L 512,544" fill="none" stroke="black"/>
                <path d="M 72,576 L 128,576" fill="none" stroke="black"/>
                <path d="M 176,576 L 392,576" fill="none" stroke="black"/>
                <path d="M 440,576 L 496,576" fill="none" stroke="black"/>
                <path d="M 128,592 L 176,592" fill="none" stroke="black"/>
                <path d="M 392,592 L 440,592" fill="none" stroke="black"/>
                <path d="M 72,608 L 128,608" fill="none" stroke="black"/>
                <path d="M 176,608 L 392,608" fill="none" stroke="black"/>
                <path d="M 440,608 L 496,608" fill="none" stroke="black"/>
                <path d="M 8,656 L 512,656" fill="none" stroke="black"/>
                <path d="M 268,312 L 276,328" fill="none" stroke="black"/>
                <path d="M 276,328 L 284,344" fill="none" stroke="black"/>
                <path d="M 292,344 L 300,328" fill="none" stroke="black"/>
                <path d="M 300,328 L 308,312" fill="none" stroke="black"/>
                <g class="text">
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="404" y="52">─.</text>
                  <text x="32" y="68">1</text>
                  <text x="408" y="68">│</text>
                  <text x="512" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="96" y="84">NF-CP</text>
                  <text x="204" y="84">CP</text>
                  <text x="228" y="84">TN</text>
                  <text x="264" y="84">Slice</text>
                  <text x="324" y="84">(INS-CP)</text>
                  <text x="476" y="84">NF-CP│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="408" y="100">│</text>
                  <text x="512" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="408" y="116">|</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="408" y="132">│</text>
                  <text x="512" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="92" y="148">│NF-UP</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(INS-UP1)</text>
                  <text x="472" y="148">NF-UP</text>
                  <text x="512" y="148">|</text>
                  <text x="160" y="164">|</text>
                  <text x="408" y="164">|</text>
                  <text x="512" y="164">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="276" y="308">─┘</text>
                  <text x="300" y="308">└─</text>
                  <text x="288" y="356">V</text>
                  <text x="176" y="388">─</text>
                  <text x="192" y="388">─</text>
                  <text x="208" y="388">─</text>
                  <text x="224" y="388">─</text>
                  <text x="240" y="388">─</text>
                  <text x="256" y="388">─</text>
                  <text x="272" y="388">─</text>
                  <text x="288" y="388">─</text>
                  <text x="304" y="388">─</text>
                  <text x="320" y="388">─</text>
                  <text x="336" y="388">─</text>
                  <text x="352" y="388">─</text>
                  <text x="368" y="388">─</text>
                  <text x="384" y="388">─</text>
                  <text x="404" y="388">─.</text>
                  <text x="32" y="404">1</text>
                  <text x="408" y="404">│</text>
                  <text x="512" y="404">│</text>
                  <text x="32" y="420">s</text>
                  <text x="48" y="420">S</text>
                  <text x="92" y="420">│NF-CP</text>
                  <text x="204" y="420">CP</text>
                  <text x="228" y="420">TN</text>
                  <text x="264" y="420">Slice</text>
                  <text x="324" y="420">(INS-CP)</text>
                  <text x="444" y="420">├──────┤NF-CP│</text>
                  <text x="512" y="420">|</text>
                  <text x="8" y="436">│</text>
                  <text x="32" y="436">t</text>
                  <text x="48" y="436">l</text>
                  <text x="512" y="436">│</text>
                  <text x="8" y="452">|</text>
                  <text x="48" y="452">i</text>
                  <text x="512" y="452">|</text>
                  <text x="8" y="468">│</text>
                  <text x="32" y="468">5</text>
                  <text x="48" y="468">c</text>
                  <text x="408" y="468">│</text>
                  <text x="512" y="468">│</text>
                  <text x="8" y="484">|</text>
                  <text x="32" y="484">G</text>
                  <text x="48" y="484">e</text>
                  <text x="92" y="484">│NF-UP</text>
                  <text x="204" y="484">UP</text>
                  <text x="228" y="484">TN</text>
                  <text x="264" y="484">Slice</text>
                  <text x="328" y="484">(INS-UP1)</text>
                  <text x="444" y="484">├──────┤NF-UP│</text>
                  <text x="512" y="484">|</text>
                  <text x="8" y="500">│</text>
                  <text x="408" y="500">│</text>
                  <text x="512" y="500">│</text>
                  <text x="408" y="532">|</text>
                  <text x="32" y="564">2</text>
                  <text x="408" y="564">│</text>
                  <text x="8" y="580">│</text>
                  <text x="32" y="580">n</text>
                  <text x="48" y="580">S</text>
                  <text x="160" y="580">│</text>
                  <text x="408" y="580">|</text>
                  <text x="8" y="596">|</text>
                  <text x="32" y="596">d</text>
                  <text x="48" y="596">l</text>
                  <text x="96" y="596">│NF-UP2</text>
                  <text x="204" y="596">UP</text>
                  <text x="228" y="596">TN</text>
                  <text x="264" y="596">Slice</text>
                  <text x="328" y="596">(INS-UP2)</text>
                  <text x="472" y="596">NF-UP2│</text>
                  <text x="8" y="612">│</text>
                  <text x="48" y="612">i</text>
                  <text x="160" y="612">│</text>
                  <text x="408" y="612">|</text>
                  <text x="8" y="628">|</text>
                  <text x="32" y="628">5</text>
                  <text x="48" y="628">c</text>
                  <text x="160" y="628">|</text>
                  <text x="408" y="628">│</text>
                  <text x="8" y="644">│</text>
                  <text x="32" y="644">G</text>
                  <text x="48" y="644">e</text>
                  <text x="160" y="644">│</text>
                  <text x="408" y="644">|</text>
                  <text x="248" y="692">Transport</text>
                  <text x="320" y="692">Network</text>
                  <text x="176" y="724">─</text>
                  <text x="192" y="724">─</text>
                  <text x="208" y="724">─</text>
                  <text x="224" y="724">─</text>
                  <text x="240" y="724">─</text>
                  <text x="256" y="724">─</text>
                  <text x="272" y="724">─</text>
                  <text x="288" y="724">─</text>
                  <text x="304" y="724">─</text>
                  <text x="320" y="724">─</text>
                  <text x="336" y="724">─</text>
                  <text x="352" y="724">─</text>
                  <text x="368" y="724">─</text>
                  <text x="384" y="724">─</text>
                  <text x="400" y="724">─</text>
                  <text x="76" y="740">Deployment</text>
                  <text x="132" y="740">of</text>
                  <text x="188" y="740">subsequent</text>
                  <text x="244" y="740">5G</text>
                  <text x="280" y="740">slice</text>
                  <text x="324" y="740">with</text>
                  <text x="372" y="740">shared</text>
                  <text x="432" y="740">Control</text>
                  <text x="488" y="740">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   .--------------------------------------------------------------.
   |                  . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─.            |
   |  1    .-----.    | .--------------------------. │    .-----. │
   |  s S  |NF-CP+------+  CP TN Slice (INS-CP)    +------+NF-CP│
   |  t l  '-----'    | '--------------------------' │    '-----' │
   |    i             |                              |
   |  5 c  .-----.    | .--------------------------. │    .-----. │
   |  G e  │NF-UP+------+  UP TN Slice (INS-UP1)   +------+NF-UP| |
   |       '-----'    | '--------------------------' |    '-----' │
   '--------------------------------------------------------------'
                      |                              |
                      |      Transport Network       |
                      |                              |
                      ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─'
                         Deployment of first 5G slice
                                     │ │
                                     │ │
                                    ─┘ └─
                                    ╲   ╱
                                     ╲ ╱
                                      V
   .--------------------------------------------------------------.
   |                  . ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─.            |
   |  1    .-----.    | .--------------------------. │    .-----. │
   |  s S  │NF-CP+------+  CP TN Slice (INS-CP)    ├──────┤NF-CP│ |
   │  t l  '-----'    | '--------------------------' |    '-----' │
   |    i             |                              |            |
   │  5 c  .-----.    | .--------------------------. │    .-----. │
   |  G e  │NF-UP+------+  UP TN Slice (INS-UP1)   ├──────┤NF-UP│ |
   │       '-----'    | '--------------------------' │    '-----' │
   '------------------|-------------------------------------------'
                      |                              |
   .------------------|-------------------------------------------.
   |  2               |                              │            |
   │  n S  .------.   │ .--------------------------. |   .------. |
   |  d l  │NF-UP2+-----+  UP TN Slice (INS-UP2)   +-----+NF-UP2│ |
   │    i  '------'   │ '--------------------------' |   '------' |
   |  5 c             |                              │            |
   │  G e             │                              |            |
   '--------------------------------------------------------------'
                      |                              |
                      |      Transport Network       |
                      |                              |
                      ' ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─'
       Deployment of subsequent 5G slice with shared Control Plane
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
    </section>
    <section anchor="sec-over-rea-model">
      <name>Overview of the Realization Model</name>
      <t><xref target="I-D.ietf-teas-ietf-network-slices"/> introduces the concept of the
   Network Resource Partition (NRP), which is defined as a collection of
   resources identified in the underlay network.  In the basic
   realization model described in this document, depicted in <xref target="_figure-high-level-qos"/>, a single NRP is used
   with the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>Layer 2 Virtual Private Network (L2VPN)/Layer 3 Virtual Private Network (L3VPN) service instances for logical separation:  </t>
          <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. eCPRI supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
        </li>
        <li>
          <t>Fine-grained resource control at the PE:  </t>
          <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
          <t>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
          <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
        </li>
        <li>
          <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
        </li>
        <li>
          <t>Capacity planning/management for efficient usage of provider network resources:  </t>
          <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure more less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
        </li>
      </ul>
      <figure anchor="_figure-high-level-qos">
        <name>Resource Allocation Slicing Model with a Single NRP</name>
        <artwork align="center"><![CDATA[
        ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐        
  +----------+               Base NRP               +----------+   
  │    PE    │                                      │    PE    │   
. ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─. 
  ■<───┐│    │     RFC XXXX Network Slice 1         │    ┌┼───>■ │ 
│ │    │     │        ┌─────┐        ┌─────┐        │    │     │   
  ■<───┤│    │        │  P  │        │  P  │        │    ├┼───>■ │ 
├ ┼ ─ ─├────>□<──────>□<───>□<──────>□────>□<──────>□<───┤─ ─ ─│─  
  ■<───┤│    │        │     │        │     │        │    ├┼───>■ │ 
│ │    │     │        └─────┘        └─────┘        │    │     │   
  ■<───┘│    │     RFC XXXX Network Slice 2         │    └┼───>■ │ 
' ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─' 
  │     │    │                                      │     │    │   
  +----------+                                      +----------+   
        └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘        
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices            
]]></artwork>
      </figure>
      <t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification.  The S-NSSAI is not visible to the transport domain.
   So instead, 5G functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). More details about the mapping between 3GPP and RFC XXXX Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC XXXX Network Slice, fulfilling connectivity
   requirements between NFs of some 5G slice, is represented at the Service Demarcation Point (SDP)
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.  Each VLAN
   represents a distinct logical interface on the attachment circuits,
   hence it provides the possibility to place these logical interfaces
   in distinct L2 or L3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP
   based interfaces (the only exception could be the F2 fronthaul-
   interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to RFC XXXX Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple from
   the NF point of view, it adds complexity due to the requirement of
   maintaining mapping tables for each SDP.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>5G Slice with VLAN Hand-off</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           │     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      │             │           
           │                        │     │             │           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
│      ●───────●■    │          │    ■●───────●     ●───────●      │
│ NF   ●───────●■ PE │          │ PE ■●───────●L2/L3●───────●   NF │
│      ●───────●■    │          │    ■●───────●     ●───────●      │
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    │                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="ip-hand-off">
        <name>IP Hand-off</name>
        <t>In this option, the slices in the TN domain are instantiated
   by IP tunnels (for example, IPsec or GTP-U tunnels) established between
   NFs, as depicted in <xref target="_figure-ip-hand-off"/>.  The transport for a single 5G slice might be constructed with
   multiple such tunnels, since a typical 5G slice contains many NFs -
   especially DUs and CUs.  If a shared NF (i.e., an NF that serves
   multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a
   single slice.  As opposed to the VLAN hand-off case, there is no
   logical interface representing a slice on the PE, hence all slices are
   handled within single service instance.  On the other hand, similarly
   to the VLAN hand-off case, a mapping table tracking IP to RFC XXXX
   Network Slice mapping is required.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>5G Slice with IP Hand-off</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used
   to address NFs.  An IPv6 address is a 128-bit long field, while the
   S-NSSAI is a 32-bit field: Slice/Service Type (SST): 8 bits, Slice
   Differentiator (SD): 24 bits. 32 bits, out of 128 bits of the IPv6
   address, may be used to encode the S-NSSAI, which makes an IP to
   Slice mapping table unnecessary. This mapping is simply a local allocation method
   to allocate IPv6 addresses to NF loopbacks, without redefining IPv6
   semantics. Different IPv6 address allocation schemes following this
   mapping approach may be used, with one example allocation showed in <xref target="_figure-11"/>.</t>
        <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary nodes are not
   required to associate any additional semantic with IPv6 address.</t>
        <t>One
   benefit of embedding the S-NSSAI in the IPv6 address is that it provides
   a very easy way of identifying the packet as belonging to given
   S-NSSAI at any place in the TN domain.  This might be
   used, for example, to selectively enable per S-NSSAI monitoring, or
   any other per S-NSSAI handling, if required.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI Embedded into IPv6</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address are
   unique to the NF, but do not carry any slice-specific information, while
   the least significant 32 bits are used to embed the S-NSSAI information.
   The 96-bit part of the address may be further divided based, for
   example, on the geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> shows an example of a slicing deployment, where the S-NSSAI is
   embedded into IPv6 addresses used by NFs.  NF-A has a set of tunnel
   termination points, with unique per-slice IP addresses allocated from
   the 2001:db8::a:0:0/96 prefix, while NF-B uses a set of tunnel
   termination points with per-slice IP addresses allocated from
   2001:db8::b:0:0/96.  This example shows two slices: eMBB (SST=1) and
   MIoT (SST=3).  Therefore, for eMBB the tunnel IP addresses are auto-
   derived (without the need for a mapping table) as {2001:db8::a:100:0,
   2001:db8::b:100:0}, while for MIoT (SST=3) tunnel uses
   {2001:db8::a:300:0, 2001:db8::b:300:0}.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
          <artwork align="center"><![CDATA[
 2001:db8::a:0:0/96 (NF-A)                2001:db8::b:0:0/96 (NF-B) 
                                                                    
 2001:db8::a:100:0/128                        2001:db8::b:100:0/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────v─┐       ┌──┴──┐ Provider ┌───┴─┐    v  ┌─────┐       ┌─v────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────^─┘       └──┬──┘  Network └───┬─┘    ^  └─────┘       └─^────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   MIoT (SST=3)          │     
     │                                                        │     
 2001:db8::a:300:0/128                        2001:db8::b:300:0/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLSoUDP encapsulation, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Option A (<xref target="sec-10a"/>):</dt>
              <dd>
                <t>VRF-to-VRF connections.</t>
              </dd>
            </dl>
          </li>
          <li>
            <t>Option B (<xref target="sec-10b"/>):
     : redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </li>
          <li>
            <dl>
              <dt>Option C (<xref target="sec-10c"/>):</dt>
              <dd>
                <t>redistribution of labeled VPN routes without next-hop
change and redistribution of labeled transport routes with next-hop
change at domain boundaries.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLSoUDP/MPLSoIP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>MPLS Hand-off: Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE must be able to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node must carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off: Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast must be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the attachment circuit there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the attachment circuit with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs must program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE must be able to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5QI (5G QoS
   indicator), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier (ID) that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDP
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS will be referred as '5G QoS
   Class' ('5G QoS' in short), or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this RFC XXXX Network Slice
   realization.  That is, RFC XXXX Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC XXXX Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the architecture assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by QoS indicator
   specific to the encapsulation used in the provider network, and it could
   be DSCP or MPLS Traffic Class (TC).  This layer of QoS will be referred as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network, via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per 5QI differentiated treatment from the provider network.
   This can be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per slice, but not
   per 5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization architecture defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC XXXX Network
   Slice is mapped to single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC XXXX
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC XXXX Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC XXXX Network Slice)       RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN QoS Class
   marking, per-hop behavior for all RFC XXXX Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From the QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 <xref target="RFC8754"/> provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC XXXX Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to RFC XXXX NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, which meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, must not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   must be rejected by the RFC XXXX NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
X ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
X ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
X ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
X ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
X ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
X ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
X ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
X ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC XXXX Network Slice)        RFC XXXX Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in large scale deployments (large number of 5G
   slices), the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Rel.17) and O-RAN the mapping of 5QI to
DSCP is not expected in per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC XXXX Network Slices is executed on provider network transit links.  Provider network
   transit routers do not evaluate original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In 5QI-aware model, compared to 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC XXXX Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each RFC XXXX
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, must not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   must not exceed the physical capacity of the attachment circuit.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-planes-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A network operator might define various tunnel groups, where each
   tunnel group is created with specific optimization criteria and
   constraints.  This document refers to such tunnel groups as
   'transport planes'.  For example, a transport plane "A" might represent
   tunnels optimized for latency, and transport plane "B" might represent tunnels optimized for high capacity.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes.  These transport planes might be realized via various IP/MPLS
   techniques, for example Flex-Algo or RSVP/SR traffic engineering
   tunnels with or without PCE, and with or without bandwidth
   reservations.</t>
      <t><xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Transport Planes</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there could be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   X ┃│  └──────────┘ │┃   │
   X ┃   ┌──────────┐  ┃   │                     │
   X ┃│  │ 5G QoS B ├──────┤
   X ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   X ┃   └──────────┘  ┃   │    │    │         │
   X ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   X ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   X ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   transport controller with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The transport controller has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC XXXX NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G Slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G Slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G Slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC XXXX NSC.  The RFC XXXX
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC XXXX NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC XXXX NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo or a particular set of TE LSPs), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="I-D.ietf-teas-rfc3272bis"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algo <xref target="RFC9350"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-
   Algos.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE or SR-TE LSPs with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the transport controller, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The transport controller needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the transport controller to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   transport controller may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-lsps-without-bandwidth-reservation">
          <name>Scheme 3: TE LSPs without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   transport controller can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>
          <t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  </t>
          <t>
SFC OAM <xref target="RFC9451"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="I-D.ietf-sfc-multi-layer-oam"/>.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
must be undertaken accordingly. For example, a provider may rely
upon L3NM <xref target="RFC9182"/> or L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>.</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g. YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>RFC XXXX Network Slices considerations are discussed in <xref section="6" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slices"/>.</t>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
      <t>Adequate admission control policies should be configured in the edge of the provider network to control access to specific slice resources. Likewise, access to classification and mapping tables must be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices must check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-teas-ietf-network-slices">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Shunsuke Homma" initials="S." surname="Homma">
              <organization>NTT</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="14" month="September" year="2023"/>
            <abstract>
              <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" to describe this type of network slice, and establishes the
   general principles of network slicing in the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-25"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-01"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the IETF Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Liuyan Han" initials="L." surname="Han">
              <organization>China Mobile</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-06"/>
        </reference>
        <reference anchor="I-D.boro-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a module that updates other service and
   network modules with the required information to bind specific
   services to ACs that are created using the AC service model.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boro-opsawg-teas-attachment-circuit-07"/>
        </reference>
        <reference anchor="I-D.henry-tsvwg-diffserv-to-qci">
          <front>
            <title>Diffserv to QCI Mapping</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco</organization>
            </author>
            <author fullname="Tim Szigeti" initials="T." surname="Szigeti">
              <organization>Cisco</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="April" year="2020"/>
            <abstract>
              <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-henry-tsvwg-diffserv-to-qci-04"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc3272bis">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <date day="12" month="August" year="2023"/>
            <abstract>
              <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-27"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9451">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) Packet and Behavior in the Network Service Header (NSH)</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document clarifies an ambiguity in the Network Service Header (NSH) specification related to the handling of O bit. In particular, this document clarifies the meaning of "OAM packet".</t>
              <t>This document updates RFC 8300.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9451"/>
          <seriesInfo name="DOI" value="10.17487/RFC9451"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="I-D.ietf-sfc-multi-layer-oam">
          <front>
            <title>Active OAM for Service Function Chaining (SFC)</title>
            <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Wei Meng" initials="W." surname="Meng">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Ting Ao" initials="T." surname="Ao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Bhumip Khasnabish" initials="B." surname="Khasnabish">
              <organization>Individual contributor</organization>
            </author>
            <author fullname="Kent Leung" initials="K." surname="Leung">
              <organization>Individual contributor</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   A set of requirements for active Operation, Administration, and
   Maintenance (OAM) of Service Function Chains (SFCs) in a network is
   presented in this document.  Based on these requirements, an
   encapsulation of active OAM messages in SFC and a mechanism to detect
   and localize defects are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-multi-layer-oam-28"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2330?>

<section anchor="open-issues-resolution">
      <name>Open Issues &amp; Resolution</name>
      <t>The following issues should be resolved prior to the WGLC:</t>
      <ol spacing="normal" type="1"><li>
          <t>Assess which/whether some of the material in the "5G Slice to RFC XXXX Network Slice Mapping" Section should be maintained in this draft or moved to <xref target="I-D.ietf-teas-5g-network-slice-application"/> (Adrian)
          </t>
          <ul spacing="normal">
            <li>
              <t>This issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/40.</t>
            </li>
            <li>
              <t>Update: The outcome of the discussion with the authors of the application I-D can be seen at: https://mailarchive.ietf.org/arch/msg/teas/4QifnnGAcnQcCTXRLSJtQ1SArLA/.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Assess whether we need to maintain the "First 5G Slice vs Subsequent Slices" Section:
          </t>
          <ul spacing="normal">
            <li>
              <t>Unless we explain how this ss important for realization, this section should be deleted (Med)</t>
            </li>
            <li>
              <t>The motivation of this section is not clear (from Reza)</t>
            </li>
            <li>
              <t>Need to describe the implications to the realization of RFC XXXX Network Slices (Jie)</t>
            </li>
            <li>
              <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/19</t>
            </li>
            <li>
              <t>Update: The fix can be seen at https://mailarchive.ietf.org/arch/msg/teas/wADS6r8syhPsYl9rgZYjVE4Ii9U/</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Clarify the use of inter-AS option B/C to model the AC between CE and PE (Jie)
          </t>
          <ul spacing="normal">
            <li>
              <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/52</t>
            </li>
            <li>
              <t>Update: The fix can be seen at https://mailarchive.ietf.org/arch/msg/teas/bBSAY7-GBJsECCrkgfrrrvoKGgM/.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Further discuss whether the TN slice in the customer site is covered or is out of the scope of RFC XXXX Network Slice (Jie)
          </t>
          <ul spacing="normal">
            <li>
              <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/53</t>
            </li>
            <li>
              <t>Update: The fix can be seen at https://mailarchive.ietf.org/arch/msg/teas/WtZF8AFnubcVUYBxcn7i8COozC0/.</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>Active issues can be tracked at: https://github.com/boucadair/5g-slice-realization/issues</t>
    </section>
    <section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CSP: Communication Service Provider</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>HW: Hardware</t>
      <t>ID: Identifier</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NR: New Radio</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>PLMN: Public Land Mobile Network</t>
      <t>PSTN: Public Switched Telephony Network</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RF: Radio Frequency</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>TS: Technical Specification</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-intro">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Jie Dong, and Greg Mirsky for their reviews of this document
   and for providing valuable comments.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization>Juniper Networks</organization>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>jdrake@juniper.net</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amit.dhamija@rakuten.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
