<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-06"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="May" day="14"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 173?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 180?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, the document describes how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). The provisioning of a new Network Slice may rely on new or existing ACs. In this document, the customer site is assumed without complex slice-specific performances requirements: the customer site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the target Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Segmentation of the Transport Network</name>
        <artwork align="center"><![CDATA[
      ├───────────────────────TN Slice─────────────┤            
                                                                
                        ○─────RFC 9543 ─────○                   
                        |   Network Slice   |                   
                        |                   |                   
                        |                   |                   
                        ▼                   ▼                   
      ○──CS───□ □───AC──○ □──────PN───────□ ○──AC──○            
  ┌ ─ ─ ─ ─ ─ ─           ┌ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ 
     Customer  |               Provider               Customer |
  |   Site 1              |    Network    |         |  Site 2   
               |        ┌────┐          ┌────┐                 |
  |┌───┐    ┌────┐  AC  |    |          |    | AC ┌─┴─┐         
CS |NF1├────┤ CE ├──────┤ PE |          | PE ├────┤NF3|        |
□ |└─┬─┘    └────┘      |    |          |    |    └─┬─┘         
|    |         |        └────┘          └────┘                 |
| |  |                    |               |         |           
□  ┌─┴─┐       |                                               |
  ||NF2|                  |               |         |           
   └───┘       |                                               |
  └ ─ ─ ─ ─ ─ ─           └ ─ ─ ─ ─ ─ ─ ─ ┘         └ ─ ─ ─ ─ ─ 
                                                                
              □──────□  TN segments:                            
                          CS = Customer Segment                 
                          AC = Attachment Circuit               
                          PN = Provider Network
]]></artwork>
      </figure>
      <t>The 5G control plane relies upon the Single Network Slice Selection Assistance Information (S-NSSAI) identifier for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G Network Functions can expose the 5G slices to the transport
domain by mapping to explicit Layer 2 or Layer 3 identifiers. The realization of the mapping between customer sites and provider networks is refered to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of such hand-off methods.</t>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The realization model described in this document uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a NF instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─       
 ┌─────      5G RAN or CORE Network      ├────┐ 
 │    └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─     │ 
 │                                            │ 
 │                                            │ 
 ▼                                            ▼ 
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─   ┌──┐
│NF├──         Transport Network         ├──┤NF│
└──┘  └ ─ ┬ ─ ─ ─ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─ ┬   └──┘
          │                 │           │       
          │                 │           │       
          ▼                 ▼           ▼       
  ┌ ─ Data Center ─   ┌ MPLS VPN─   ┌ Public─   
                   │    Backbone │    Cloud  │  
  │   ┌───┐┌───┐     ┌┴─┐      ┌──┐┌┴─┐         
      └───┘└───┘   │ └──┘      └─┬┘└──┘      │  
  │┌──┐┌──┐┌──┐┌──┐  ┌┴─┐      ┌──┐ │           
   └──┘└──┘└──┘└──┘│ └──┘      └─┬┘          │  
  └ ─ ─ ─ ─ ─ ─ ─ ─   └ ─ ─ ─ ─ ─   └ ─ ─ ─ ─   
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
   world. This difference can be seen from the descriptions below that set out
   the objectives of 5G Network Slicing and Transport Network
   Slicing. These descriptions are not intended to be exhaustive.</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created (called, 5G Network Slices), with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN slice" refers to a slice in the Transport Network domain of the 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different components to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), and Traffic
 Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site 1           │                     │       │      Site 2     
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐.....│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt/>
          <dd>
            <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
          </dd>
          <dt>Customer site:</dt>
          <dd>
            <t>A customer manages and deploys 5G NFs (RAN and CN) in customer sites. On top of 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site. A customer site can be either a physical or a virtual location. Examples of customer sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within the provider network or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          </dd>
          <dt/>
          <dd>
            <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of the scope of this document to document how these controllers are implemented.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting customer sites.</t>
          </dd>
          <dt/>
          <dd>
            <t>The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A function that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the definition of a CE with the introduction of "Distributed CE" in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs.</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the PE definition with the introduction of "Distributed PE" in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific.</t>
          </dd>
          <dt/>
          <dd>
            <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts examples of distributed CEs and PEs. Deployment cases where the AC is also managed by the provider are not discussed here because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. For example, the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs subinterface on a Layer 3 interface), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). An example of such an AC is depicted in <xref target="_figure-51"/>.</t>
          <t>This deployment is a source of confusion since service configurations are typically enforced on PEs. Notwithstanding, the reference design based on the orchestration scopes prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                                       
│                                     │               │
               │  ◀─────MP-BGP─────▶                   
│           ┌────┐                  ┌─┴──┐            │
            │    │   MPLS-based AC  │    │             
│           │ CE ├──────────────────│ PE │            │
         ┏━━┻━━━━┻━━┓               │    │             
│        ┃ VRF foo  ┃               └─┬──┘            │
 ─ ─ ─ ─ ┻━━━━━━━━━━┛                  ─ ─ ─ ─ ─ ─ ─ ─ 
]]></artwork>
          </figure>
          <t>Service-aware CEs are used, for example, in the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         |  5G NSO   |                          
                         └───────────┘                          
                            |   |                               
                            |   |                               
                            ▼   |                               
              ┌───────────────┐ |                               
              | 3GPP domains  | |                               
  ┌───────────| Orchestration |────────────────────────────┐    
  |           | (RAN and CN)  | |                          |    
  |           └───────────────┘ |                          |    
  |                             |                          |    
  |    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━|━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   |    
  |     TN Orchestration        |                          |    
  |    ┃        ┌───────────────┼──────────────┐       ┃   |    
  |             ▼               ▼              ▼           |    
  |    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   |    
  |     | Customer Site ||RFC9543 NSC|| Customer Site |    |    
  |    ┃| Orchestration ||           || Orchestration |┃   |    
  |     └──┬────────────┘└─────┬─────┘└──────────────┬┘    |    
  |    ┗ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        ▼                   ▼                     ▼     |    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─|─ ─ 
  |                          Provider                      |   |
| ▼           |       ┌─┴──┐  Network  ┌──┴─┐      ┌┴───┐  |    
 ┌──┐     ┌────┐  AC  |    |           |    |  AC  | NF |◀─┘   |
||NF◍ ─ ─ ┤ CE ├ ─ ─ ─■ PE |           | PE ■ ─ ─ ─◍(CE)|       
 └──┘     └────┘      |    |           |    |      └────┘      |
|             |       └─┬──┘           └──┬─┘       |           
   Customer                                           Customer |
|    Site     |         |                 |         |   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC 9543                          
                      ■─────Network Slice───■                   
                                                                
    ◍───────────────────TN Slice───────────────────◍                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types that are as follows:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC 9543 NSC.</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC 9543 NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
          </dl>
          <t>This document focuses on deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>.</t>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the AC is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC 9543 NSC).  More precisely, a PE and a CE connected via an AC need to be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ┐                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                          RFC9543 NSC    |
  | Customer Site |                   |                   
    Orchestration      IETF APIs/DM    (Provider Network |
  |               |◀────────────────▶|  Orchestration)   
   ─ ─ ─ ─ ─ ─ ─ ─                     ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
                |                        |                
                |                        |                
┌ ─ ─ ─ ─ ─ ─ ─ ┼ ┐                    ┌ ┼ ─ ─ ─ ─ ─ ─ ─ ┐
                ▼                        ▼                
| ┌──┐      ┌──┐.1|    192.0.2.0/31    |.0┌──┐           |
  |NF├──────┤CE├──────────────────────────┤PE|            
| └──┘      └──┘  |      VLAN 100      |  └──┘           |
     Customer                                Provider     
|      Site       |                    |     Network     |
 ─ ─ ─ ─ ─ ─ ─ ─ ─                      ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                          
               └─────────── AC ──────────┘                                     
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-add-seg-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN orchestration domains. It is not realistic to describe every design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                                                                 
|                        5G Slice eMBB                          |
                                                                 
|            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            |
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐  
| |CU-UP├─────── RFC 9543 Network Slice UP_eMBB  ───────┤ UPF | |
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
|            |                                     |            |
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐  
| |CU-CP├───────    RFC 9543 Network Slice CP    ───────┤ AMF | |
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
└ ─ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ┘
                                                                 
             |                                     |             
                       Transport Network                         
             |                                     |             
                                                                 
             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘             
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐                                  
                     Edge Cloud                                    
                  |             |                                  
                    ┌─────────┐                                    
                  | |UPF_URLLC| |                                  
                    └─────┬───┘                                    
                  └ ─ ─ ─ | ─ ─ ┘                                  
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ | ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  | ┌ ─ ─ ─ ─ ─ ─ ─ 
|   Cell Site   | |                            |                  |
                    |                            | |   Regional    
| ┌───────────┐ | |                            |         Cloud    |
  |CU-UP_URLLC├─────┤                            | | ┌──────────┐  
| └───────────┘ | |       RFC 9543 Network     ├─────┤  5GC CP  | |
                    |        Slice ALL           | | └──────────┘  
| ┌───────────┐ | |                            |                  |
  |CU-UP_eMBB ├─────┤                            | | ┌──────────┐  
| └───────────┘ | |                            ├─────┤ UPF_eMBB | |
 ─ ─ ─ ─ ─ ─ ─ ─    |                            | | └──────────┘  
                  |  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  |
                                                 | └ ─ ─ ─ ─ ─ ─ ─ 
                  |      Transport Network                         
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                 
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
      </section>
      <section anchor="sec-sca-impli">
        <name>Scalability Implications</name>
        <t>The actual mapping (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
        <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deploloyment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (INS-UP2). In this example, the control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="528" viewBox="0 0 528 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 268,328 L 276,344" fill="none" stroke="black"/>
                <path d="M 276,344 L 284,360" fill="none" stroke="black"/>
                <path d="M 292,360 L 300,344" fill="none" stroke="black"/>
                <path d="M 300,344 L 308,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="8" y="36">┌</text>
                  <text x="24" y="36">─</text>
                  <text x="40" y="36">─</text>
                  <text x="56" y="36">─</text>
                  <text x="72" y="36">─</text>
                  <text x="88" y="36">─</text>
                  <text x="104" y="36">─</text>
                  <text x="120" y="36">─</text>
                  <text x="136" y="36">─</text>
                  <text x="152" y="36">─</text>
                  <text x="168" y="36">─</text>
                  <text x="184" y="36">─</text>
                  <text x="200" y="36">─</text>
                  <text x="216" y="36">─</text>
                  <text x="232" y="36">─</text>
                  <text x="248" y="36">─</text>
                  <text x="264" y="36">─</text>
                  <text x="280" y="36">─</text>
                  <text x="296" y="36">─</text>
                  <text x="312" y="36">─</text>
                  <text x="328" y="36">─</text>
                  <text x="344" y="36">─</text>
                  <text x="360" y="36">─</text>
                  <text x="376" y="36">─</text>
                  <text x="392" y="36">─</text>
                  <text x="408" y="36">─</text>
                  <text x="424" y="36">─</text>
                  <text x="440" y="36">─</text>
                  <text x="456" y="36">─</text>
                  <text x="472" y="36">─</text>
                  <text x="488" y="36">─</text>
                  <text x="504" y="36">─</text>
                  <text x="520" y="36">┐</text>
                  <text x="160" y="52">┌</text>
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="400" y="52">─</text>
                  <text x="8" y="68">│</text>
                  <text x="32" y="68">1</text>
                  <text x="96" y="68">┌─────┐</text>
                  <text x="284" y="68">┌──────────────────────────┐</text>
                  <text x="408" y="68">│</text>
                  <text x="472" y="68">┌─────┐</text>
                  <text x="520" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="124" y="84">│NF-CP├──────┤</text>
                  <text x="212" y="84">CP</text>
                  <text x="236" y="84">TN</text>
                  <text x="272" y="84">Slice</text>
                  <text x="332" y="84">(TNS-CP)</text>
                  <text x="444" y="84">├──────┤NF-CP│</text>
                  <text x="8" y="100">│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="96" y="100">└─────┘</text>
                  <text x="284" y="100">└──────────────────────────┘</text>
                  <text x="408" y="100">│</text>
                  <text x="472" y="100">└─────┘</text>
                  <text x="520" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="160" y="116">│</text>
                  <text x="8" y="132">│</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="96" y="132">┌─────┐</text>
                  <text x="284" y="132">┌──────────────────────────┐</text>
                  <text x="408" y="132">│</text>
                  <text x="472" y="132">┌─────┐</text>
                  <text x="520" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="124" y="148">│NF-UP├──────┤</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(TNS-UP1)</text>
                  <text x="444" y="148">├──────┤NF-UP│</text>
                  <text x="8" y="164">│</text>
                  <text x="96" y="164">└─────┘</text>
                  <text x="284" y="164">└──────────────────────────┘</text>
                  <text x="408" y="164">│</text>
                  <text x="472" y="164">└─────┘</text>
                  <text x="520" y="164">│</text>
                  <text x="16" y="180">─</text>
                  <text x="32" y="180">─</text>
                  <text x="48" y="180">─</text>
                  <text x="64" y="180">─</text>
                  <text x="80" y="180">─</text>
                  <text x="96" y="180">─</text>
                  <text x="112" y="180">─</text>
                  <text x="128" y="180">─</text>
                  <text x="144" y="180">─</text>
                  <text x="160" y="180">┼</text>
                  <text x="176" y="180">─</text>
                  <text x="192" y="180">─</text>
                  <text x="208" y="180">─</text>
                  <text x="224" y="180">─</text>
                  <text x="240" y="180">─</text>
                  <text x="256" y="180">─</text>
                  <text x="272" y="180">─</text>
                  <text x="288" y="180">─</text>
                  <text x="304" y="180">─</text>
                  <text x="320" y="180">─</text>
                  <text x="336" y="180">─</text>
                  <text x="352" y="180">─</text>
                  <text x="368" y="180">─</text>
                  <text x="384" y="180">─</text>
                  <text x="400" y="180">─</text>
                  <text x="416" y="180">─</text>
                  <text x="432" y="180">─</text>
                  <text x="448" y="180">─</text>
                  <text x="464" y="180">─</text>
                  <text x="480" y="180">─</text>
                  <text x="496" y="180">─</text>
                  <text x="512" y="180">─</text>
                  <text x="408" y="196">│</text>
                  <text x="160" y="212">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="408" y="228">│</text>
                  <text x="160" y="244">└</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="280" y="308">│</text>
                  <text x="296" y="308">│</text>
                  <text x="276" y="324">─┘</text>
                  <text x="300" y="324">└─</text>
                  <text x="288" y="372">V</text>
                  <text x="8" y="388">┌</text>
                  <text x="24" y="388">─</text>
                  <text x="40" y="388">─</text>
                  <text x="56" y="388">─</text>
                  <text x="72" y="388">─</text>
                  <text x="88" y="388">─</text>
                  <text x="104" y="388">─</text>
                  <text x="120" y="388">─</text>
                  <text x="136" y="388">─</text>
                  <text x="152" y="388">─</text>
                  <text x="168" y="388">─</text>
                  <text x="184" y="388">─</text>
                  <text x="200" y="388">─</text>
                  <text x="216" y="388">─</text>
                  <text x="232" y="388">─</text>
                  <text x="248" y="388">─</text>
                  <text x="264" y="388">─</text>
                  <text x="280" y="388">─</text>
                  <text x="296" y="388">─</text>
                  <text x="312" y="388">─</text>
                  <text x="328" y="388">─</text>
                  <text x="344" y="388">─</text>
                  <text x="360" y="388">─</text>
                  <text x="376" y="388">─</text>
                  <text x="392" y="388">─</text>
                  <text x="408" y="388">─</text>
                  <text x="424" y="388">─</text>
                  <text x="440" y="388">─</text>
                  <text x="456" y="388">─</text>
                  <text x="472" y="388">─</text>
                  <text x="488" y="388">─</text>
                  <text x="504" y="388">─</text>
                  <text x="520" y="388">┐</text>
                  <text x="160" y="404">┌</text>
                  <text x="176" y="404">─</text>
                  <text x="192" y="404">─</text>
                  <text x="208" y="404">─</text>
                  <text x="224" y="404">─</text>
                  <text x="240" y="404">─</text>
                  <text x="256" y="404">─</text>
                  <text x="272" y="404">─</text>
                  <text x="288" y="404">─</text>
                  <text x="304" y="404">─</text>
                  <text x="320" y="404">─</text>
                  <text x="336" y="404">─</text>
                  <text x="352" y="404">─</text>
                  <text x="368" y="404">─</text>
                  <text x="384" y="404">─</text>
                  <text x="400" y="404">─</text>
                  <text x="8" y="420">│</text>
                  <text x="32" y="420">1</text>
                  <text x="96" y="420">┌─────┐</text>
                  <text x="284" y="420">┌──────────────────────────┐</text>
                  <text x="408" y="420">│</text>
                  <text x="472" y="420">┌─────┐</text>
                  <text x="520" y="420">│</text>
                  <text x="32" y="436">s</text>
                  <text x="48" y="436">S</text>
                  <text x="124" y="436">│NF-CP├──────┤</text>
                  <text x="212" y="436">CP</text>
                  <text x="236" y="436">TN</text>
                  <text x="272" y="436">Slice</text>
                  <text x="332" y="436">(TNS-CP)</text>
                  <text x="444" y="436">├──────┤NF-CP│</text>
                  <text x="8" y="452">│</text>
                  <text x="32" y="452">t</text>
                  <text x="48" y="452">l</text>
                  <text x="96" y="452">└─────┘</text>
                  <text x="284" y="452">└──────────────────────────┘</text>
                  <text x="408" y="452">│</text>
                  <text x="472" y="452">└─────┘</text>
                  <text x="520" y="452">│</text>
                  <text x="48" y="468">i</text>
                  <text x="160" y="468">│</text>
                  <text x="8" y="484">│</text>
                  <text x="32" y="484">5</text>
                  <text x="48" y="484">c</text>
                  <text x="96" y="484">┌─────┐</text>
                  <text x="284" y="484">┌──────────────────────────┐</text>
                  <text x="408" y="484">│</text>
                  <text x="472" y="484">┌─────┐</text>
                  <text x="520" y="484">│</text>
                  <text x="32" y="500">G</text>
                  <text x="48" y="500">e</text>
                  <text x="124" y="500">│NF-UP├──────┤</text>
                  <text x="204" y="500">UP</text>
                  <text x="228" y="500">TN</text>
                  <text x="264" y="500">Slice</text>
                  <text x="328" y="500">(TNS-UP1)</text>
                  <text x="444" y="500">├──────┤NF-UP│</text>
                  <text x="8" y="516">│</text>
                  <text x="96" y="516">└─────┘</text>
                  <text x="284" y="516">└──────────────────────────┘</text>
                  <text x="408" y="516">│</text>
                  <text x="472" y="516">└─────┘</text>
                  <text x="520" y="516">│</text>
                  <text x="16" y="532">─</text>
                  <text x="32" y="532">─</text>
                  <text x="48" y="532">─</text>
                  <text x="64" y="532">─</text>
                  <text x="80" y="532">─</text>
                  <text x="96" y="532">─</text>
                  <text x="112" y="532">─</text>
                  <text x="128" y="532">─</text>
                  <text x="144" y="532">─</text>
                  <text x="160" y="532">┼</text>
                  <text x="176" y="532">─</text>
                  <text x="192" y="532">─</text>
                  <text x="208" y="532">─</text>
                  <text x="224" y="532">─</text>
                  <text x="240" y="532">─</text>
                  <text x="256" y="532">─</text>
                  <text x="272" y="532">─</text>
                  <text x="288" y="532">─</text>
                  <text x="304" y="532">─</text>
                  <text x="320" y="532">─</text>
                  <text x="336" y="532">─</text>
                  <text x="352" y="532">─</text>
                  <text x="368" y="532">─</text>
                  <text x="384" y="532">─</text>
                  <text x="400" y="532">─</text>
                  <text x="416" y="532">─</text>
                  <text x="432" y="532">─</text>
                  <text x="448" y="532">─</text>
                  <text x="464" y="532">─</text>
                  <text x="480" y="532">─</text>
                  <text x="496" y="532">─</text>
                  <text x="512" y="532">─</text>
                  <text x="408" y="548">│</text>
                  <text x="8" y="564">┌</text>
                  <text x="24" y="564">─</text>
                  <text x="40" y="564">─</text>
                  <text x="56" y="564">─</text>
                  <text x="72" y="564">─</text>
                  <text x="88" y="564">─</text>
                  <text x="104" y="564">─</text>
                  <text x="120" y="564">─</text>
                  <text x="136" y="564">─</text>
                  <text x="160" y="564">─│─</text>
                  <text x="184" y="564">─</text>
                  <text x="200" y="564">─</text>
                  <text x="216" y="564">─</text>
                  <text x="232" y="564">─</text>
                  <text x="248" y="564">─</text>
                  <text x="264" y="564">─</text>
                  <text x="280" y="564">─</text>
                  <text x="296" y="564">─</text>
                  <text x="312" y="564">─</text>
                  <text x="328" y="564">─</text>
                  <text x="344" y="564">─</text>
                  <text x="360" y="564">─</text>
                  <text x="376" y="564">─</text>
                  <text x="392" y="564">─</text>
                  <text x="408" y="564">─</text>
                  <text x="424" y="564">─</text>
                  <text x="440" y="564">─</text>
                  <text x="456" y="564">─</text>
                  <text x="472" y="564">─</text>
                  <text x="488" y="564">─</text>
                  <text x="504" y="564">─</text>
                  <text x="520" y="564">┐</text>
                  <text x="32" y="580">2</text>
                  <text x="408" y="580">│</text>
                  <text x="8" y="596">│</text>
                  <text x="32" y="596">n</text>
                  <text x="48" y="596">S</text>
                  <text x="100" y="596">┌──────┐</text>
                  <text x="160" y="596">│</text>
                  <text x="284" y="596">┌──────────────────────────┐</text>
                  <text x="468" y="596">┌──────┐</text>
                  <text x="520" y="596">│</text>
                  <text x="32" y="612">d</text>
                  <text x="48" y="612">l</text>
                  <text x="124" y="612">│NF-UP2├─────┤</text>
                  <text x="204" y="612">UP</text>
                  <text x="228" y="612">TN</text>
                  <text x="264" y="612">Slice</text>
                  <text x="328" y="612">(TNS-UP2)</text>
                  <text x="444" y="612">├─────┤NF-UP2│</text>
                  <text x="8" y="628">│</text>
                  <text x="48" y="628">i</text>
                  <text x="100" y="628">└──────┘</text>
                  <text x="160" y="628">│</text>
                  <text x="284" y="628">└──────────────────────────┘</text>
                  <text x="468" y="628">└──────┘</text>
                  <text x="520" y="628">│</text>
                  <text x="32" y="644">5</text>
                  <text x="48" y="644">c</text>
                  <text x="408" y="644">│</text>
                  <text x="8" y="660">│</text>
                  <text x="32" y="660">G</text>
                  <text x="48" y="660">e</text>
                  <text x="160" y="660">│</text>
                  <text x="520" y="660">│</text>
                  <text x="16" y="676">─</text>
                  <text x="32" y="676">─</text>
                  <text x="48" y="676">─</text>
                  <text x="64" y="676">─</text>
                  <text x="80" y="676">─</text>
                  <text x="96" y="676">─</text>
                  <text x="112" y="676">─</text>
                  <text x="128" y="676">─</text>
                  <text x="144" y="676">─</text>
                  <text x="160" y="676">─</text>
                  <text x="176" y="676">─</text>
                  <text x="192" y="676">─</text>
                  <text x="208" y="676">─</text>
                  <text x="224" y="676">─</text>
                  <text x="240" y="676">─</text>
                  <text x="256" y="676">─</text>
                  <text x="272" y="676">─</text>
                  <text x="288" y="676">─</text>
                  <text x="304" y="676">─</text>
                  <text x="320" y="676">─</text>
                  <text x="336" y="676">─</text>
                  <text x="352" y="676">─</text>
                  <text x="368" y="676">─</text>
                  <text x="384" y="676">─</text>
                  <text x="408" y="676">─│─</text>
                  <text x="432" y="676">─</text>
                  <text x="448" y="676">─</text>
                  <text x="464" y="676">─</text>
                  <text x="480" y="676">─</text>
                  <text x="496" y="676">─</text>
                  <text x="512" y="676">─</text>
                  <text x="160" y="692">│</text>
                  <text x="256" y="708">Transport</text>
                  <text x="328" y="708">Network</text>
                  <text x="408" y="708">│</text>
                  <text x="160" y="724">│</text>
                  <text x="168" y="740">─</text>
                  <text x="184" y="740">─</text>
                  <text x="200" y="740">─</text>
                  <text x="216" y="740">─</text>
                  <text x="232" y="740">─</text>
                  <text x="248" y="740">─</text>
                  <text x="264" y="740">─</text>
                  <text x="280" y="740">─</text>
                  <text x="296" y="740">─</text>
                  <text x="312" y="740">─</text>
                  <text x="328" y="740">─</text>
                  <text x="344" y="740">─</text>
                  <text x="360" y="740">─</text>
                  <text x="376" y="740">─</text>
                  <text x="392" y="740">─</text>
                  <text x="408" y="740">┘</text>
                  <text x="76" y="756">Deployment</text>
                  <text x="132" y="756">of</text>
                  <text x="188" y="756">additional</text>
                  <text x="244" y="756">5G</text>
                  <text x="280" y="756">slice</text>
                  <text x="324" y="756">with</text>
                  <text x="372" y="756">shared</text>
                  <text x="432" y="756">Control</text>
                  <text x="488" y="756">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
                   │      Transport Network                      
                                                  │              
                   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
                      Deployment of first 5G slice               
                                  │ │                            
                                  │ │                            
                                  │ │                            
                                 ─┘ └─                           
                                 ╲   ╱                           
                                  ╲ ╱                            
                                   V                             
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
   2                                              │              
│  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
   d l  │NF-UP2├─────┤  UP TN Slice (TNS-UP2)   ├─────┤NF-UP2│   
│    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
   5 c                                            │              
│  G e             │                                            │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ 
                   │                                             
                           Transport Network      │              
                   │                                             
                    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘              
    Deployment of additional 5G slice with shared Control Plane  
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>).</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      ┌──────────┐               base NRP               ┌──────────┐
      |    PE    |                                      |    PE    |
    ┌ ┼ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─|─
      ■<───┐|    |       RFC 9543 Network Slice 1       |    ┌┼───>■ |
    | |    |     |        ┌─────┐        ┌─────┐        |    |     |
      ■<───┤|    |        |  P  |        |  P  |        |    ├┼───>■ |
    ├ ┼ ─ ─├────>□<──────>□<───>□<──────>□────>□<──────>□<───┤─ ─ ─|─
      ■<───┤|    |        |     |        |     |        |    ├┼───>■ |
    | |    |     |        └─────┘        └─────┘        |    |     |
      ■<───┘|    |       RFC 9543 Network Slice 2       |    └┼───>■ |
    └ ┼ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─|─
      |     |    |                                      |     |    |
      └──────────┘                                      └──────────┘
            └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ 
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices         
]]></artwork>
        </figure>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
        <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies. Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Per <xref target="sec-sca-impli"/>, providers may adjust the mapping model to better handle local scalability constraints.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. These section lists few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).</t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at the SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP-based
   interfaces (the only exception could be the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple for
   NFs, it adds complexity due to the requirement of maintaining
   mapping tables for each SDP and requires a configuration task of new VLANs and
   IP subnet for every slice on every AC.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      |             |           
           |                        |     |             |           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
|      ●───────●■    |          |    ■●───────●     ●───────●      |
| NF   ●───────●■ PE |          | PE ■●───────●L2/L3●───────●   NF |
|      ●───────●■    |          |    ■●───────●     ●───────●      |
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    |                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAI to IP addresses makes IP addresses an identifier for eventual
   policy decisions in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (for example, IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case, there is no logical interface representing
   a slice on the PE, hence all slices are handled within single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAI, a mapping table similar to
   the VLAN Hand-off solution should be utilized (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary. Alternatively,
   instead of using 2 full octets from the 8 octets in an IPv6 address, a provider
   could build a mapping table that uses only one octet or parts of an octet to
   represent utilized S-NSSAI. This mapping is a local allocation method to
   allocate IPv6 addresses to NFs in order to be representative of the S-NSSAI without
   redefining IPv6 semantic. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>.</t>
        <t>Different IPv6 address allocation
   schemes following this approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
        <ul empty="true">
          <li>
            <t>Note that this addressing scheme is local to an ingress or egress NF; intermediary
   TN nodes are not required to associate any additional semantic with IPv6 address.</t>
          </li>
        </ul>
        <t>One benefit of embedding the S-NSSAI in the IPv6 address is that a specific S-NSSAI
   can be identified as needed at any place in the TN domain. This might be used,
   for example, to selectively enable per S-NSSAI monitoring, TE, or any
   other per S-NSSAI handling, if required.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <figure anchor="_figure-11">
          <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
          <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
        </figure>
        <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification.</t>
        <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. NF-A has a set of tunnel termination points, with unique per-slice IP addresses
   allocated from the 2001:db8:a:0::/96 prefix, while NF-B uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: customer A eMBB (SST=01, SD=00001) and customer B Massive Internet of Things (MIoT) (SST=03, SD=00003).
   Therefore, for customer A eMBB the tunnel IP addresses are auto-derived (without the need
   for an explicit mapping table) as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets, and for customer B MIoT (SST=3,
   SD=00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
        <figure anchor="_figure-s-nssai-deployment">
          <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
          <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘ MIoT (SST=3)            │     
     │                                                        │     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with MPLS
   encapsulation, or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don’t support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community - <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the AC there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to a NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ││              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the RFC 9543 NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
9 ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
5 ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
4 ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
3 ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
9 ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
5 ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
4 ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
3 ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A transport plane refers to a specific forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs.
   A network operator can define multiple transport planes. A transport plane may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>Detailed realization of transport planes is out of the scope of this document.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes, each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Transport Planes Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there might be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   9 ┃│  └──────────┘ │┃   │
   5 ┃   ┌──────────┐  ┃   │                     │
   4 ┃│  │ 5G QoS B ├──────┤
   3 ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   9 ┃   └──────────┘  ┃   │    │    │         │
   5 ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   4 ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   3 ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC 9543 NSC.  The RFC 9543
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC 9543 NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC 9543 NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the path from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the path from PE1A to PE2A and 6.4
   Gbps of bandwidth on the path from PE1A to PE2B.  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to a transport plane that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to a transport plane that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices’ specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="19" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-11"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="19" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the 'ietf-network' and the Service Attachment
   Point (SAP) models with the detailed information for the provisioning
   of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-09"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-13"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-00"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-01"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2389?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, Access and Mobility Function (AMF), etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1 and N2).  This architecture has built-in control
   and user plane separation, and the control plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
Radio Frequency (RF) data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to Public Switched Telephony Network (PSTN) and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the user plane Traffic in GTP Tunnels (aka GTP-U or
Mobile user plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G control plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, and Xuesong Geng for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
