<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-5g-ns-ip-mpls-07" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Implementing 5G Transport Slices">A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-07"/>
    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>
    <date year="2024" month="May" day="16"/>
    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword>
    <keyword>L2VPN</keyword>
    <keyword>Slice Service</keyword>
    <abstract>
      <?line 173?>

<t>Slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in mobile networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
      <t>This document describes a Network Slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling 5G slicing connectivity service objectives. The realization model reuses many building blocks currently commonly used in service provider networks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/5g-slice-realization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 180?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document focuses on network slicing for 5G networks, covering the connectivity between Network Functions (NFs) across multiple domains such as edge clouds, data centers, and the Wide Area Network (WAN). The document describes a Network Slice realization approach that fulfills 5G slicing requirements by using existing IP/MPLS technologies to optimally control connectivity Service Level Agreements (SLAs) offered for 5G slices. To that aim, this document describes the scope of the Transport Network in 5G architectures (<xref target="sec-scope"/>), disambiguates 5G Network Slicing versus Transport Network Slicing (<xref target="sec-5gtn"/>), draws the perimeter of the various orchestration domains to realize slices (<xref target="sec-orch"/>), and identifies the required coordination between these orchestration domains for adequate setup of Attachment Circuits (ACs) (<xref target="sec-tn-nsi"/>).</t>
      <t>This work is compatible with the framework defined in <xref target="RFC9543"/> which describes network slicing in the context of networks built from IETF technologies. Specifically, the document describes how RFC 9543 Network Slices are realized within provider networks and how such slices are stitched to Transport Network resources in a customer site in the context of Transport Network Slices (<xref target="fig-end-to-end"/>).
Concretely, the realization of an RFC 9543 Network Slice (i.e., connectivity with performance commitments) involves the provider network and partially the AC (the PE-side of the AC). The provisioning of a new Network Slice may rely on new or existing ACs. In this document, the customer site is assumed without complex slice-specific performances requirements: the customer site infrastructure is usually over-provisioned and involves short distances (low latency) where basic QoS/scheduling logic is sufficient to comply with the target Service Level Objectives (SLOs).</t>
      <figure anchor="fig-end-to-end">
        <name>Segmentation of the Transport Network</name>
        <artwork align="center"><![CDATA[
      ├───────────────────────TN Slice─────────────┤            
                                                                
                        ○─────RFC 9543 ─────○                   
                        |   Network Slice   |                   
                        |                   |                   
                        |                   |                   
                        ▼                   ▼                   
      ○──CS───□ □───AC──○ □──────PN───────□ ○──AC──○            
  ┌ ─ ─ ─ ─ ─ ─           ┌ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ 
     Customer  |               Provider               Customer |
  |   Site 1              |    Network    |         |  Site 2   
               |        ┌────┐          ┌────┐                 |
  |┌───┐    ┌────┐  AC  |    |          |    | AC ┌─┴─┐         
CS |NF1├────┤ CE ├──────┤ PE |          | PE ├────┤NF3|        |
□ |└─┬─┘    └────┘      |    |          |    |    └─┬─┘         
|    |         |        └────┘          └────┘                 |
| |  |                    |               |         |           
□  ┌─┴─┐       |                                               |
  ||NF2|                  |               |         |           
   └───┘       |                                               |
  └ ─ ─ ─ ─ ─ ─           └ ─ ─ ─ ─ ─ ─ ─ ┘         └ ─ ─ ─ ─ ─ 
                                                                
              □──────□  TN segments:                            
                          CS = Customer Segment                 
                          AC = Attachment Circuit               
                          PN = Provider Network
]]></artwork>
      </figure>
      <t>The 5G control plane relies upon the Single Network Slice Selection Assistance Information (S-NSSAI) identifier for slice
identification <xref target="TS-23.501"/>. Because S-NSSAIs are not visible to the transport domain, 5G Network Functions can expose the 5G slices to the transport
domain by mapping to explicit Layer 2 or Layer 3 identifiers. The realization of the mapping between customer sites and provider networks is refered to as the "hand-off". <xref target="sec-handoff-domains"/> lists a set of such hand-off methods.</t>
      <t>The realization approach described in this document is typically triggered by Network Slice Service requests. How a Network Slice Service request is placed for realization, including how it is derived from a 5G Slice Service request, is out of scope. Mapping considerations between 3GPP and IETF Network Slice Service (e.g., mapping of service parameters) are discussed, e.g., in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t>The realization model described in this document uses a single Network Resource Partition (NRP) (<xref section="7.1" sectionFormat="of" target="RFC9543"/>). The applicability to multiple NRPs is out of scope.</t>
      <t>Although this document focuses on 5G, the realizations are not fundamentally constrained by the 5G use case. The document is not intended to be a BCP and does not claim to specify mandatory mechanisms to realize network slices. Rather, a key goal of the document is to provide pragmatic implementation approaches by leveraging existing readily-available, widely-deployed techniques. The document is also intended to align the mobile and the IETF perspectives of slicing from a realization perspective.</t>
      <t>A brief 5G overview is provided in <xref target="sec-5g-overview"/> for the reader's convenience. For a definitive description of 3GPP network architectures, the reader should refer to <xref target="TS-23.501"/>. More  details can be found in <xref target="_5G-Book"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document uses the terms defined in <xref target="RFC9543"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>
      <t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>
    </section>
    <section anchor="sec-5g">
      <name>5G Network Slicing Integration in Transport Networks</name>
      <section anchor="sec-scope">
        <name>Scope of the Transport Network</name>
        <t><xref target="sec-5g-overview"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>
        <t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP management system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>
        <ul empty="true">
          <li>
            <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
          </li>
        </ul>
        <t>In practice, the TN may not map to a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a NF instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a WAN (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>.</t>
        <figure anchor="fig-1">
          <name>An Example of Transport Network Decomposition</name>
          <artwork align="center"><![CDATA[
      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─       
 ┌─────      5G RAN or CORE Network      ├────┐ 
 │    └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─     │ 
 │                                            │ 
 │                                            │ 
 ▼                                            ▼ 
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─   ┌──┐
│NF├──         Transport Network         ├──┤NF│
└──┘  └ ─ ┬ ─ ─ ─ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─ ┬   └──┘
          │                 │           │       
          │                 │           │       
          ▼                 ▼           ▼       
  ┌ ─ Data Center ─   ┌ MPLS VPN─   ┌ Public─   
                   │    Backbone │    Cloud  │  
  │   ┌───┐┌───┐     ┌┴─┐      ┌──┐┌┴─┐         
      └───┘└───┘   │ └──┘      └─┬┘└──┘      │  
  │┌──┐┌──┐┌──┐┌──┐  ┌┴─┐      ┌──┐ │           
   └──┘└──┘└──┘└──┘│ └──┘      └─┬┘          │  
  └ ─ ─ ─ ─ ─ ─ ─ ─   └ ─ ─ ─ ─ ─   └ ─ ─ ─ ─   
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-5gtn">
        <name>5G Network Slicing versus Transport Network Slicing</name>
        <t>Network slicing has a different meaning in the 3GPP mobile world and transport
   world. This difference can be seen from the descriptions below that set out
   the objectives of 5G Network Slicing and Transport Network
   Slicing. These descriptions are not intended to be exhaustive.</t>
        <ul spacing="normal">
          <li>
            <t>5G Network Slicing:  </t>
            <t>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created (called, 5G Network Slices), with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
          </li>
          <li>
            <t>TN Slicing:  </t>
            <t>
The term "TN slice" refers to a slice in the Transport Network domain of the 5G
 architecture.  </t>
            <t>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for Slice Services. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  </t>
            <t>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  </t>
            <t>
There are different components to implement TN slices based upon
 mechanisms such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), and Traffic
 Engineering (TE). Whether all or a subset of these components are enabled is a deployment choice.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-ref-design">
        <name>Transport Network Reference Design</name>
        <t><xref target="fig-tn-arch"/> depicts the reference design used in this document for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>
        <figure anchor="fig-tn-arch">
          <name>Reference Design with Customer Site and Provider Network</name>
          <artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │         Provider Network                Customer    │
│      Site 1           │                     │       │      Site 2     
           ┌────┐│       ┌────┐         ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │         │    ││  AC   ││ NF │           
 │┌─┴┐.....│ CE ├│─ ─ ─ ─│ PE │         │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │         │    ││       ││    │           
  └┤NF│    └────┘│       └────┘         └────┘         └────┘          │
│  └──┘                 │                     │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork>
        </figure>
        <t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>
        <dl>
          <dt>Customer:</dt>
          <dd>
            <t>An entity that is responsible for managing and orchestrating the end-to-end 5G Mobile Network, notably RANs and CNs.</t>
          </dd>
          <dt/>
          <dd>
            <t>This entity is distinct from the customer of a 5G Network Slice Service.</t>
          </dd>
          <dt>Customer site:</dt>
          <dd>
            <t>A customer manages and deploys 5G NFs (RAN and CN) in customer sites. On top of 5G NFs (e.g., gNodeB (gNB) and 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, and switches) within a customer site. A customer site can be either a physical or a virtual location. Examples of customer sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within the provider network or colocation service.</t>
          </dd>
          <dt/>
          <dd>
            <t>NFs may be hosted on a CE, directly connected to a CE, or be located multiple IP hops from a CE.</t>
          </dd>
          <dt/>
          <dd>
            <t>The orchestration of the TN within a customer site involves a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). It is out of the scope of this document to document how these controllers are implemented.</t>
          </dd>
          <dt>Provider:</dt>
          <dd>
            <t>An entity responsible for interconnecting customer sites.</t>
          </dd>
          <dt/>
          <dd>
            <t>The provider orchestrates and manages a provider network.</t>
          </dd>
          <dt>Provider Network:</dt>
          <dd>
            <t>A provider uses a provider network to interconnect customer sites. This document assumes that the provider network is based on IP or MPLS.</t>
          </dd>
          <dt>Customer Edge (CE):</dt>
          <dd>
            <t>A function that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit (AC). Examples of CEs include TN components (e.g., router, switch, and firewalls) and also 5G NFs (i.e., an element of the 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)).</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the definition of a CE with the introduction of "Distributed CE" in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Provider Edge (PE):</dt>
          <dd>
            <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple ACs.</t>
          </dd>
          <dt/>
          <dd>
            <t>This document generalizes the PE definition with the introduction of "Distributed PE" in <xref target="sec-distributed"/>.</t>
          </dd>
          <dt>Attachment Circuit (AC):</dt>
          <dd>
            <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific.</t>
          </dd>
          <dt/>
          <dd>
            <t>For consistency with the AC data models terminology (e.g., <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>), this document assumes that an AC is configured on a "bearer", which represents the underlying connectivity.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of ACs are Virtual Local Area Networks (VLANs) (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on an IP underlay (bearer).</t>
          </dd>
        </dl>
        <ul empty="true">
          <li>
            <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
          </li>
        </ul>
        <section anchor="sec-distributed">
          <name>Distributed PE and CE</name>
          <t>This document uses the concept of distributed CEs and PEs (e.g., <xref section="3.4.3" sectionFormat="of" target="RFC4664"/>). This approach consolidates a CE/AC/PE definition that is consistent with the orchestration perimeters (<xref target="sec-orch"/>). The CEs and PEs delimit respectively the customer and provider orchestration domains, while an AC interconnects these domains.</t>
          <dl>
            <dt>Distributed CE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed CE is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
            </dd>
            <dt>Distributed PE:</dt>
            <dd>
              <t>The logical connectivity is realized by configuring  multiple devices in the provider network (i.e., provider orchestration domain). The PE function is distributed.</t>
            </dd>
            <dt/>
            <dd>
              <t>An example of a distributed PE is the "Managed CE service". For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
            </dd>
          </dl>
          <t><xref target="fig-50"/> depicts examples of distributed CEs and PEs. Deployment cases where the AC is also managed by the provider are not discussed here because the setup of such an AC does not require any coordination between the customer and provider orchestration domains.</t>
          <figure anchor="fig-50">
            <name>Generic Model vs Distributed CE and PE</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork>
          </figure>
          <t>In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices.</t>
        </section>
        <section anchor="co-managed-ce">
          <name>Co-Managed CE</name>
          <t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters. For example, the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although one may consider that the AC stitching logic happens internally within the CE itself. The provider manages the AC between the CE and the PE.</t>
        </section>
        <section anchor="sec-service-aware-ce">
          <name>Service-aware CE</name>
          <t>While in most cases CEs connect to PEs using IP (e.g., VLANs subinterface on a Layer 3 interface), a CE may also connect to the provider network using other technologies such as MPLS -potentially over IP tunnels- or Segment Routing over IPv6 (SRv6) <xref target="RFC8986"/>. The CE has thus awareness of provider services configuration (e.g., control plane identifiers such as Route Targets (RTs) and Route Distinguishers (RDs)). An example of such an AC is depicted in <xref target="_figure-51"/>.</t>
          <t>The reference design based on the orchestration scopes prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE.</t>
          <figure anchor="_figure-51">
            <name>Example of MPLS-based Attachment Circuit</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                                       
│                                     │               │
               │  ◀─────MP-BGP─────▶                   
│           ┌────┐                  ┌─┴──┐            │
            │    │   MPLS-based AC  │    │             
│           │ CE ├──────────────────│ PE │            │
         ┏━━┻━━━━┻━━┓               │    │             
│        ┃ VRF foo  ┃               └─┬──┘            │
 ─ ─ ─ ─ ┻━━━━━━━━━━┛                  ─ ─ ─ ─ ─ ─ ─ ─ 
]]></artwork>
          </figure>
          <t>Service-aware CEs are used, for example, in the deployment discussed in Sections <xref format="counter" target="sec-10b"/> and <xref format="counter" target="sec-10c"/>.</t>
        </section>
      </section>
      <section anchor="sec-orch">
        <name>Orchestration Overview</name>
        <section anchor="sec-5g-sli-arch">
          <name>5G End-to-End Slice Orchestration Architecture</name>
          <t>This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices.</t>
          <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
          <t>In reference to <xref target="_figure-orch"/>, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to-end. The details of the 5G NSO are out of the scope of this document. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in <xref target="sec-ref-design"/>:</t>
          <dl>
            <dt>Provider Network Orchestration domain:</dt>
            <dd>
              <t>As defined in <xref target="RFC9543"/>, the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs.</t>
            </dd>
            <dt>Customer Site Orchestration domain:</dt>
            <dd>
              <t>The Orchestration of TN elements of the customer sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM).</t>
            </dd>
          </dl>
          <t>A TN slice relies upon resources that can involve both the provider and customer TN domains. More details are provided in <xref target="sec-tn-nsi"/>.</t>
          <t>A TN slice might be considered as a variant of horizontal composition of Network Slices mentioned in Appendix A.6 of <xref target="RFC9543"/>.</t>
          <figure anchor="_figure-orch">
            <name>5G End-to-End Slice Orchestration with TN</name>
            <artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         |  5G NSO   |                          
                         └───────────┘                          
                            |   |                               
                            |   |                               
                            ▼   |                               
              ┌───────────────┐ |                               
              | 3GPP domains  | |                               
  ┌───────────| Orchestration |────────────────────────────┐    
  |           | (RAN and CN)  | |                          |    
  |           └───────────────┘ |                          |    
  |                             |                          |    
  |    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━|━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   |    
  |     TN Orchestration        |                          |    
  |    ┃        ┌───────────────┼──────────────┐       ┃   |    
  |             ▼               ▼              ▼           |    
  |    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   |    
  |     | Customer Site ||RFC9543 NSC|| Customer Site |    |    
  |    ┃| Orchestration ||           || Orchestration |┃   |    
  |     └──┬────────────┘└─────┬─────┘└──────────────┬┘    |    
  |    ┗ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        |                   |                     |     |    
  |        ▼                   ▼                     ▼     |    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─|─ ─ 
  |                          Provider                      |   |
| ▼           |       ┌─┴──┐  Network  ┌──┴─┐      ┌┴───┐  |    
 ┌──┐     ┌────┐  AC  |    |           |    |  AC  | NF |◀─┘   |
||NF◍ ─ ─ ┤ CE ├ ─ ─ ─■ PE |           | PE ■ ─ ─ ─◍(CE)|       
 └──┘     └────┘      |    |           |    |      └────┘      |
|             |       └─┬──┘           └──┬─┘       |           
   Customer                                           Customer |
|    Site     |         |                 |         |   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                              RFC 9543                          
                      ■─────Network Slice───■                   
                                                                
    ◍───────────────────TN Slice───────────────────◍                  
                                                                
]]></artwork>
          </figure>
          <t>The various orchestration depicted in <xref target="_figure-orch"/> encompass the 3GPP's Network Slice Subnet Management Function (NSSMF) mentioned, e.g., in Figure 5 of <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        </section>
        <section anchor="sec-tn-nsi">
          <name>Transport Network Segments and Network Slice Instantiation</name>
          <t>In reference to the architecture depicted in <xref target="sec-5g-sli-arch"/>, the connectivity between NFs can be decomposed into three main segment types that are as follows:</t>
          <dl>
            <dt>Customer Site:</dt>
            <dd>
              <t>Either connects NFs located in the same customer site (e.g., NF1-NF2) or connects a NF to a CE (e.g., NF1-CE). This segment may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to a PE.</t>
            </dd>
            <dt/>
            <dd>
              <t>The realization of this segment is driven by the 5G Network Orchestration (e.g., NFs instantiation) and the Customer Site Orchestration for the TN part.</t>
            </dd>
            <dt>Provider Network:</dt>
            <dd>
              <t>Represents the connectivity between two PEs (e.g., PE1-PE2). The realization of this segment is controlled by an RFC 9543 NSC.</t>
            </dd>
            <dt>Attachment Circuit:</dt>
            <dd>
              <t>Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this segment relies partially upon an RFC 9543 NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
            </dd>
          </dl>
          <t>This document focuses on deployments where the Service Demarcation Points (SDPs) are located per Types 3 and 4 of Figure 1 of <xref target="RFC9543"/>.</t>
          <dl>
            <dt>Resource synchronization for AC provisioning:</dt>
            <dd>
              <t>The realization of the AC is made up of TN resources shared between the Customer Site Orchestration and the Provider Network Orchestration (e.g., RFC 9543 NSC).  More precisely, a PE and a CE connected via an AC need to be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP  Autonomous System (AS) Number). Hence, the realization of this
interconnection is technology-specific and requires coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is thus key to automate the overall service provisioning. Aligned with <xref target="RFC8969"/>, this document assumes that this coordination is based upon standard YANG data models and APIs.</t>
            </dd>
            <dt/>
            <dd>
              <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface, e.g., the Network Slice Service Model (NSSM) <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit-as-a-Service (ACaaS) <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>.</t>
            </dd>
          </dl>
          <figure anchor="_figure-4">
            <name>Coordination of Transport Network Resources for the AC Provisioning</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ┐                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                          RFC9543 NSC    |
  | Customer Site |                   |                   
    Orchestration      IETF APIs/DM    (Provider Network |
  |               |◀────────────────▶|  Orchestration)   
   ─ ─ ─ ─ ─ ─ ─ ─                     ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
                |                        |                
                |                        |                
┌ ─ ─ ─ ─ ─ ─ ─ ┼ ┐                    ┌ ┼ ─ ─ ─ ─ ─ ─ ─ ┐
                ▼                        ▼                
| ┌──┐      ┌──┐.1|    192.0.2.0/31    |.0┌──┐           |
  |NF├──────┤CE├──────────────────────────┤PE|            
| └──┘      └──┘  |      VLAN 100      |  └──┘           |
     Customer                                Provider     
|      Site       |                    |     Network     |
 ─ ─ ─ ─ ─ ─ ─ ─ ─                      ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                          
               └─────────── AC ──────────┘                                     
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-add-seg-domains">
          <name>Additional Segmentation and Domains</name>
          <t>More complex scenarios can happen with extra segmentation of the TN and additional TN orchestration domains. It is not realistic to describe every design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>
        </section>
      </section>
      <section anchor="sec-mapping">
        <name>Mapping 5G Network Slices to Transport Network Slices</name>
        <t>There are multiple options for mapping 5G Network Slices to TN slices:</t>
        <ul spacing="normal">
          <li>
            <t>1 to N:
A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in <xref target="_figure-5"/>, illustrating the separation of the 5G control plane and user plane in TN slices for a single 5G Enhanced Mobile Broadband (eMBB) network slice. It is important to note that this mapping can serve as an interim step to M to N mapping. Further details about this scheme are described in <xref target="sec-firstslice"/>.</t>
          </li>
          <li>
            <t>M to 1:
 Multiple 5G Network Slices may rely upon the same TN slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at the 5G control plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the Ultra Reliable Low Latency Communication (URLLC) slice is
 instantiated at the edge cloud close to the gNB Centralized Unit User Plane (CU-UP) for
 better latency/jitter control, while the 5G control plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
          </li>
          <li>
            <t>M to N:
 The 5G to TN slice mapping combines both
 approaches with a mix of shared and dedicated associations.  </t>
            <t>
In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G Network Slices (e.g., the control plane TN slice is shared by multiple 5G network Slices).  </t>
            <t>
In practice, for operational and scaling reasons, typically M to N would be used, with M &gt;&gt; N.</t>
          </li>
        </ul>
        <figure anchor="_figure-5">
          <name>1 (5G Slice) to N (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                                                                 
|                        5G Slice eMBB                          |
                                                                 
|            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            |
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐  
| |CU-UP├─────── RFC 9543 Network Slice UP_eMBB  ───────┤ UPF | |
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
|            |                                     |            |
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐  
| |CU-CP├───────    RFC 9543 Network Slice CP    ───────┤ AMF | |
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘  
└ ─ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ┘
                                                                 
             |                                     |             
                       Transport Network                         
             |                                     |             
                                                                 
             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘             
]]></artwork>
        </figure>
        <figure anchor="_figure-6">
          <name>N (5G Slice) to 1 (RFC 9543 Network Slice) Mapping</name>
          <artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐                                  
                     Edge Cloud                                    
                  |             |                                  
                    ┌─────────┐                                    
                  | |UPF_URLLC| |                                  
                    └─────┬───┘                                    
                  └ ─ ─ ─ | ─ ─ ┘                                  
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ | ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  | ┌ ─ ─ ─ ─ ─ ─ ─ 
|   Cell Site   | |                            |                  |
                    |                            | |   Regional    
| ┌───────────┐ | |                            |         Cloud    |
  |CU-UP_URLLC├─────┤                            | | ┌──────────┐  
| └───────────┘ | |       RFC 9543 Network     ├─────┤  5GC CP  | |
                    |        Slice ALL           | | └──────────┘  
| ┌───────────┐ | |                            |                  |
  |CU-UP_eMBB ├─────┤                            | | ┌──────────┐  
| └───────────┘ | |                            ├─────┤ UPF_eMBB | |
 ─ ─ ─ ─ ─ ─ ─ ─    |                            | | └──────────┘  
                  |  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  |
                                                 | └ ─ ─ ─ ─ ─ ─ ─ 
                  |      Transport Network                         
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                 
]]></artwork>
        </figure>
        <t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>
      </section>
      <section anchor="sec-sca-impli">
        <name>Scalability Implications</name>
        <t>The actual mapping (see <xref target="sec-mapping"/>) is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate just a few Network Slices and accommodate the need of only a few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed.</t>
        <t>Putting in place adequate automation means to realize Network Slices (including the adjustment of Slice Services to Network Slices mapping) would ease slice migration operations.</t>
      </section>
      <section anchor="sec-firstslice">
        <name>First 5G Slice versus Subsequent Slices</name>
        <t>An operational 5G Network Slice incorporates both 5G control plane and user plane capabilities.
For instance, consider a slice based on split-CU in the RAN, both CU-UP and Centralized Unit Control Plane (CU-CP) need to be deployed along with the associated interfaces E1, F1-c, F1-u, N2, and N3 which are conveyed in the TN. In this regard, the creation of the "first slice" can be subject to a specific logic that does not apply to subsequent slices. Let us consider the example depicted in <xref target="_figure-7"/> to illustrate this deploloyment. In this example, the first 5G slice relies on the deployment of NF-CP and NF-UP functions together with two TN slices for control and user planes (INS-CP and INS-UP1). Next, the deployment of a second slice relies solely on the instantiation of a UPF (NF-UP2) together with a dedicated user plane TN slice (INS-UP2). In this example, the control plane of the first 5G slice is also updated to integrate the second slice: the TN slice (INS-CP) and Network Functions (NF-CP) are shared.</t>
        <t>At the time of writing (2024), Section 6.1.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>
        <figure anchor="_figure-7">
          <name>First and Subsequent Slice Deployment</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="528" viewBox="0 0 528 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 268,328 L 276,344" fill="none" stroke="black"/>
                <path d="M 276,344 L 284,360" fill="none" stroke="black"/>
                <path d="M 292,360 L 300,344" fill="none" stroke="black"/>
                <path d="M 300,344 L 308,328" fill="none" stroke="black"/>
                <g class="text">
                  <text x="8" y="36">┌</text>
                  <text x="24" y="36">─</text>
                  <text x="40" y="36">─</text>
                  <text x="56" y="36">─</text>
                  <text x="72" y="36">─</text>
                  <text x="88" y="36">─</text>
                  <text x="104" y="36">─</text>
                  <text x="120" y="36">─</text>
                  <text x="136" y="36">─</text>
                  <text x="152" y="36">─</text>
                  <text x="168" y="36">─</text>
                  <text x="184" y="36">─</text>
                  <text x="200" y="36">─</text>
                  <text x="216" y="36">─</text>
                  <text x="232" y="36">─</text>
                  <text x="248" y="36">─</text>
                  <text x="264" y="36">─</text>
                  <text x="280" y="36">─</text>
                  <text x="296" y="36">─</text>
                  <text x="312" y="36">─</text>
                  <text x="328" y="36">─</text>
                  <text x="344" y="36">─</text>
                  <text x="360" y="36">─</text>
                  <text x="376" y="36">─</text>
                  <text x="392" y="36">─</text>
                  <text x="408" y="36">─</text>
                  <text x="424" y="36">─</text>
                  <text x="440" y="36">─</text>
                  <text x="456" y="36">─</text>
                  <text x="472" y="36">─</text>
                  <text x="488" y="36">─</text>
                  <text x="504" y="36">─</text>
                  <text x="520" y="36">┐</text>
                  <text x="160" y="52">┌</text>
                  <text x="176" y="52">─</text>
                  <text x="192" y="52">─</text>
                  <text x="208" y="52">─</text>
                  <text x="224" y="52">─</text>
                  <text x="240" y="52">─</text>
                  <text x="256" y="52">─</text>
                  <text x="272" y="52">─</text>
                  <text x="288" y="52">─</text>
                  <text x="304" y="52">─</text>
                  <text x="320" y="52">─</text>
                  <text x="336" y="52">─</text>
                  <text x="352" y="52">─</text>
                  <text x="368" y="52">─</text>
                  <text x="384" y="52">─</text>
                  <text x="400" y="52">─</text>
                  <text x="8" y="68">│</text>
                  <text x="32" y="68">1</text>
                  <text x="96" y="68">┌─────┐</text>
                  <text x="284" y="68">┌──────────────────────────┐</text>
                  <text x="408" y="68">│</text>
                  <text x="472" y="68">┌─────┐</text>
                  <text x="520" y="68">│</text>
                  <text x="32" y="84">s</text>
                  <text x="48" y="84">S</text>
                  <text x="124" y="84">│NF-CP├──────┤</text>
                  <text x="212" y="84">CP</text>
                  <text x="236" y="84">TN</text>
                  <text x="272" y="84">Slice</text>
                  <text x="332" y="84">(TNS-CP)</text>
                  <text x="444" y="84">├──────┤NF-CP│</text>
                  <text x="8" y="100">│</text>
                  <text x="32" y="100">t</text>
                  <text x="48" y="100">l</text>
                  <text x="96" y="100">└─────┘</text>
                  <text x="284" y="100">└──────────────────────────┘</text>
                  <text x="408" y="100">│</text>
                  <text x="472" y="100">└─────┘</text>
                  <text x="520" y="100">│</text>
                  <text x="48" y="116">i</text>
                  <text x="160" y="116">│</text>
                  <text x="8" y="132">│</text>
                  <text x="32" y="132">5</text>
                  <text x="48" y="132">c</text>
                  <text x="96" y="132">┌─────┐</text>
                  <text x="284" y="132">┌──────────────────────────┐</text>
                  <text x="408" y="132">│</text>
                  <text x="472" y="132">┌─────┐</text>
                  <text x="520" y="132">│</text>
                  <text x="32" y="148">G</text>
                  <text x="48" y="148">e</text>
                  <text x="124" y="148">│NF-UP├──────┤</text>
                  <text x="204" y="148">UP</text>
                  <text x="228" y="148">TN</text>
                  <text x="264" y="148">Slice</text>
                  <text x="328" y="148">(TNS-UP1)</text>
                  <text x="444" y="148">├──────┤NF-UP│</text>
                  <text x="8" y="164">│</text>
                  <text x="96" y="164">└─────┘</text>
                  <text x="284" y="164">└──────────────────────────┘</text>
                  <text x="408" y="164">│</text>
                  <text x="472" y="164">└─────┘</text>
                  <text x="520" y="164">│</text>
                  <text x="16" y="180">─</text>
                  <text x="32" y="180">─</text>
                  <text x="48" y="180">─</text>
                  <text x="64" y="180">─</text>
                  <text x="80" y="180">─</text>
                  <text x="96" y="180">─</text>
                  <text x="112" y="180">─</text>
                  <text x="128" y="180">─</text>
                  <text x="144" y="180">─</text>
                  <text x="160" y="180">┼</text>
                  <text x="176" y="180">─</text>
                  <text x="192" y="180">─</text>
                  <text x="208" y="180">─</text>
                  <text x="224" y="180">─</text>
                  <text x="240" y="180">─</text>
                  <text x="256" y="180">─</text>
                  <text x="272" y="180">─</text>
                  <text x="288" y="180">─</text>
                  <text x="304" y="180">─</text>
                  <text x="320" y="180">─</text>
                  <text x="336" y="180">─</text>
                  <text x="352" y="180">─</text>
                  <text x="368" y="180">─</text>
                  <text x="384" y="180">─</text>
                  <text x="400" y="180">─</text>
                  <text x="416" y="180">─</text>
                  <text x="432" y="180">─</text>
                  <text x="448" y="180">─</text>
                  <text x="464" y="180">─</text>
                  <text x="480" y="180">─</text>
                  <text x="496" y="180">─</text>
                  <text x="512" y="180">─</text>
                  <text x="408" y="196">│</text>
                  <text x="160" y="212">│</text>
                  <text x="248" y="212">Transport</text>
                  <text x="320" y="212">Network</text>
                  <text x="408" y="228">│</text>
                  <text x="160" y="244">└</text>
                  <text x="176" y="244">─</text>
                  <text x="192" y="244">─</text>
                  <text x="208" y="244">─</text>
                  <text x="224" y="244">─</text>
                  <text x="240" y="244">─</text>
                  <text x="256" y="244">─</text>
                  <text x="272" y="244">─</text>
                  <text x="288" y="244">─</text>
                  <text x="304" y="244">─</text>
                  <text x="320" y="244">─</text>
                  <text x="336" y="244">─</text>
                  <text x="352" y="244">─</text>
                  <text x="368" y="244">─</text>
                  <text x="384" y="244">─</text>
                  <text x="400" y="244">─</text>
                  <text x="220" y="260">Deployment</text>
                  <text x="276" y="260">of</text>
                  <text x="312" y="260">first</text>
                  <text x="348" y="260">5G</text>
                  <text x="384" y="260">slice</text>
                  <text x="280" y="276">│</text>
                  <text x="296" y="276">│</text>
                  <text x="280" y="292">│</text>
                  <text x="296" y="292">│</text>
                  <text x="280" y="308">│</text>
                  <text x="296" y="308">│</text>
                  <text x="276" y="324">─┘</text>
                  <text x="300" y="324">└─</text>
                  <text x="288" y="372">V</text>
                  <text x="8" y="388">┌</text>
                  <text x="24" y="388">─</text>
                  <text x="40" y="388">─</text>
                  <text x="56" y="388">─</text>
                  <text x="72" y="388">─</text>
                  <text x="88" y="388">─</text>
                  <text x="104" y="388">─</text>
                  <text x="120" y="388">─</text>
                  <text x="136" y="388">─</text>
                  <text x="152" y="388">─</text>
                  <text x="168" y="388">─</text>
                  <text x="184" y="388">─</text>
                  <text x="200" y="388">─</text>
                  <text x="216" y="388">─</text>
                  <text x="232" y="388">─</text>
                  <text x="248" y="388">─</text>
                  <text x="264" y="388">─</text>
                  <text x="280" y="388">─</text>
                  <text x="296" y="388">─</text>
                  <text x="312" y="388">─</text>
                  <text x="328" y="388">─</text>
                  <text x="344" y="388">─</text>
                  <text x="360" y="388">─</text>
                  <text x="376" y="388">─</text>
                  <text x="392" y="388">─</text>
                  <text x="408" y="388">─</text>
                  <text x="424" y="388">─</text>
                  <text x="440" y="388">─</text>
                  <text x="456" y="388">─</text>
                  <text x="472" y="388">─</text>
                  <text x="488" y="388">─</text>
                  <text x="504" y="388">─</text>
                  <text x="520" y="388">┐</text>
                  <text x="160" y="404">┌</text>
                  <text x="176" y="404">─</text>
                  <text x="192" y="404">─</text>
                  <text x="208" y="404">─</text>
                  <text x="224" y="404">─</text>
                  <text x="240" y="404">─</text>
                  <text x="256" y="404">─</text>
                  <text x="272" y="404">─</text>
                  <text x="288" y="404">─</text>
                  <text x="304" y="404">─</text>
                  <text x="320" y="404">─</text>
                  <text x="336" y="404">─</text>
                  <text x="352" y="404">─</text>
                  <text x="368" y="404">─</text>
                  <text x="384" y="404">─</text>
                  <text x="400" y="404">─</text>
                  <text x="8" y="420">│</text>
                  <text x="32" y="420">1</text>
                  <text x="96" y="420">┌─────┐</text>
                  <text x="284" y="420">┌──────────────────────────┐</text>
                  <text x="408" y="420">│</text>
                  <text x="472" y="420">┌─────┐</text>
                  <text x="520" y="420">│</text>
                  <text x="32" y="436">s</text>
                  <text x="48" y="436">S</text>
                  <text x="124" y="436">│NF-CP├──────┤</text>
                  <text x="212" y="436">CP</text>
                  <text x="236" y="436">TN</text>
                  <text x="272" y="436">Slice</text>
                  <text x="332" y="436">(TNS-CP)</text>
                  <text x="444" y="436">├──────┤NF-CP│</text>
                  <text x="8" y="452">│</text>
                  <text x="32" y="452">t</text>
                  <text x="48" y="452">l</text>
                  <text x="96" y="452">└─────┘</text>
                  <text x="284" y="452">└──────────────────────────┘</text>
                  <text x="408" y="452">│</text>
                  <text x="472" y="452">└─────┘</text>
                  <text x="520" y="452">│</text>
                  <text x="48" y="468">i</text>
                  <text x="160" y="468">│</text>
                  <text x="8" y="484">│</text>
                  <text x="32" y="484">5</text>
                  <text x="48" y="484">c</text>
                  <text x="96" y="484">┌─────┐</text>
                  <text x="284" y="484">┌──────────────────────────┐</text>
                  <text x="408" y="484">│</text>
                  <text x="472" y="484">┌─────┐</text>
                  <text x="520" y="484">│</text>
                  <text x="32" y="500">G</text>
                  <text x="48" y="500">e</text>
                  <text x="124" y="500">│NF-UP├──────┤</text>
                  <text x="204" y="500">UP</text>
                  <text x="228" y="500">TN</text>
                  <text x="264" y="500">Slice</text>
                  <text x="328" y="500">(TNS-UP1)</text>
                  <text x="444" y="500">├──────┤NF-UP│</text>
                  <text x="8" y="516">│</text>
                  <text x="96" y="516">└─────┘</text>
                  <text x="284" y="516">└──────────────────────────┘</text>
                  <text x="408" y="516">│</text>
                  <text x="472" y="516">└─────┘</text>
                  <text x="520" y="516">│</text>
                  <text x="16" y="532">─</text>
                  <text x="32" y="532">─</text>
                  <text x="48" y="532">─</text>
                  <text x="64" y="532">─</text>
                  <text x="80" y="532">─</text>
                  <text x="96" y="532">─</text>
                  <text x="112" y="532">─</text>
                  <text x="128" y="532">─</text>
                  <text x="144" y="532">─</text>
                  <text x="160" y="532">┼</text>
                  <text x="176" y="532">─</text>
                  <text x="192" y="532">─</text>
                  <text x="208" y="532">─</text>
                  <text x="224" y="532">─</text>
                  <text x="240" y="532">─</text>
                  <text x="256" y="532">─</text>
                  <text x="272" y="532">─</text>
                  <text x="288" y="532">─</text>
                  <text x="304" y="532">─</text>
                  <text x="320" y="532">─</text>
                  <text x="336" y="532">─</text>
                  <text x="352" y="532">─</text>
                  <text x="368" y="532">─</text>
                  <text x="384" y="532">─</text>
                  <text x="400" y="532">─</text>
                  <text x="416" y="532">─</text>
                  <text x="432" y="532">─</text>
                  <text x="448" y="532">─</text>
                  <text x="464" y="532">─</text>
                  <text x="480" y="532">─</text>
                  <text x="496" y="532">─</text>
                  <text x="512" y="532">─</text>
                  <text x="408" y="548">│</text>
                  <text x="8" y="564">┌</text>
                  <text x="24" y="564">─</text>
                  <text x="40" y="564">─</text>
                  <text x="56" y="564">─</text>
                  <text x="72" y="564">─</text>
                  <text x="88" y="564">─</text>
                  <text x="104" y="564">─</text>
                  <text x="120" y="564">─</text>
                  <text x="136" y="564">─</text>
                  <text x="160" y="564">─│─</text>
                  <text x="184" y="564">─</text>
                  <text x="200" y="564">─</text>
                  <text x="216" y="564">─</text>
                  <text x="232" y="564">─</text>
                  <text x="248" y="564">─</text>
                  <text x="264" y="564">─</text>
                  <text x="280" y="564">─</text>
                  <text x="296" y="564">─</text>
                  <text x="312" y="564">─</text>
                  <text x="328" y="564">─</text>
                  <text x="344" y="564">─</text>
                  <text x="360" y="564">─</text>
                  <text x="376" y="564">─</text>
                  <text x="392" y="564">─</text>
                  <text x="408" y="564">─</text>
                  <text x="424" y="564">─</text>
                  <text x="440" y="564">─</text>
                  <text x="456" y="564">─</text>
                  <text x="472" y="564">─</text>
                  <text x="488" y="564">─</text>
                  <text x="504" y="564">─</text>
                  <text x="520" y="564">┐</text>
                  <text x="32" y="580">2</text>
                  <text x="408" y="580">│</text>
                  <text x="8" y="596">│</text>
                  <text x="32" y="596">n</text>
                  <text x="48" y="596">S</text>
                  <text x="100" y="596">┌──────┐</text>
                  <text x="160" y="596">│</text>
                  <text x="284" y="596">┌──────────────────────────┐</text>
                  <text x="468" y="596">┌──────┐</text>
                  <text x="520" y="596">│</text>
                  <text x="32" y="612">d</text>
                  <text x="48" y="612">l</text>
                  <text x="124" y="612">│NF-UP2├─────┤</text>
                  <text x="204" y="612">UP</text>
                  <text x="228" y="612">TN</text>
                  <text x="264" y="612">Slice</text>
                  <text x="328" y="612">(TNS-UP2)</text>
                  <text x="444" y="612">├─────┤NF-UP2│</text>
                  <text x="8" y="628">│</text>
                  <text x="48" y="628">i</text>
                  <text x="100" y="628">└──────┘</text>
                  <text x="160" y="628">│</text>
                  <text x="284" y="628">└──────────────────────────┘</text>
                  <text x="468" y="628">└──────┘</text>
                  <text x="520" y="628">│</text>
                  <text x="32" y="644">5</text>
                  <text x="48" y="644">c</text>
                  <text x="408" y="644">│</text>
                  <text x="8" y="660">│</text>
                  <text x="32" y="660">G</text>
                  <text x="48" y="660">e</text>
                  <text x="160" y="660">│</text>
                  <text x="520" y="660">│</text>
                  <text x="16" y="676">─</text>
                  <text x="32" y="676">─</text>
                  <text x="48" y="676">─</text>
                  <text x="64" y="676">─</text>
                  <text x="80" y="676">─</text>
                  <text x="96" y="676">─</text>
                  <text x="112" y="676">─</text>
                  <text x="128" y="676">─</text>
                  <text x="144" y="676">─</text>
                  <text x="160" y="676">─</text>
                  <text x="176" y="676">─</text>
                  <text x="192" y="676">─</text>
                  <text x="208" y="676">─</text>
                  <text x="224" y="676">─</text>
                  <text x="240" y="676">─</text>
                  <text x="256" y="676">─</text>
                  <text x="272" y="676">─</text>
                  <text x="288" y="676">─</text>
                  <text x="304" y="676">─</text>
                  <text x="320" y="676">─</text>
                  <text x="336" y="676">─</text>
                  <text x="352" y="676">─</text>
                  <text x="368" y="676">─</text>
                  <text x="384" y="676">─</text>
                  <text x="408" y="676">─│─</text>
                  <text x="432" y="676">─</text>
                  <text x="448" y="676">─</text>
                  <text x="464" y="676">─</text>
                  <text x="480" y="676">─</text>
                  <text x="496" y="676">─</text>
                  <text x="512" y="676">─</text>
                  <text x="160" y="692">│</text>
                  <text x="256" y="708">Transport</text>
                  <text x="328" y="708">Network</text>
                  <text x="408" y="708">│</text>
                  <text x="160" y="724">│</text>
                  <text x="168" y="740">─</text>
                  <text x="184" y="740">─</text>
                  <text x="200" y="740">─</text>
                  <text x="216" y="740">─</text>
                  <text x="232" y="740">─</text>
                  <text x="248" y="740">─</text>
                  <text x="264" y="740">─</text>
                  <text x="280" y="740">─</text>
                  <text x="296" y="740">─</text>
                  <text x="312" y="740">─</text>
                  <text x="328" y="740">─</text>
                  <text x="344" y="740">─</text>
                  <text x="360" y="740">─</text>
                  <text x="376" y="740">─</text>
                  <text x="392" y="740">─</text>
                  <text x="408" y="740">┘</text>
                  <text x="76" y="756">Deployment</text>
                  <text x="132" y="756">of</text>
                  <text x="188" y="756">additional</text>
                  <text x="244" y="756">5G</text>
                  <text x="280" y="756">slice</text>
                  <text x="324" y="756">with</text>
                  <text x="372" y="756">shared</text>
                  <text x="432" y="756">Control</text>
                  <text x="488" y="756">Plane</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
                   │      Transport Network                      
                                                  │              
                   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
                      Deployment of first 5G slice               
                                  │ │                            
                                  │ │                            
                                  │ │                            
                                 ─┘ └─                           
                                 ╲   ╱                           
                                  ╲ ╱                            
                                   V                             
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─               
│  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   s S  │NF-CP├──────┤   CP TN Slice (TNS-CP)   ├──────┤NF-CP│   
│  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
     i             │                                             
│  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
   G e  │NF-UP├──────┤  UP TN Slice (TNS-UP1)   ├──────┤NF-UP│   
│       └─────┘      └──────────────────────────┘ │    └─────┘  │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                  │              
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
   2                                              │              
│  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
   d l  │NF-UP2├─────┤  UP TN Slice (TNS-UP2)   ├─────┤NF-UP2│   
│    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
   5 c                                            │              
│  G e             │                                            │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ 
                   │                                             
                           Transport Network      │              
                   │                                             
                    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘              
    Deployment of additional 5G slice with shared Control Plane  
]]></artwork>
          </artset>
        </figure>
        <t>Overall, policies might be provided by an operator (e.g., to Network Slice Controllers) to indicate whether the same or dedicated CP NFs are allowed when processing a new slice creation request. Providing such a policy is meant to better automate the realization of 5G slices and minimize the realization delay that might be induced by extra cycles to seek for operator validation.</t>
      </section>
      <section anchor="sec-over-rea-model">
        <name>Overview of the Transport Network Realization Model</name>
        <t>The realization model described in this document is depicted in
   <xref target="_figure-high-level-qos"/>. The following building blocks are used:</t>
        <ul spacing="normal">
          <li>
            <t>Layer 2 Virtual Private Network (L2VPN) <xref target="RFC4664"/> and/or Layer 3 Virtual Private Network (L3VPN) <xref target="RFC4364"/> service instances for logical separation:  </t>
            <t>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 delivery for
fronthaul connections. Enhanced Common Public Radio Interface (eCPRI) <xref target="ECPRI"/> supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.  </t>
            <t>
The use of VPNs for realizing Network Slices is briefly described in Appendix A.4 of <xref target="RFC9543"/>.</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE:  </t>
            <t>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  </t>
            <t>
The method used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Traffic above the enforced rate might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  </t>
            <t>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
          </li>
          <li>
            <t>Coarse-grained resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP (called "base NRP" in <xref target="_figure-high-level-qos"/>), spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources:  </t>
            <t>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
methods used here can range from careful network planning, to
ensure a more or less equal traffic distribution (i.e., equal cost load
balancing), to advanced TE techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies. See also <xref section="8" sectionFormat="of" target="RFC9522"/>).</t>
          </li>
        </ul>
        <figure anchor="_figure-high-level-qos">
          <name>Resource Allocation Slicing Model with a Single NRP</name>
          <artwork align="center"><![CDATA[
            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      ┌──────────┐               base NRP               ┌──────────┐
      |    PE    |                                      |    PE    |
    ┌ ┼ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─|─
      ■<───┐|    |       RFC 9543 Network Slice 1       |    ┌┼───>■ |
    | |    |     |        ┌─────┐        ┌─────┐        |    |     |
      ■<───┤|    |        |  P  |        |  P  |        |    ├┼───>■ |
    ├ ┼ ─ ─├────>□<──────>□<───>□<──────>□────>□<──────>□<───┤─ ─ ─|─
      ■<───┤|    |        |     |        |     |        |    ├┼───>■ |
    | |    |     |        └─────┘        └─────┘        |    |     |
      ■<───┘|    |       RFC 9543 Network Slice 2       |    └┼───>■ |
    └ ┼ ─ ─ ─ ─ ─|─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─|─
      |     |    |                                      |     |    |
      └──────────┘                                      └──────────┘
            └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ 
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse-grained QoS, with resources shared by all TN slices         
]]></artwork>
        </figure>
        <t>This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. For example, the reader may refer to <xref target="RFC4176"/> and <xref target="RFC6136"/> for such details.</t>
        <t>The realization model described in the document inherits the scalability properties of the underlying L2VPN and L3VPN technologies. Readers may refer, for example, to <xref section="13" sectionFormat="of" target="RFC4365"/> or <xref section="1.2.5" sectionFormat="of" target="RFC6624"/> for a scalability assessment of some of these technologies. Per <xref target="sec-sca-impli"/>, providers may adjust the mapping model to better handle local scalability constraints.</t>
      </section>
    </section>
    <section anchor="sec-handoff-domains">
      <name>Hand-off Between Domains</name>
      <t>The 5G control plane relies upon 32-bit S-NSSAIs for slice
   identification. The S-NSSAI is not visible to the transport domain.
   So instead, 5G network functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP) values. These section lists few hand-off methods for slice mapping
   between customer sites and provider networks.</t>
      <t>More details about the mapping between 3GPP and RFC 9543 Network Slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
      <t><!---
   That document includes additional methods for mapping 5G slices to TN slices (e.g., source UDP port number), but these
   methods are not discussed here because of the shortcomings of these methods (e.g., load balancing, NAT).
   -->
      </t>
      <section anchor="sec-vlan-handoff">
        <name>VLAN Hand-off</name>
        <t>In this option, the RFC 9543 Network Slice, fulfilling connectivity
   requirements between NFs that belong to a 5G slice, is represented at an SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.</t>
        <figure anchor="_figure-vlan-hand-off">
          <name>Example of 5G Slice with VLAN Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           |     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      |             |           
           |                        |     |             |           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
|      ●───────●■    |          |    ■●───────●     ●───────●      |
| NF   ●───────●■ PE |          | PE ■●───────●L2/L3●───────●   NF |
|      ●───────●■    |          |    ■●───────●     ●───────●      |
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    |                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
 ● – Logical interface represented by a VLAN on a physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork>
        </figure>
        <t>Each VLAN
   represents a distinct logical interface on the ACs;
   hence it provides the possibility to place these logical interfaces
   in distinct Layer 2 or Layer 3 service instances and implement separation
   between slices via service instances. Since the 5G interfaces are IP-based
   interfaces (with an exception of the F2 fronthaul-interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification, a deployment may rely on the same VLAN identifier
   for all ACs. However, that may not be always possible. As such, SDPs for a same slice at
   different locations may use different VLAN values.  Therefore, a
   VLAN to RFC 9543 Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.</t>
        <t>While VLAN hand-off is simple for NFs, it adds complexity at the provider network because of the requirement of maintaining
   mapping tables for each SDP and performing a configuration task for new VLANs and
   IP subnet for every slice on every AC.</t>
      </section>
      <section anchor="sec-ip-hof">
        <name>IP Hand-off</name>
        <t>In this option, an explicit mapping between source/destination IP addresses and
   slice's specific S-NSSAI is used. The mapping can have either local (e.g.,
   pertaining to single NF attachment) or global TN significance. The mapping can
   be realized in multiple ways, including (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>S-NSSAI to a dedicated IP address for each NF</t>
          </li>
          <li>
            <t>S-NSSAI to a pool of IP addresses for global TN deployment</t>
          </li>
          <li>
            <t>S-NSSAI to a subset of bits of an IP address</t>
          </li>
          <li>
            <t>S-NSSAI to a DSCP value</t>
          </li>
          <li>
            <t>Use a deterministic algorithm to map S-NSAAI to an IP subnet, prefix, or pools. For example, adaptations to the algorithm defined in <xref target="RFC7422"/> may be considered.</t>
          </li>
        </ul>
        <t>Mapping S-NSSAIs to IP addresses makes IP addresses an identifier for slice-related
   policy enfocement in the Transport Network (e.g., Differentiated Services,
   traffic steering, bandwidth allocation, security policies, or monitoring).</t>
        <t>One example of the IP hand-off realization is the arrangement, where the slices in the TN
   domain are instantiated using IP tunnels (e.g., IPsec or GTP-U tunnels)
   established between NFs, as depicted in <xref target="_figure-ip-hand-off"/>. The transport for
   a single 5G slice might be constructed with multiple such tunnels, since a
   typical 5G slice contains many NFs - especially DUs and CUs. If a shared NF (i.e.,
   an NF that serves multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a single slice.</t>
        <figure anchor="_figure-ip-hand-off">
          <name>Example of 5G Slice with IP Hand-off Providing End-to-End Connectivity</name>
          <artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
        </figure>
        <t>As opposed to the VLAN hand-off case (<xref target="sec-vlan-handoff"/>), there is no logical interface representing
   a slice on the PE, hence all slices are handled within a single service instance.
   The IP and VLAN hand-offs are not mutually exclusive, but instead could be used
   concurrently. Since the TN doesn't recognize S-NSSAIs, a mapping table similar to
   the VLAN Hand-off solution is needed (<xref target="sec-vlan-handoff"/>).</t>
        <t>The mapping table can be simplified if, for example, IPv6 addressing is used to
   address NFs. An IPv6 address is a 128-bit long field, while the S-NSSAI is a
   32-bit field: Slice/Service Type (SST): 8 bits, Slice Differentiator (SD): 24
   bits. 32 bits, out of 128 bits of the IPv6 address, may be used to encode the
   S-NSSAI, which makes an IP to Slice mapping table unnecessary.</t>
        <t>The S-NSSAI/IPv6 mapping is a local IPv6 address allocation method to NFs not disclosed to on-path nodes. IP forwarding is not altered by this method and is
   still achieved following BCP 198 <xref target="RFC7608"/>. Concretely, intermediary TN nodes are not required to associate any additional semantic with IPv6 address.</t>
        <t>However, operators using such mapping methods should be aware of the implications
   of any change of S-NSSAI on the IPv6 addressing plans. For example, modifications of the S-NSSAIs in-use will require
   updating the IP addresses used by NFs involved in the associated slices.</t>
        <section anchor="an-example-of-local-ipv6-addressing-plan-for-network-functions">
          <name>An Example of Local IPv6 Addressing Plan for Network Functions</name>
          <t>Different IPv6 address allocation
   schemes following the above approach may be used, with one example allocation shown
   in <xref target="_figure-11"/>.</t>
          <figure anchor="_figure-11">
            <name>An Example of S-NSSAI Embedded into an IPv6 Address</name>
            <artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    <───────────────────────────> <───────>
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork>
          </figure>
          <t>In reference to <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address
   are unique to the NF, but do not carry any slice-specific information. The S-NSSAI information is embedded in the least
   significant 32 bits. The 96-bit part of the address may be structured by the provider, for example, on the
   geographical location or the DC identification. Refer to <xref section="2.1." sectionFormat="of" target="RFC9099"/> for a discussion on the benefits of structuring an address plan around both services and geographic locations for more structured security policies in a network.</t>
          <t><xref target="_figure-s-nssai-deployment"/> uses the example from <xref target="_figure-11"/> to demonstrate a
   slicing deployment, where the entire S-NSSAI is embedded into IPv6 addresses used by
   NFs. Let us consider that "NF-A" has a set of tunnel termination points with unique per-slice IP addresses
   allocated from 2001:db8:a:0::/96, while "NF-B" uses a set of tunnel termination
   points with per-slice IP addresses allocated from 2001:db8:b:0::/96. This example shows
   two slices: "customer A eMBB" (SST=01, SD=00001) and "customer B Massive Internet of Things (MIoT)" (SST=03, SD=00003).
   For "customer A eMBB" slice, the tunnel IP addresses are auto-derived as the IP addresses {2001:db8:a::100:1, 2001:db8:b::100:1},
   where {:0100:0001} is used as the last two octets. "customer B MIoT" slice (SST=3,
   SD=00003) tunnel uses the IP addresses {2001:db8:a::300:3, 2001:db8:b::300:3} and simply
   adds {:0300:0003} as the last two octets. Leading zeros are not represented in the resulting IPv6 addresses as per <xref target="RFC5952"/>.</t>
          <figure anchor="_figure-s-nssai-deployment">
            <name>Deployment Example with S-NSSAI Embedded into IPv6 Addresses</name>
            <artwork align="center"><![CDATA[
 2001:db8:a::/96 (NF-A)                      2001:db8:b::/96 (NF-B) 
                                                                    
 2001:db8:a::100:1/128                2001:db8:b::100:1/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘ MIoT (SST=3)            │     
     │                                                        │     
 2001:db8:a::300:3/128               2001:db8:b::300:3/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Segment         Circuit      Segment         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-mpls-ho">
        <name>MPLS Label Hand-off</name>
        <t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is encapsulated outside the provider network with MPLS
   encapsulation or MPLS-in-UDP encapsulation <xref target="RFC7510"/>, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>
        <t>There are three major methods (based upon <xref section="10" sectionFormat="of" target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>
        <dl>
          <dt>Option A (<xref target="sec-10a"/>):</dt>
          <dd>
            <t>VRF-to-VRF connections.</t>
          </dd>
          <dt>Option B (<xref target="sec-10b"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
          </dd>
          <dt>Option C (<xref target="sec-10c"/>):</dt>
          <dd>
            <t>redistribution of labeled VPN routes without next-hop
    change and redistribution of labeled transport routes with next-hop
    change at domain boundaries.</t>
          </dd>
        </dl>
        <section anchor="sec-10a">
          <name>Option A</name>
          <t>This option is not based on MPLS label hand-off, but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>
        </section>
        <section anchor="sec-10b">
          <name>Option B</name>
          <t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site which could be, for example, either on the compute that hosts mobile NFs (<xref target="_figure-mpls-10b-hand-off"/>, left hand side) or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   AC connected to a PE, packets are already MPLS
   encapsulated (or MPLS-in-UDP/MPLS-in-IP encapsulated, if cloud or compute
   infrastructure don’t support MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>
          <figure anchor="_figure-mpls-10b-hand-off">
            <name>Example of MPLS Hand-off with Option B</name>
            <artwork align="center"><![CDATA[
     <──────        <──────        <──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    <─────────────><────────────><─────────────>                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─v──────┐    v  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Segment         Circuit      Segment          
                                                                    
  ● – Logical interface represented by VLAN on physical interface   
  ◙ - Service instances (with unique MPLS labels)                    
  ■ - Service Demarcation Point                                     
]]></artwork>
          </figure>
          <t>MPLS labels are allocated dynamically in Option B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and a new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A', and A" for the first depicted slice).  Therefore, for any slice-specific per-hop
   behavior at the provider network edge, the PE needs to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over an AC, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice might be possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, the PE advertises a
   dynamically allocated label A". Since, based on the community, the
   label to slice association is known, the PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to "slice 1"
   and execute appropriate edge per-hop behavior.</t>
          <t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In the extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community (<xref section="4" sectionFormat="of" target="RFC4360"/>) might be used as slice differentiator.  In
   other deployments, all prefixes (representing different slices)
   might be handled by a single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community <xref target="RFC1997"/>) might be used for slice
   differentiation.  There could be also a deployment option that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>
        </section>
        <section anchor="sec-10c">
          <name>Option C</name>
          <t>Option B relies upon exchanging service prefixes between customer sites
and the provider network. This may lead to scaling challenges in large
scale 5G deployments as the PE node needs to carry all service prefixes.
To alleviate this scaling challenge, in Option C, service prefixes are
exchanged between customer sites only. In doing so, the provider network is offloaded from
carrying, propagating, and programing appropriate forwarding entries
for service prefixes.</t>
          <t>Option C relies upon exchanging service prefixes via multi-hop BGP sessions
between customer sites, without changing the NEXT_HOP BGP attribute.
Additionally, IPv4/IPv6 labeled unicast (SAFI=4) host routes, used as NEXT_HOP
for service prefixes, are exchanged via direct single-hop BGP sessions between
adjacent nodes in a customer site and a provider network, as depicted in <xref target="_figure-mpls-10c-hand-off"/>.
As a result, a node in a customer site performs hierarchical next-hop resolution.</t>
          <figure anchor="_figure-mpls-10c-hand-off">
            <name>MPLS Hand-off with Option C</name>
            <artwork align="center"><![CDATA[
     ◁───────────────────────────────────────────
             BGP VPN
               COM=1, L=A, NEXT_HOP=CS2
               COM=2, L=B, NEXT_HOP=CS2
               COM=3, L=C, NEXT_HOP=CS2
     ◁──────────────────────────────────────────▷

      ◁──────        ◁──────        ◁──────
      BGP LU         BGP LU         BGP LU
        CS2, L=X"      CS2, L=X'      CS2, L=X
     ◁─────────────▷◁────────────▷◁─────────────▷
                nhs  nhs      nhs  nhs
                                                         VLANs
  service instances                service instances  representing
 representing slices              representing slices    slices
┌ ─ ─ ┬ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ┬ ─ ─ ─ ─ ─ ┬ ─ ─ ─ ─ ─
      │               Provider                │           │          │
│┌────▼─┤       ├─────┐       ┌─────┤       ├─▼──────┐    ▼  ┌──────┐
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
││ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
 │    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      ││
│└──────┤       ├─────┘       └─────┤       ├────────┘       └──────┘
   CS1                 Network                         CS2           │
└ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘       └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └────────┘└───────────────────┘└────────┘ └───────────────────┘
      Attachment   Provider Network  Attachment      Customer Site
       Circuit         Segment        Circuit           Segment

   ● – logical interface represented by VLAN on physical interface
   ◙ - service instances (with unique MPLS label)
   ■ - Service Demarcation Point
]]></artwork>
          </figure>
          <t>This architecture requires an end-to-end Label Switched Path (LSP) leading from a packet's
ingress node inside one customer site to its egress inside another customer
site, through a provider network. Hence, at the domain (customer site, provider network)
boundaries NEXT_HOP attribute for IPv4/IPv6 labeled unicast needs to be modified to "next-hop self" (nhs),
which results in new IPv4/IPv6 labeled unicast label allocation. Appropriate label swap
forwarding entries for IPv4/IPv6 labeled unicast labels are programmed in the data plane.
On the AC there is no additional 'labeled transport' protocol (i.e., no LDP, RSVP, SR, ...).</t>
          <t>Packets are transmitted over the AC with the IPv4/IPv6 labeled
unicast as the top label, with service label deeper in the label stack. In Option C,
the service label is not used for forwarding lookup on the PE. This significantly
lowers the scaling pressure on PEs, as PEs need to program forwarding entries only for
IPv4/IPv6 labeled unicast host routes, used as NEXT_HOP for service prefixes. Also,
since one IPv4/IPv6 labeled unicast host route represent one customer site, regardless
of the number of slices in the customer site, the number of forwarding entries
on a PE is considerably reduced.</t>
          <t>For any slice-specific per-hop behavior at the provider network edge, as described
in details in <xref target="sec-over-rea-model"/>, the PE need to determine which label in the packet
represents which slice. This can be achieved, for example, by allocating non-overlapping service label
ranges for each slice, and use these ranges for slice identification purposes on PE.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-qos-map">
      <name>QoS Mapping Realization Models</name>
      <section anchor="sec-qos-layers">
        <name>QoS Layers</name>
        <t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>
        <section anchor="g-qos-layer">
          <name>5G QoS Layer</name>
          <t>QoS treatment is indicated in the 5G QoS layer by the 5G QoS
   Indicator (5QI), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network segment
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>
          <t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/>.</t>
          <t>Each slice service might have flows with multiple 5QIs. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDPs
   (i.e., at the edge of the provider network).</t>
          <t>In this document, this layer of QoS is referred to as '5G QoS
   Class' ('5G QoS' in short) or '5G DSCP'.</t>
        </section>
        <section anchor="tn-qos-layer">
          <name>TN QoS Layer</name>
          <t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this Network Slice
   realization.  That is, RFC 9543 Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all RFC 9543 Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the document assumes 8 traffic queues per port support in
   general.</t>
          <t>At this layer, QoS treatment is indicated by a QoS indicator
   specific to the encapsulation used in the provider network. Such an indicator may
   be DSCP or MPLS Traffic Class (TC). This layer of QoS is referred to as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>
        </section>
      </section>
      <section anchor="qos-realization-models">
        <name>QoS Realization Models</name>
        <t>While 5QI might be exposed to the provider network via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per-5QI differentiated treatment from the provider network.
   This might be due to a NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per-slice, but not
   per-5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>
        <t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>
        <t>These models are further elaborated in the following two subsections.</t>
        <section anchor="sec-5QI-unaware">
          <name>5QI-unaware Model</name>
          <t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire RFC 9543 Network
   Slice is mapped to a single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example, only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with the introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding RFC 9543
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse-grained (single NRP, sharing resources among
   all RFC 9543 Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>
          <figure anchor="_figure-QoS-5QI-unaware">
            <name>Slice to TN QoS Mapping (5QI-unaware Model)</name>
            <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │     NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────>     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────>     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │     NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────>     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │     NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
  (dedicated resources per     (resources shared by multiple  
   RFC 9543 Network Slice)       RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>When the IP traffic is handed over at the SDP from the AC to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>
          <t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN Class of Service (CoS).  Based on TN CoS
   marking, per-hop behavior for all RFC 9543 Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>
          <figure anchor="_figure-15">
            <name>QoS with MPLS Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <figure anchor="_figure-16">
            <name>QoS with IPv6 Encapsulation</name>
            <artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ││              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork>
          </figure>
          <t>From a QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>
          <t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each RFC 9543 Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>
          <section anchor="sec-inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>The main aspect of inbound provider network edge resource control is per-slice traffic
   volume enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., Distributed Denial-of-Service (DDoS) attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>
            <t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>
            <ul spacing="normal">
              <li>
                <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
              </li>
              <li>
                <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
              </li>
            </ul>
            <t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to an NSC.  Based
   on these parameters, the provider network's inbound policy can be implemented using one
   of following options:</t>
            <ul spacing="normal">
              <li>
                <t>1r2c (single-rate two-color) rate limiter  </t>
                <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at the SDP a
traffic stream of given slice and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
              </li>
              <li>
                <t>2r3c (two-rate three-color) rate limiter  </t>
                <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  </t>
                <ul spacing="normal">
                  <li>
                    <t>Green, for traffic under CIR</t>
                  </li>
                  <li>
                    <t>Yellow, for traffic between CIR and PIR</t>
                  </li>
                  <li>
                    <t>Red, for traffic above PIR</t>
                  </li>
                </ul>
                <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
              </li>
            </ul>
            <t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>
            <figure anchor="_figure-17">
              <name>Ingress Slice Admission Control (5QI-unware Model)</name>
              <artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              v    │    i │      │
──────────────◇────┼──> c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──> c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──> c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control">
            <name>Outbound Edge Resource Control</name>
            <t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>
            <ul spacing="normal">
              <li>
                <t>Slices use both CIR and PIR parameters, and provider network edge links
(ACs) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (AC) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
              </li>
              <li>
                <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
              </li>
            </ul>
            <t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>
            <t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, should not exceed the physical
   capacity of the AC.  Slice requests above this limit
   should be rejected by the RFC 9543 NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>
            <figure anchor="_figure-18">
              <name>Ingress Slice Admission control (5QI-unaware Model)</name>
              <artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────>                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────>                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────>                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="qi-aware-model">
          <name>5QI-aware Model</name>
          <t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via the DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in a provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>
          <figure anchor="_figure-QoS-5QI-aware">
            <name>Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)</name>
            <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
R ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
F ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
C ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
9 ┃│  └──────────┘ │┃            ├──>     TN QoS Class 1     │ ┃
5 ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
4 ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
3 ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────>     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
F ┃   ┌──────────┐  ┃  │  ├─────────>     TN QoS Class 5     │ ┃
C ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
9 ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
5 ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
4 ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
3 ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────>     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement   Coarse-grained QoS enforcement 
    (dedicated resources per     (resources shared by multiple  
     RFC 9543 Network Slice)        RFC 9543 Network Slices)            
]]></artwork>
          </figure>
          <t>Given that in deployments with a large number of 5G
   slices, the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common Per-hop Behavior (PHB) <xref target="RFC2474"/> is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>. A provider may decide
   to implement Diffserv-Intercon PHBs at the boundaries of its network domain <xref target="RFC8100"/>.</t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
            </dd>
          </dl>
          <figure anchor="_figure-QoS-5QI-mapping-example">
            <name>Example of 3GPP QoS Mapped to TN QoS</name>
            <artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─>DSCP=10├──────>DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──>   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─>DSCP=46├──────>DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──>   Queue 1    │ │
││5QI=65├─>DSCP=46├──────>DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─>DSCP=10├──────>DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork>
          </figure>
          <t>In current SDO progress of 3GPP (Release 17) and O-RAN, the mapping of 5QI to
DSCP is not expected to be in a per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>
          <t>Like in the 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per-hop behavior for all aggregated 5G QoS
   Classes from all RFC 9543 Network Slices is executed on the provider network transit links.  Provider network
   transit routers do not evaluate the original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>
          <t>In the 5QI-aware model, compared to the 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each RFC 9543 Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the Hardware capability of the equipment) within each RFC 9543
   Network Slice.</t>
          <section anchor="inbound-edge-resource-control">
            <name>Inbound Edge Resource Control</name>
            <t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>
            <t>A 5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
              </li>
              <li>
                <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
              </li>
            </ul>
            <t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>
            <figure anchor="_figure-20">
              <name>Ingress Slice Admission Control (5QI-aware Model)</name>
              <artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──> S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──> l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──> i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──>   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─>  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─>  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─>  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─>    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─>  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─>  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─>  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─>    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
            <t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>
            <figure anchor="_figure-21">
              <name>Ingress Slice Admission Control (5QI-aware) - Hierarchical</name>
              <artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──> S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──> l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──> i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──>   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──> S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──> l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──> i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──>   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──> S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──> l │  i  │
5Q-QoS-C: CIR-3C ────◇───── ───┤─┼──┼──> i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──>   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork>
            </figure>
          </section>
          <section anchor="outbound-edge-resource-control-1">
            <name>Outbound Edge Resource Control</name>
            <t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights, which are 5Q QoS
   queue CIRs within the slice, should not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   should not exceed the physical capacity of the AC.</t>
            <figure anchor="_figure-22">
              <name>Egress Slice Admission Control (5QI-aware)</name>
              <artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────> 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──> 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────> 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────> Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork>
            </figure>
          </section>
        </section>
      </section>
      <section anchor="transit-resource-control">
        <name>Transit Resource Control</name>
        <t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based on TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>
        <t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>
      </section>
    </section>
    <section anchor="transport-plane-mapping-models">
      <name>Transport Planes Mapping Models</name>
      <t>A transport plane refers to a specific forwarding behavior between PEs in order to provide packet delivery that is consistent with the corresponding SLOs.
   A network operator can define multiple transport planes. A transport plane may be realized in multiple ways such as (but not limited to):</t>
      <ul spacing="normal">
        <li>
          <t>A mesh of RSVP-TE <xref target="RFC3209"/> or SR-TE <xref target="RFC9256"/> tunnels created with specific optimization criteria and
   constraints. For example, mesh "A" might represent tunnels optimized for latency, and mesh "B" might represent tunnels optimized for high capacity.</t>
        </li>
        <li>
          <t>A Flex-Algorithm <xref target="RFC9350"/> with a particular metric-type (e.g., latency), or one that only uses links with particular properties (e.g., MACsec link <xref target="IEEE802.1AE"/>), or excludes links that are within a particular geography.</t>
        </li>
      </ul>
      <t>Detailed realization of transport planes is out of the scope of this document.</t>
      <t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes, each using a mesh of TE tunnels with or without Path Computation Element (PCE) <xref target="RFC5440"/>, and with or without bandwidth
   reservations.
   <xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>
      <figure anchor="_figure-23">
        <name>Example of Transport Planes Relying on TE Tunnels</name>
        <artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════>│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════>│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════>│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════>│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork>
      </figure>
      <t>Note that there might be multiple tunnels within a single transport plane
   between any pair of PEs. <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>
      <t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  Essentially, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model). For example,
   flows with different 5G QoS Classes, even from same
   slice, can be mapped to different transport planes (5QI-aware
   model).</t>
      <section anchor="qi-unaware-model">
        <name>5QI-unaware Model</name>
        <t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>
        <figure anchor="_figure-24">
          <name>Network Slice to Transport Plane Mapping (5QI-unaware Model)</name>
          <artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │     NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │     NS 2 ├──────┐   ├───>  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │     NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───>  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │     NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │     NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
        <t>It is worth noting that TN QoS Classes and Transport Planes are
   orthogonal.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following Interior Gateway Protocol (IGP) metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network,
   while transport plane determines the paths for packets through provider
   network based on operator's business model (operator's requirement).
   This path can be optimised or constrained.</t>
      </section>
      <section anchor="qi-aware-model-1">
        <name>5QI-aware Model</name>
        <t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>
        <figure anchor="_figure-25">
          <name>Network Slice to Transport Plane mapping (5QI-aware Model)</name>
          <artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
   R ┃   SDP           ┃                         │
   F ┃│  ┌──────────┐ │┃
   C ┃   │ 5G QoS A ├──────┐                     │
   9 ┃│  └──────────┘ │┃   │
   5 ┃   ┌──────────┐  ┃   │                     │
   4 ┃│  │ 5G QoS B ├──────┤
   3 ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────>  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
   R ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
   F ┃   ┌──────────┐  ┃   │    │
   C ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   9 ┃   └──────────┘  ┃   │    │    │         │
   5 ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   4 ┃   │ 5G QoS E ├──────┘    ├────>  Plane  │
   3 ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-capacity-planning">
      <name>Capacity Planning/Management</name>
      <section anchor="bandwidth-requirements">
        <name>Bandwidth Requirements</name>
        <t>This section describes the information conveyed by the 5G NSO to the
   NSC with respect to slice bandwidth requirements.</t>
        <t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>
        <t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The NSC has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>
        <figure anchor="_figure-multi-DC">
          <name>An Example of Multi-DC Architecture</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per RFC 9543 NS)   
]]></artwork>
        </figure>
        <t>Let us consider 5G slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>
        <t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>
        <figure anchor="_figure-27">
          <name>Inter-DC Traffic Demand Matrix</name>
          <artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork>
        </figure>
        <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the RFC 9543 NSC.  The RFC 9543
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="RFC9408"/>.</t>
        <t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the RFC 9543 NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the RFC 9543 NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>
        <t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular Flex-Algorithm, a particular set of TE paths, or a specific queue <xref target="RFC9330"/>), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>
      </section>
      <section anchor="sec-bw">
        <name>Bandwidth Models</name>
        <t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="RFC9522"/>.</t>
        <section anchor="scheme-1-shortest-path-forwarding-spf">
          <name>Scheme 1: Shortest Path Forwarding (SPF)</name>
          <t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>
          <t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>
          <t>A variation on the scheme is that Flex-Algorithm <xref target="RFC9350"/> is used. For example, one Flex-Algorithm could
   use latency-based metrics and another Flex-Algorithm could use the IGP
   metric. There would be a many-to-one mapping of Network Slices to Flex-Algorithms.</t>
          <t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 which employ TE, traffic cannot be diverted from the shortest
   path.</t>
        </section>
        <section anchor="scheme-2-te-paths-with-fixed-bandwidth-reservations">
          <name>Scheme 2: TE Paths with Fixed Bandwidth Reservations</name>
          <t>Scheme 2 uses RSVP-TE <xref target="RFC3209"/> or SR-TE paths <xref target="RFC9256"/> with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes a path.  There could be a single mesh of paths between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to paths.</t>
          <t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the NSC, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>
          <t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The NSC needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the path from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the path from PE1A to PE2A and 6.4
   Gbps of bandwidth on the path from PE1A to PE2B.  It might be tricky
   for the NSC to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of paths accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   NSC may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   paths from PE1B to PE2A/PE2B.</t>
        </section>
        <section anchor="scheme-3-te-paths-without-bandwidth-reservation">
          <name>Scheme 3: TE Paths without Bandwidth Reservation</name>
          <t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE paths.  There could be a
   single mesh of paths between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to paths.</t>
          <t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the paths.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE paths.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   NSC can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE path, can tune the paths of one or more paths using the
   link such that they avoid that link. This approach is similar to that described in <xref section="4.3.1" sectionFormat="of" target="RFC9522"/>.</t>
          <t>It would be undesirable to move a path that has latency as its cost function, rather than
   another type of path, in order to ease the congestion, as the altered path
   will typically have a higher latency.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency paths unless there is no
   alternative.</t>
        </section>
      </section>
    </section>
    <section anchor="network-slicing-oam">
      <name>Network Slicing OAM</name>
      <t>The deployment and maintenance of slices within a network imply
   that a set of OAM functions (<xref target="RFC6291"/>) need to be deployed by the providers, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Providers should be able to execute OAM tasks on a per Network Slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  </t>
          <t>
For example, per-slice OAM tasks can consist of (but not limited to):  </t>
          <ul spacing="normal">
            <li>
              <t>tracing resources that are bound to a given Network Slice,</t>
            </li>
            <li>
              <t>tracing resources that are invoked when forwarding a given flow bound to a given Network Slice,</t>
            </li>
            <li>
              <t>assessing whether flow isolation characteristics are in
conformance with the Network Slice Service requirements, or</t>
            </li>
            <li>
              <t>assessing the compliance of the allocated Network Slice resources against flow/
customer service requirements.</t>
            </li>
          </ul>
          <t>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.</t>
        </li>
        <li>
          <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given Network Slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
        </li>
        <li>
          <t>Providers may deploy means to dynamically discover the set of Network Slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
should be undertaken accordingly. For example, a provider may rely
upon the L3NM <xref target="RFC9182"/> or the L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver Network Slice Services.
The correlation between an LxVPN instance and a Network Slice Service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>).</t>
        </li>
        <li>
          <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g., YANG Push <xref target="RFC8641"/>) can be used.</t>
        </li>
        <li>
          <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref section="10" sectionFormat="of" target="RFC9543"/> discusses generic security considerations that are applicable to network slicing, with a focus on the following considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Conformance to security constraints:  </t>
          <t>
Specific security requests, such as not routing traffic through a particular geographical region can be met by mapping the traffic to a transport plane that avoids that region.</t>
        </li>
        <li>
          <t>IETF NSC authentication:  </t>
          <t>
This is out of the scope for this document. It should be addressed in documents that describe IETF NSC realization (e.g., <xref target="I-D.ietf-teas-ns-controller-models"/>).</t>
        </li>
        <li>
          <t>Specific isolation criteria:  </t>
          <t>
Adequate admission control policies, for example policers as described in <xref target="sec-inbound-edge-resource-control"/>, should be configured in the edge of the provider network to control access to specific slice resources. This prevents the possibility of one slice consuming resources at the expense of other slices. Likewise, access to classification and mapping tables have to be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices have to check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>
        </li>
        <li>
          <t>Data Confidentiality and Integrity of an IETF Network Slice:  </t>
          <t>
As described in <xref section="5.1.2.1" sectionFormat="of" target="RFC9543"/>, the customer might request an SLE that mandates encryption. As described in <xref target="transport-plane-mapping-models"/>, this can be achieved, e.g., by mapping the traffic to a transport plane that uses only MACsec-encrypted links.</t>
        </li>
      </ul>
      <t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>In order to avoid the need for a mapping table to associate source/destination IP
addresses and slices’ specific S-NSSAIs, <xref target="sec-ip-hof"/> describes an approach where some or all S-NSSAI bits
are embedded in an IPv6 address using an algorithm approach. An attacker from within the transport network
who has access to the mapping configuration may infer the slices to which belong a packet. It may also
alter these bits which may lead to steering the packet via a distinct network slice, and thus lead to
service disruption. Note that such an on-path attacker may make more damage (e.g., randomly drop packets).</t>
      <t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
          <front>
            <title>5G Mobile Networks: A Systems Approach</title>
            <author fullname="Larry Peterson">
              <organization/>
            </author>
            <author fullname="Oguz Sunay">
              <organization/>
            </author>
            <author fullname="Bruce Davie">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
          <front>
            <title>Technical Report GSTR-TN5G</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
          <front>
            <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
          <front>
            <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 04.00</title>
            <author>
              <organization>O-RAN Alliance</organization>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
          <front>
            <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
            <author>
              <organization>GSMA</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE802.1AE" target="https://1.ieee802.org/security/802-1ae/">
          <front>
            <title>802.1AE: MAC Security (MACsec)</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECPRI" target="http://www.cpri.info/downloads/eCPRI_v_2.0_2019_05_10c.pdf">
          <front>
            <title>Common Public Radio Interface: eCPRI Interface Specification</title>
            <author>
              <organization>Common Public Radio Interface</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-network-slice-application">
          <front>
            <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slices have to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in management plane, control plane and data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-02"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="14" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-12"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="15" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-11"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-13"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author fullname="Y. El Mghazli" initials="Y." role="editor" surname="El Mghazli"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="K. Chan" initials="K." surname="Chan"/>
            <author fullname="A. Gonguet" initials="A." surname="Gonguet"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs). This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6136">
          <front>
            <title>Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="D. Mohan" initials="D." role="editor" surname="Mohan"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides framework and requirements for Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM). The OAM framework is intended to provide OAM layering across L2VPN services, pseudowires (PWs), and Packet Switched Network (PSN) tunnels. This document is intended to identify OAM requirements for L2VPN services, i.e., Virtual Private LAN Service (VPLS), Virtual Private Wire Service (VPWS), and IP-only LAN Service (IPLS). Furthermore, if L2VPN service OAM requirements impose specific requirements on PW OAM and/or PSN OAM, those specific PW and/or PSN OAM requirements are also identified. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6136"/>
          <seriesInfo name="DOI" value="10.17487/RFC6136"/>
        </reference>
        <reference anchor="RFC4365">
          <front>
            <title>Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document provides an Applicability Statement for the Virtual Private Network (VPN) solution described in RFC 4364 and other documents listed in the References section. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4365"/>
          <seriesInfo name="DOI" value="10.17487/RFC4365"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Grundemann" initials="C." surname="Grundemann"/>
            <author fullname="V. Sarawat" initials="V." surname="Sarawat"/>
            <author fullname="K. Sundaresan" initials="K." surname="Sundaresan"/>
            <author fullname="O. Vautrin" initials="O." surname="Vautrin"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations. CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services. This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response. IPv6 is, of course, the preferred solution. While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4. This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7510">
          <front>
            <title>Encapsulating MPLS in UDP</title>
            <author fullname="X. Xu" initials="X." surname="Xu"/>
            <author fullname="N. Sheth" initials="N." surname="Sheth"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies an IP-based encapsulation for MPLS, called MPLS-in-UDP for situations where UDP (User Datagram Protocol) encapsulation is preferred to direct use of MPLS, e.g., to enable UDP-based ECMP (Equal-Cost Multipath) or link aggregation. The MPLS- in-UDP encapsulation technology must only be deployed within a single network (with a single network operator) or networks of an adjacent set of cooperating network operators where traffic is managed to avoid congestion, rather than over the Internet where congestion control is required. Usage restrictions apply to MPLS-in-UDP usage for traffic that is not congestion controlled and to UDP zero checksum usage with IPv6.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7510"/>
          <seriesInfo name="DOI" value="10.17487/RFC7510"/>
        </reference>
        <reference anchor="RFC4360">
          <front>
            <title>BGP Extended Communities Attribute</title>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes the "extended community" BGP-4 attribute. This attribute provides a mechanism for labeling information carried in BGP-4. These labels can be used to control the distribution of this information, or for other applications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4360"/>
          <seriesInfo name="DOI" value="10.17487/RFC4360"/>
        </reference>
        <reference anchor="RFC1997">
          <front>
            <title>BGP Communities Attribute</title>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document describes an extension to BGP which may be used to pass additional information to both neighboring and remote BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1997"/>
          <seriesInfo name="DOI" value="10.17487/RFC1997"/>
        </reference>
        <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
          <front>
            <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Ivan Bykov" initials="I." surname="Bykov">
              <organization>Ribbon Communications</organization>
            </author>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-00"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7806">
          <front>
            <title>On Queuing, Marking, and Dropping</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="R. Pan" initials="R." surname="Pan"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This note discusses queuing and marking/dropping algorithms. While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7806"/>
          <seriesInfo name="DOI" value="10.17487/RFC7806"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC8100">
          <front>
            <title>Diffserv-Interconnection Classes and Practice</title>
            <author fullname="R. Geib" initials="R." role="editor" surname="Geib"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document defines a limited common set of Diffserv Per-Hop Behaviors (PHBs) and Diffserv Codepoints (DSCPs) to be applied at (inter)connections of two separately administered and operated networks, and it explains how this approach can simplify network configuration and operation. Many network providers operate Multiprotocol Label Switching (MPLS) using Treatment Aggregates for traffic marked with different Diffserv Per-Hop Behaviors and use MPLS for interconnection with other networks. This document offers a simple interconnection approach that may simplify operation of Diffserv for network interconnection among providers that use MPLS and apply the Short Pipe Model. While motivated by the requirements of MPLS network operators that use Short Pipe Model tunnels, this document is applicable to other networks, both MPLS and non-MPLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8100"/>
          <seriesInfo name="DOI" value="10.17487/RFC8100"/>
        </reference>
        <reference anchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9350">
          <front>
            <title>IGP Flexible Algorithm</title>
            <author fullname="P. Psenak" initials="P." role="editor" surname="Psenak"/>
            <author fullname="S. Hegde" initials="S." surname="Hegde"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." surname="Talaulikar"/>
            <author fullname="A. Gulko" initials="A." surname="Gulko"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links. Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path. This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network. This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9350"/>
          <seriesInfo name="DOI" value="10.17487/RFC9350"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC5286">
          <front>
            <title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <author fullname="A. Zinin" initials="A." role="editor" surname="Zinin"/>
            <date month="September" year="2008"/>
            <abstract>
              <t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG). The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure. Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5286"/>
          <seriesInfo name="DOI" value="10.17487/RFC5286"/>
        </reference>
        <reference anchor="RFC5714">
          <front>
            <title>IP Fast Reroute Framework</title>
            <author fullname="M. Shand" initials="M." surname="Shand"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths. Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5714"/>
          <seriesInfo name="DOI" value="10.17487/RFC5714"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC9375">
          <front>
            <title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
            <author fullname="B. Wu" initials="B." role="editor" surname="Wu"/>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9375"/>
          <seriesInfo name="DOI" value="10.17487/RFC9375"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-controller-models">
          <front>
            <title>IETF Network Slice Controller and its associated data models</title>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>NVIDIA</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-01"/>
        </reference>
        <reference anchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Soininen" initials="J." surname="Soininen"/>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="G. Bajko" initials="G." surname="Bajko"/>
            <author fullname="K. Iisakkila" initials="K." surname="Iisakkila"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed. Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6. This document describes the support for IPv6 in 3GPP network architectures. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
      </references>
    </references>
    <?line 2380?>

<section anchor="ext-abbr">
      <name>Acronyms and Abbreviations</name>
      <t>3GPP: 3rd Generation Partnership Project</t>
      <t>5GC: 5G Core</t>
      <t>5QI: 5G QoS Indicator</t>
      <t>A2A: Any-to-Any</t>
      <t>AC: Attachment Circuit</t>
      <t>AMF: Access and Mobility Management Function</t>
      <t>AUSF: Authentication Server Function</t>
      <t>BBU: Baseband Unit</t>
      <t>BH: Backhaul</t>
      <t>BS: Base Station</t>
      <t>CE: Customer Edge</t>
      <t>CIR: Committed Information Rate</t>
      <t>CN: Core Network</t>
      <t>CoS: Class of Service</t>
      <t>CP: Control Plane</t>
      <t>CU: Centralized Unit</t>
      <t>CU-CP: Centralized Unit Control Plane</t>
      <t>CU-UP: Centralized Unit User Plane</t>
      <t>DC: Data Center</t>
      <t>DDoS: Distributed Denial of Services</t>
      <t>DN: Data Network</t>
      <t>DSCP: Differentiated Services Code Point</t>
      <t>DU: Distributed Unit</t>
      <t>eCPRI: enhanced Common Public Radio Interface</t>
      <t>FH: Fronthaul</t>
      <t>FIB: Forwarding Information Base</t>
      <t>GPRS: Generic Packet Radio Service</t>
      <t>gNB: gNodeB</t>
      <t>GTP: GPRS Tunneling Protocol</t>
      <t>GTP-U: GPRS Tunneling Protocol User plane</t>
      <t>IGP: Interior Gateway Protocol</t>
      <t>L2VPN: Layer 2 Virtual Private Network</t>
      <t>L3VPN: Layer 3 Virtual Private Network</t>
      <t>LSP: Label Switched Path</t>
      <t>MH: Midhaul</t>
      <t>MIoT: Massive Internet of Things</t>
      <t>MPLS: Multiprotocol Label Switching</t>
      <t>NF: Network Function</t>
      <t>NRF: Network Function Repository</t>
      <t>NRP: Network Resource Partition</t>
      <t>NSC: Network Slice Controller</t>
      <t>PE: Provider Edge</t>
      <t>PIR: Peak Information Rate</t>
      <t>QoS: Quality of Service</t>
      <t>RAN: Radio Access Network</t>
      <t>RIB: Routing Information Base</t>
      <t>RSVP: Resource Reservation Protocol</t>
      <t>RU: Radio Unit</t>
      <t>SD: Slice Differentiator</t>
      <t>SDP: Service Demarcation Point</t>
      <t>SLA: Service Level Agreement</t>
      <t>SLO: Service Level Objective</t>
      <t>SMF: Session Management Function</t>
      <t>S-NSSAI: Single Network Slice Selection Assistance Information</t>
      <t>SST: Slice/Service Type</t>
      <t>SR: Segment Routing</t>
      <t>SRv6: Segment Routing version 6</t>
      <t>TC: Traffic Class</t>
      <t>TE: Traffic Engineering</t>
      <t>TN: Transport Network</t>
      <t>UDM: Unified Data Management</t>
      <t>UE: User Equipment</t>
      <t>UP: User Plane</t>
      <t>UPF: User Plane Function</t>
      <t>URLLC: Ultra Reliable Low Latency Communication</t>
      <t>VLAN: Virtual Local Area Network</t>
      <t>VNF: Virtual Network Function</t>
      <t>VPN: Virtual Private Network</t>
      <t>VRF: Virtual Routing and Forwarding</t>
      <t>VXLAN: Virtual Extensible Local Area Network</t>
    </section>
    <section anchor="sec-5g-overview">
      <name>An Overview of 5G Networking</name>
      <t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>
      <section anchor="key-building-blocks">
        <name>Key Building Blocks</name>
        <t><xref target="TS-23.501"/> defines the Network Functions (UPF, Access and Mobility Function (AMF), etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1 and N2).  This architecture has built-in control
   and user plane separation, and the control plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>
        <figure anchor="_figure-28">
          <name>5GS Architecture and Service-based Interfaces</name>
          <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
        </figure>
        <t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>
        <ul spacing="normal">
          <li>
            <t>UE, MS, MN, and Mobile:  </t>
            <t>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
          </li>
          <li>
            <t>Radio Access Network (RAN):  </t>
            <t>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
Radio Frequency (RF) data stream to IP packets.</t>
          </li>
          <li>
            <t>Core Network (CN):  </t>
            <t>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to Public Switched Telephony Network (PSTN) and handover.</t>
          </li>
          <li>
            <t>Transport Network (TN):  </t>
            <t>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
          </li>
        </ul>
        <figure anchor="_figure-29">
          <name>Building Blocks of 5G Architecture (A High-Level Representation)</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="core-network-cn">
        <name>Core Network (CN)</name>
        <t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>
        <ul spacing="normal">
          <li>
            <t>5GC User Plane:  </t>
            <t>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the user plane Traffic in GTP Tunnels (aka GTP-U or
Mobile user plane).</t>
          </li>
          <li>
            <t>5GC Control Plane:  </t>
            <t>
The 5G control plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  </t>
            <ul spacing="normal">
              <li>
                <t>the AMF connects with the RAN
control plane over the N2 interface</t>
              </li>
              <li>
                <t>the SMF controls the 5GC UPF via the N4 interface</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="_figure-30">
          <name>5G Core Network (CN)</name>
          <artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────>(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork>
        </figure>
      </section>
      <section anchor="radio-access-network-ran">
        <name>Radio Access Network (RAN)</name>
        <t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>
        <ul spacing="normal">
          <li>
            <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
          </li>
          <li>
            <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
          </li>
          <li>
            <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
          </li>
        </ul>
        <t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>
        <t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>
        <t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>
        <figure anchor="_figure-31">
          <name>RAN Disaggregation</name>
          <artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork>
        </figure>
      </section>
      <section anchor="transport-network-tn">
        <name>Transport Network (TN)</name>
        <t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with Ethernet
or IP encapsulation.</t>
          </li>
          <li>
            <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
          </li>
          <li>
            <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
          </li>
        </ul>
        <t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>
        <figure anchor="_figure-32">
          <name>5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork>
        </figure>
        <t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>
        <figure anchor="_figure-33">
          <name>Concurrent 5G Transport Segments</name>
          <artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, Greg Mirsky, Rüdiger Geib, Nicklous D. Morris,         Daniele Ceccarelli, Bo Wu, Xuesong Geng, and Deborah Brungard for
   their review of this document and for providing valuable comments.</t>
      <t>Special thanks to Jie Dong and Adrian Farrel for the detailed and careful reviews.</t>
      <t>Thanks to Alvaro Retana for the rtg-dir review, Yoshifumi Nishida for
   the tsv-art review, and Timothy Winters for the int-dir review.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="John Drake">
        <organization/>
        <address>
          <postal>
            <city>Sunnyvale</city>
            <country>United States of America</country>
          </postal>
          <email>je_drake@yahoo.com</email>
        </address>
      </contact>
      <contact fullname="Ivan Bykov">
        <organization>Ribbon Communications</organization>
        <address>
          <postal>
            <city>Tel Aviv</city>
            <country>Israel</country>
          </postal>
          <email>ivan.bykov@rbbn.com</email>
        </address>
      </contact>
      <contact fullname="Reza Rokui">
        <organization>Ciena</organization>
        <address>
          <postal>
            <city>Ottawa</city>
            <country>Canada</country>
          </postal>
          <email>rrokui@ciena.com</email>
        </address>
      </contact>
      <contact fullname="Luay Jalil">
        <organization>Verizon</organization>
        <address>
          <postal>
            <city>Dallas, TX</city>
            <country>United States of America</country>
          </postal>
          <email>luay.jalil@verizon.com</email>
        </address>
      </contact>
      <contact fullname="Beny Dwi Setyawan">
        <organization>XL Axiata</organization>
        <address>
          <postal>
            <city>Jakarta</city>
            <country>Indonesia</country>
          </postal>
          <email>benyds@xl.co.id</email>
        </address>
      </contact>
      <contact fullname="Amit Dhamija">
        <organization>Rakuten</organization>
        <address>
          <postal>
            <city>Bangalore</city>
            <country>India</country>
          </postal>
          <email>amitd@arrcus.com</email>
        </address>
      </contact>
      <contact fullname="Mojdeh Amani">
        <organization>British Telecom</organization>
        <address>
          <postal>
            <city>London</city>
            <country>United Kingdom</country>
          </postal>
          <email>mojdeh.amani@bt.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
