<?xml version='1.0' encoding='utf-8'?>

<!DOCTYPE rfc [
  <!ENTITY RFC6241 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6241.xml">
  <!ENTITY RFC7665 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7665.xml">
  <!ENTITY RFC8040 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8040.xml">
  <!ENTITY RFC8299 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8299.xml">
  <!ENTITY RFC8309 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8309.xml">
  <!ENTITY RFC8453 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8453.xml">
  <!ENTITY RFC8454 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8454.xml">
  <!ENTITY RFC8466 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8466.xml">
  <!ENTITY RFC8639 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8639.xml">
  <!ENTITY RFC8640 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8640.xml">
  <!ENTITY RFC8641 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8641.xml">
  <!ENTITY RFC8650 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8650.xml">

  <!ENTITY I-D.dong-teas-enhanced-vpn-vtn-scalability SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.dong-teas-enhanced-vpn-vtn-scalability.xml">
  <!ENTITY I-D.ietf-ccamp-l1csm-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ccamp-l1csm-yang.xml">
  <!ENTITY I-D.ietf-teas-actn-pm-telemetry-autonomics SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-actn-pm-telemetry-autonomics.xml">
  <!ENTITY I-D.ietf-teas-actn-vn-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-actn-vn-yang.xml">
  <!ENTITY I-D.ietf-teas-enhanced-vpn SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-enhanced-vpn.xml">
  <!ENTITY I-D.ietf-teas-rfc3272bis  SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-rfc3272bis.xml">
  <!ENTITY I-D.ietf-teas-ietf-network-slice-nbi-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-ietf-network-slice-nbi-yang.xml">
  <!ENTITY I-D.ietf-teas-ietf-network-slices SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-ietf-network-slices.xml">
  <!ENTITY I-D.ietf-teas-te-service-mapping-yang SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-te-service-mapping-yang.xml">
  <!ENTITY I-D.ietf-teas-yang-te SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-teas-yang-te.xml">
]>

<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-applicability-actn-slicing-01" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">

  <front>
    <title abbrev="ACTN and Network Slicing">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Network Slicing</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-applicability-actn-slicing-01"/>

    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>

    <author initials="J." surname="Drake" fullname="John Drake">
      <organization>Juniper Networks</organization>
      <address>
        <email>jdrake@juniper.net</email>
      </address>
    </author>

    <author initials="H." surname="Zheng" fullname="Haomian Zheng">
      <organization>Huawei Technologies</organization>
      <address>
        <email>zhenghaomian@huawei.com</email>
      </address>
    </author>

    <author initials="A." surname="Farrel" fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>

    <date year="2022"/>

    <workgroup>TEAS Working Group</workgroup>

    <keyword>ACTN</keyword>

    <abstract>

      <t>Network abstraction is a technique that can be applied to a network
         domain to obtain a view of potential connectivity across the network
         by utilizing a set of policies to select network resources.</t>

      <t>Network slicing is an approach to network operations that builds on
         the concept of network abstraction to provide programmability,
         flexibility, and modularity.  It may use techniques such as Software
         Defined Networking (SDN) and Network Function Virtualization (NFV)
         to create multiple logical or virtual networks, each tailored for a
         set of services that share the same set of requirements.</t>

      <t>Abstraction and Control of Traffic Engineered Networks (ACTN) is
         described in RFC 8453.  It defines an SDN-based architecture that
         relies on the concept of network and service abstraction to detach
         network and service control from the underlying data plane.</t>

      <t>This document outlines the applicability of ACTN to network slicing
         in a Traffic Engineering (TE) network that utilizes IETF technology.
         It also identifies the features of network slicing not currently
         within the scope of ACTN, and indicates where ACTN might be extended.</t>

    </abstract>

  </front>

  <middle>

    <section anchor="INTRO" numbered="true" toc="default">
      <name>Introduction</name>

      <t>The principles of network resource separation are not new.  For
         years, the concepts of separated overlay and logical (virtual) networking
         have existed, allowing multiple services to be deployed over a single
         physical network comprised of single or multiple layers.  However,
         several key differences exist that differentiate overlay and virtual
         networking from network slicing.</t>

      <t>A network slice is a virtual (that is, logical) network with its own
         network topology and a set of network resources that are used to provide
         connectivity that conforms to a specific Service Level Agreement (SLA) or
         set of Service Level Objectives (SLOs).  The network resources used to
         realize a network slice belong to the network that is sliced.  The
         resources may be assigned and dedicated to an individual slice, or they
         may be shared with other slices enabling different degrees of service
         guarantee and providing different levels of isolation between the traffic
         in each slice.</t>

      <t><xref target="I-D.ietf-teas-ietf-network-slices" format="default"/> provides a
         definitions for network slicing in the context of IETF network technologies.
         In particular, that document defines the term "IETF Network Slice" to be the
         generic network slice concept applied to a network that uses IETF technologies.
         An IETF Network Slice could span multiple technologies (such as IP, MPLS, or
         optical) and multiple administrative domains.  The logical network that is an
         IETF Network Slice may be kept separate from other concurrent logical networks
         each with independent control and management: each can be created or modified
         on demand.  Since this document is focused entirely on IETF technologies, it
         uses the term "network slice" as a more concise expression.  Further discussion
         on the topic of IETF Network Slices and details of how an IETF Network Slice
         service may be requested and realized as an IETF Network Slice can be found in
         <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</t>

      <t>At one end of the spectrum, a virtual private wire or a virtual
         private network (VPN) may be used to build a network slice.  In these
         cases, the network slices do not require the service provider to
         isolate network resources for the provision of the service - the
         service is "virtual".</t>

      <t>At the other end of the spectrum there may be a detailed description
         of a complex service that will meet the needs of a set of
         applications with connectivity and service function requirements that
         may include compute resource, storage capability, and access to
         content.  Such a service may be requested dynamically (that is,
         instantiated when an application needs it, and released when the
         application no longer needs it), and modified as the needs of the
         application change.  This type of service is called an enhanced VPN
         and is described in more detail in <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/>.
         It is often based on Traffic Engineering (TE) constructs in the
         underlay network.</t>

      <t>Abstraction and Control of TE Networks (ACTN) <xref target="RFC8453" format="default"/>
         is a framework that facilitates the abstraction of underlying network
         resources to higher-layer applications and that allows network operators
         to create and supply virtual networks for their customers through the abstraction of
         the operators' network resources.</t>

      <t>ACTN is a toolset capable of delivering network slice functionality.  This
         document outlines the application of ACTN and associated enabling technologies
         to provide network slicing in a network that utilizes IETF TE-based technologies.
         It describes how the ACTN functional components can be
         used to support model-driven partitioning of resources into variable-sized
         bandwidth units to facilitate network sharing and virtualization.  Furthermore,
         the use of model-based interfaces to dynamically request the instantiation of
         virtual networks can be extended to encompass requesting and instantiation of
         specific service functions (which may be both physical or virtual), and to
         partition network resources such as compute resource, storage capability, and
         access to content.  Finally, this document highlights how the ACTN approach
         might be extended to address the requirements of network slicing where the
         underlying network is TE-capable.</t>

      <section anchor="TERM" numbered="true" toc="default">
        <name>Terminology</name>

        <t>As far as is possible, this document re-uses terminology from
           <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/> and
           <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/>.</t>

        <dl newline="false" spacing="normal">

          <dt>Service Provider:</dt>
          <dd>See "Provider" in <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</dd>

          <dt>Consumer:</dt>
          <dd>See <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</dd>

          <dt>Service Functions (SFs):</dt>
          <dd>Components that provide specific functions within a network.  SFs are often combined
              in a specific sequence called a service function chain to deliver services
              <xref target="RFC7665" format="default"/>.</dd>

          <dt>Resource:</dt>
          <dd>Any feature including connectivity, bufferage, compute,
              storage, and content delivery that forms part of or can be accessed
              through a network.  Resources may be shared between users, applications,
              and clients, or they may be dedicated for use by a unique customer.</dd>

          <dt>Infrastructure Resources:</dt>
          <dd>The hardware and software for
              hosting and connecting SFs.  These resources may include computing
              hardware, storage capacity, network resources (e.g., links and
              switching/routing devices enabling network connectivity), and
              physical assets for radio access.</dd>

          <dt>Service Level Agreement (SLA):</dt>
          <dd>See <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</dd>

          <dt>Service Level Expectation (SLE):</dt>
          <dd>See <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</dd>

          <dt>Service Level Objective (SLO):</dt>
          <dd>See <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</dd>

          <dt>IETF Network Slice Service:</dt>
          <dd>See <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.</dd>

        </dl>

      </section>

    </section>

    <section anchor="RfEQS" numbered="true" toc="default">
      <name>Requirements for Network Slicing</name>

      <t>According to <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>
         the customer expresses requirements for a particular network slice by
         specifying what is required rather than how the requirement is to be
         fulfilled.  That is, the customer's view of a network slice is an
         abstract one expressed as a network slice service request.</t>

      <t>The concept of network slicing is a key capability to serve a customer
         with a wide variety of different service needs expressed as SLOs/SLEs in term of
         latency, reliability, capacity, and service function specific capabilities.</t>

      <t>This section outlines the key capabilities required to realize network slicing
         in a TE-enabled IETF technology network.</t>

      <section anchor="RESSLIC" numbered="true" toc="default">
        <name>Resource Slicing</name>

        <t>Network resources need to be allocated and dedicated for use by a specific
           network slice, or they may be shared among multiple slices.  This allows
           a flexible approach that can deliver a range of services by partitioning
           (that is, slicing) the available network resources to make them available
           to meet the customer's SLA.</t>
      </section>

      <section anchor="NFV" numbered="true" toc="default">
        <name>Network Virtualization</name>

        <t>Network virtualization enables the creation of multiple virtual
           networks that are operationally decoupled from the underlying physical
           network, and are run on top of it.  Slicing enables the creation of
           virtual networks as customer services.</t>
      </section>

      <section anchor="SVCISOL" numbered="true" toc="default">
        <name>Service Isolation</name>

        <t>A customer may request, through their SLA, that changes to the other services
           delivered by the service provider do not have any negative impact on the
           delivery of the service.  This quality is referred to as "isolation"
           <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>
           <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/>.</t>

        <t>Delivery of such service isolation may be achieved in the underlying
           network by various forms of resource partitioning ranging from dedicated
           allocation of resources for a specific slice, to sharing or resources
           with safeguards.</t>

        <t>Although multiple network slices may utilize resources from a single underlying
           network, isolation should be understood in terms of the following three
           categorizations.</t>

        <ul spacing="normal">

          <li>Performance isolation requires that service delivery for one network
              slice does not adversely impact congestion or performance levels of
              other slices.</li>

          <li>Security isolation means that attacks or faults occurring in one slice
              do not impact on other slices.  Moreover, the security functions supporting
              each slice must operate independently so that an attack or misconfiguration
              of security in one slice will not prevent proper security function in the
              other slices.  Further, privacy concerns require that traffic from one
              slice is not delivered to an end point in another slice, and that it should
              not be possible to determine the nature or characteristics of a slice from
              any external point.</li>

          <li>Management isolation means that each slice must be independently viewed,
              utilized, and managed as a separate network.  Furthermore, it should be
              possible to prevent the operator of one slice from being able to control,
              view, or detect any aspect of any other network slice.</li>
        </ul>

      </section>

      <section anchor="CNO" numbered="true" toc="default">
        <name>Control and Orchestration</name>

        <t>Orchestration combines and coordinates multiple control methods to provide
           a single mechanism to operate one or more networks to deliver services.  In a
           network slicing environment, an orchestrator is needed to coordinate disparate
           processes and resources for creating, managing, and deploying the network
           slicing service.  Two aspects of orchestration are required:</t>

        <ul spacing="normal">

          <li>Multi-domain Orchestration: Managing connectivity to set up a network
              slice across multiple administrative domains.</li>

          <li>End-to-end Orchestration: Combining resources for an end-to-end
              service (e.g., underlay connectivity with firewalling, and
              guaranteed bandwidth with minimum delay).</li>

        </ul>

      </section>

    </section>

    <section anchor="ACTN" numbered="true" toc="default">
      <name>Abstraction and Control of Traffic Engineered (TE) Networks (ACTN)</name>

      <t>ACTN facilitates end-to-end connectivity and provide virtual connectivity services
         (such as virtual links and virtual networks) to the user.  The ACTN framework
         <xref target="RFC8453" format="default"/> introduces three functional components and two interfaces:</t>

      <ul spacing="normal">
        <li>Customer Network Controller (CNC)</li>
        <li>Multi-domain Service Coordinator (MDSC)</li>
        <li>Provisioning Network Controller (PNC)</li>
        <li>CNC-MDSC Interface (CMI)</li>
        <li>MDSC-PNC Interface (MPI)</li>
      </ul>

      <t>RFC 8453 also highlights how:</t>

      <ul spacing="normal">

        <li>Abstraction of the underlying network resources is provided to
            higher-layer applications and customer.</li>

        <li>Virtualization is achieved by selecting resources according to
            criteria derived from the details and requirements of the customer,
            application, or service.</li>

        <li>Creation of a virtualized environment is performed to allow
            operators to view and control multi-domain networks as a single
            virtualized network.</li>

        <li>A network is presented to a customer as a single virtual network
            via open and programmable interfaces.</li>
      </ul>

      <t>The ACTN managed infrastructure consists of traffic engineered network
         resources.  The concept of traffic engineering is broad: it describes the
         planning and operation of networks using a method of reserving and
         partitioning of network resources in order to facilitate traffic delivery
         across a network (see <xref target="I-D.ietf-teas-rfc3272bis" format="default"/> for more
         details).  In the context of ACTN, traffic engineering network resources
         may include:</t>

      <ul spacing="normal">
        <li>Statistical packet bandwidth.</li>
        <li>Physical forwarding plane sources, such as wavelengths and
            time slots.</li>
        <li>Forwarding and cross-connect capabilities.</li>
      </ul>

      <t>The ACTN network is "sliced" with each customer being given a different
         partial and abstracted topology view of the physical underlay network.</t>

      <section anchor="ACTNVN" numbered="true" toc="default">
        <name>ACTN Virtual Network as a Network Slice</name>

        <t>To support multiple customers, each with its own view of and control
           of a virtual network constructed using a server network, a service provider
           needs to partition the network resources to create network slices
           assigned to each customer.</t>

        <t>An ACTN Virtual Network (VN) is a customer view of a slice of the
           ACTN-managed infrastructure.  It is a network slice that is presented
           to the customer by the ACTN provider as a set of abstracted resources.
           See <xref target="I-D.ietf-teas-actn-vn-yang" format="default"/> for a detailed description
           of ACTN VNs and an overview of how various different types of YANG model
           are applicable to the ACTN framework.</t>

        <t>Depending on the agreement between customer and provider, various VN
           operations are possible:</t>

        <ul spacing="normal">

          <li>Network Slice Creation: A VN could be pre-configured and created
              through static configuration or through dynamic request and negotiation
              between customer and service provider.  The VN must meet the network slice
              requirements specified in the SLA to satisfy the customer's
              objectives.</li>

          <li>Network Slice Operations: The VN may be modified and deleted
              based on direct customer requests.  The customer can further act upon the VN
              to manage the their traffic flows across the network slice.</li>

          <li>Network Slice View: The VN topology is viewed from the customer's
              perspective.  This may be the entire VN topology, or a collection of tunnels that
              are expressed as customer end points, access links, intra domain paths and
              inter-domain links.</li>

        </ul>

        <t><xref target="RFC8454" format="default"/> describes a set of functional primitives that support
           these different ACTN VN operations.</t>

      </section>

      <section anchor="ACTNagg" numbered="true" toc="default">
        <name>ACTN Virtual Network for and Scaling Network Slices</name>

        <t>Scaling considerations for network slicing are an important consideration.
           If the service provider must manage and maintain state in the core of the network
           for every network slice then this will quickly limit the number of customer services that can be
           supported.</t>

        <t>The importance of scalability for network slices is discussed in
           <xref target="I-D.ietf-teas-enhanced-vpn" format="default"/> and further in
           <xref target="I-D.dong-teas-enhanced-vpn-vtn-scalability" format="default"/>.  That work notes the
           importance of collecting network slices or their composite connectivity constructs into groups of
           that require similar treatment in the network before realizing those groups in the network.</t>

        <t>The same consideration applies to ACTN VNs.  But fortunately, ACTN VNs may be
           arranged hierarchically by recursing the MDSCs so that one VN is realized over
           another VN.  This allows the VNs presented to the customer to be aggregated
           before they are instantiated in the physical network.</t>

      </section>

      <section anchor="ACTNmgmt" numbered="true" toc="default">
        <name>Management Components for ACTN and Network Slicing</name>

        <t>The ACTN management components (CNC, MDSC, and PNC) and interfaces (CMI and MPI) are
           introduced in <xref target="ACTN" format="default"/> and described in detail in <xref target="RFC8453" format="default"/>.
           The management components for network slicing are described in <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>
           and are known as the customer orchestration system, the IETF Network Slice Controller (NSC), and the network controller.  The network
           slicing management components are separated by the Network Slice Service Interface
           and the Network Configuration Interface, modeling the architecture described in <xref target="RFC8309" format="default"/>.</t>

        <t>The mapping between network slicing management components and ACTN management components is
           presented visually in <xref target="MgmtFig" format="default"/> and provides a reference for
           understanding the material in <xref target="ACTNEG" format="default"/> and <xref target="YANG" format="default"/>.</t>

        <figure anchor="MgmtFig">
          <name>Mapping Between IETF Network Slice and ACTN Management Components</name>
          <artwork name="" type="" align="left" alt="">
            <![CDATA[
       +---------------------------------------+
       |       Customer operation system       |   |    +-----+
       | (e.g E2E network slice orchestrator,  | =====> | CNC |
       |   customer network management system) |   |    +-----+
       +---------------------------------------+           ^
                            A                      |       |
         IETF Network Slice |                              | CMI
          Service Interface |                      |       |
                            V                              v
       +---------------------------------------+   |    +------+
       |  IETF Network Slice Controller (NSC)  | =====> | MDSC |
       +---------------------------------------+   |    +------+
                            A                              ^
              Network       |                      |       |
              Configuration |                              | MPI
              Interface     |                      |       |
                            V                              v
       +---------------------------------------+   |    +-----+
       |         Network Controllers           | =====> | PNC |
       +---------------------------------------+   |    +-----+
            ]]>
          </artwork>
        </figure>

      </section>

      <section anchor="ACTNEG" numbered="true" toc="default">
        <name>Examples of ACTN Delivering Types of Network Slices</name>

        <t>The examples that follow build on the ACTN framework to provide control, management,
           and orchestration for the network slice life-cycle.  These network slices utilize common
           physical infrastructure, and meet specific service-level requirements.</t>

        <t>Three examples are shown.  Each uses ACTN to achieve a different network slicing
           scenario.  All three scenarios can be scaled up in capacity or be subject to topology
           changes as well as changes of customer requirements.</t>

        <section anchor="VPL" numbered="true" toc="default">
          <name>ACTN Used for Virtual Private Line</name>

          <t>In the example shown in <xref target="VPLFig" format="default"/>, ACTN provides virtual connections
             between multiple customer locations (sites accessed through Customer Edge nodes - CEs).
             The service is requested by the customer (via CNC-A) and delivered as a Virtual Private
             Line (VPL) service.  The benefits of this model include the following.</t>

          <ul spacing="normal">

            <li>Automated: The service set-up and operation is managed by the network provider.</li>

            <li>Virtual: The private line connectivity is provided from Site A to Site C (VPL1)
                 and from Site B to Site C (VPL2) across the ACTN-managed physical network.</li>

            <li>Agile: On-demand adjustments to the connectivity and bandwidth are available
                 according to the customer's requests.</li>

          </ul>

          <t>In terms of network slicing concept as defined in <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>,
             in this example the customer requests a single network slice with two pairs of point-to-point connectivity constructs between
             the service demarcation points CE1 and CE3, and CE2 and CE3 with each pair comprising one connectivity construct in each
             direction.</t>

          <figure anchor="VPLFig">
            <name>Virtual Private Line Model</name>
            <artwork name="" type="" align="left" alt="">
              <![CDATA[
                  (Customer VPL Request)
                             :
                          -------
                         | CNC-A |
   Boundary               -------
   Between  . . . . . . . . .:. . . . . . . . . . .
   Customer &                :
   Network Provider       ------
                         | MDSC |
                          ------
                             :
                           -----
                          | PNC |
         Site A          ( ----- )           Site B
         -----          (         )          -----
        | CE1 |========(  Physical )========| CE2 |
         -----\         ( Network )         /-----
               \         (_______)         /
                \            ||           /
                 \           ||          /
             VPL1 \          ||         / VPL2
                   \         ||        /
                    \        ||       /
                     \       ||      /
                      \-------------/
                      |     CE3     |
                       -------------
                           Site C

   Key:   ... ACTN control connectivity
          === Physical connectivity
          --- Logical connectivity
              ]]>
            </artwork>
          </figure>

        </section>

        <section anchor="VPN" numbered="true" toc="default">
          <name>ACTN Used for VPN Delivery Model</name>

          <t>In the example shown in <xref target="VPNFig" format="default"/>, ACTN provides VPN
             connectivity between two sites across three physical networks.  The
             requirements for the VPN are expressed by the users of the two sites.
             The request is directed to the CNC, and the CNC interacts with the network
             provider's MDSC.  The benefits of this model include are as follows.</t>

          <ul spacing="normal">

            <li>Provides edge-to-edge VPN multi-access connectivity.</li>
            <li>Most of the function is managed by the network provider,
                with some flexibility delegated to the customer-managed CNC.</li>

          </ul>

          <t>In terms of network slicing concept as defined in <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>,
             in this example the customer requests a single network slice with a pair of point-to-point connectivity constructs
             (one in each direction) between the service demarcation points at site A and site B.  The customer is unaware that
             the service is delivered over multiple physical networks.</t>

          <figure anchor="VPNFig">
            <name>VPN Model</name>
            <artwork name="" type="" align="left" alt="">
              <![CDATA[
                   --------------     --------------
                  | Site-A Users |   | Site-B Users |
                   --------------     --------------
                              :         :
                             -------------
                            |     CNC     |
   Boundary                  -------------
   Between   . . . . . . . . . . . : . . . . . . . . . . .
   Customer &                      :
   Network Provider                :
                   ---------------------------------
                  |               MDSC              |
                   ---------------------------------
                    :              :              :
                    :              :              :
                 -------        -------        -------
                |  PNC  |      |  PNC  |      |  PNC  |
                 -------        -------        -------
                    :              :              :
                    :              :              :
     ______     ---------      ---------      ---------     ______
    <      >   (         )    (         )    (         )   <      >
    <Site A>==( Physical  )==( Physical  )==( Physical  )==<Site B>
    <      >   ( Network )    ( Network )    ( Network )   <      >
    <      >    (       )      (       )      (       )    <      >
    <      >     -------        -------        -------     <      >
    <      >-----------------------------------------------<      >
    <______>                                               <______>

   Key:   ... ACTN control connectivity
          === Physical connectivity
          --- Logical connectivity
              ]]>
            </artwork>
          </figure>

        </section>

        <section anchor="VCN" numbered="true" toc="default">
          <name>ACTN Used to Deliver a Virtual Customer Network</name>

          <t>In the example shown in <xref target="SliceFig" format="default"/>, ACTN provides a
             virtual network to the customer.  This virtual network is managed by the
             customer.  The figure shows two virtual networks (Network Slice 1 and
             Network Slice 2) each created for a different customer under the care of
             a different CNC.  There are two physical networks controlled by separate
             PNCs.  Network Slice 2 is built using resources from just one physical
             network, while Network Slice 1 is constructed from resources from both
             physical networks.</t>

          <t>The benefits of this model include the following.</t>

          <ul spacing="normal">

            <li>The MDSC provides the topology to the customer so that the customer
                can control their network slice to fit their needs.</li>

            <li>Applications can interact with their assigned network slices
                directly.  The customer may implement their own network control
                methods and traffic prioritization, and manage their own addressing
                schemes.</li>

            <li>Customers may further slice their virtual networks so that this
                becomes a recursive model.</li>

            <li>Service isolation can be provided through selection of physical
                networking resources through a combination of efforts of the MSDC
                and PNC.</li>

            <li>The network slice may include nodes with specific capabilities.  These
                can be delivered as Physical Network Functions (PNFs) or Virtual Network
                Functions (VNFs).</li>

          </ul>

          <figure anchor="SliceFig">
            <name>Network Slicing</name>
            <artwork name="" type="" align="left" alt="">
              <![CDATA[
                                              ___________
              -------------                  (           )
             |    CNC      |---------------->(  Network  )
              -------------                  (  Slice 2  )
               ^                             (___________)
               |                           ___________  ^
               |   -------------          (           ) :
               |  |     CNC     |-------->(  Network  ) :
               |   -------------          (  Slice 1  ) :
               |       ^                  (___________) :
               |       |                      ^    ^    :
   Boundary    |       |                      :    :    :
   Between    .|. . . .|. . . . . . . . . . . : . .:. . : . . .
   Customer &  |       |                      :    :    :
   Network     |       |                      :    :    :
   Provider    v       v                      :    :    :
             -------------                    :    :....:
            |    MDSC     |                   :         :
             -------------                    :         :
                     ^                  ------^--       :
                     |                 (         )      :
                     v                (  Physical )     :
                  -------              ( Network )      :
                 |  PNC  |<------------>(       )    ---^-----
                -------  |               -------    (         )
               |  PNC  |-                          (  Physical )
               |       |<-------------------------->( Network )
                -------                              (       )
                                                      -------

   Key: --- ACTN control connection
        ... Virtualization/abstraction through slicing
              ]]>
            </artwork>
          </figure>

        </section>

      </section>

    </section>

    <section anchor="YANG" numbered="true" toc="default">
      <name>YANG Models</name>

      <section anchor="MAP" numbered="true" toc="default">
        <name>Network Slice Service Mapping from TE to ACTN VN Models</name>

        <t>The role of the TE-service mapping model <xref target="I-D.ietf-teas-te-service-mapping-yang" format="default"/> is to
           create a binding relationship across a Layer 3 Service Model (L3SM) <xref target="RFC8299" format="default"/>,
           Layer 2 Service Model (L2SM) <xref target="RFC8466" format="default"/>, and TE Tunnel model <xref target="I-D.ietf-teas-yang-te" format="default"/>,
           via the generic ACTN Virtual Network (VN) model <xref target="I-D.ietf-teas-actn-vn-yang" format="default"/>.</t>

        <t>The ACTN VN model is a generic virtual network service model that allows customers
           to specify a VN that meets the customer's service objectives with various
           constraints on how the service is delivered.  A request for a network slice service
           may be mapped directly to a request for a VN.</t>

        <t>The TE-service mapping model <xref target="I-D.ietf-teas-te-service-mapping-yang" format="default"/> is used to bind
           the L3SM with TE-specific parameters.  This binding facilitates seamless
           service operation and enables visibility of the underlay TE network.  The TE-service model developed
           in that document can also be extended to support other services including L2SM, and the Layer 1 Connectivity
           Service Model (L1CSM) <xref target="I-D.ietf-ccamp-l1csm-yang" format="default"/>
           L1CSM network service models.</t>

        <t><xref target="TEMapFig" format="default"/> shows the relationship between the models discussed above.</t>

        <figure anchor="TEMapFig">
          <name>TE-Service Mapping</name>
          <artwork name="" type="" align="left" alt="">
            <![CDATA[
     ---------------            -----------
    |    L3SM       |<=========|           |             -----------
     ---------------   augment |           |...........>|  ACTN VN  |
     ---------------           | Augmented | reference   -----------
    |    L2SM       |<=========| Service   |
     ---------------   augment | Model     |             -----------
     ---------------           |           |...........>|  TE-topo  |
    |    L1CSM      |<=========|           | reference   -----------
     ---------------   augment |           |
     ---------------           |           |             -----------
    | TE & Service  |--------->|           |...........>| TE-tunnel |
    | Mapping Types |  import   -----------  reference   -----------
     ---------------
            ]]>
          </artwork>
        </figure>

      </section>

      <section anchor="NBI" numbered="true" toc="default">
        <name>Interfaces and Yang Models</name>

        <t><xref target="NBIFig" format="default"/> shows the three ACTN components and
           two ACTN interfaces as listed in <xref target="ACTN" format="default"/>.  The
           figure also shows the Device Configuration Interface between the
           PNC and the devices in the physical network.  That interface
           might be used to install state on every device in the network,
           or might instruct a "head-end" node when a control plane is used
           within the physical network.  In the context of <xref target="RFC8309" format="default"/>,
           the Device Configuration Interface uses one or more device configuration models.</t>

        <t>The figure also shows the Network Slice Service Interface.  This interface
           allows a customer to make requests for delivery of the
           service, and it facilitates the customer modifying and monitoring the
           service.  In the context of <xref target="RFC8309" format="default"/>, this is
           a customer service interface and uses a service model.</t>

        <t>When an ACTN system is used to manage the delivery of network
           slices, a network slice resource model is needed.  This model
           will be used for instantiation, operation, and monitoring of
           network and function resource slices.  The YANG model defined
           in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang" format="default"/> provides
           a suitable basis for requesting, controlling, and deleting,
           network slices.</t>

        <figure anchor="NBIFig">
          <name>The Yang Interfaces in Context</name>
          <artwork name="" type="" align="left" alt="">
            <![CDATA[
                       ----------
                      | Customer |
                       ----------
                     .......:....... Network Slice Service Interface
                            :
                      -------------
                     |     CNC     |
                      -------------
                     .......:....... CMI
                            :
                     ---------------
                    |      MDSC     |
                     ---------------
                     .......:....... MPI
                            :
                         -------
                        |  PNC  |
                         -------
                     .......:....... Device Configuration Interface
                            :
                        ----------
                       (          )
                      (  Physical  )
                       ( Network  )
                        (________)
            ]]>
          </artwork>
        </figure>

      </section>

      <section anchor="KPI" numbered="true" toc="default">
        <name>ACTN VN Telemetry</name>

        <t>The ACTN VN KPI telemetry model <xref target="I-D.ietf-teas-actn-pm-telemetry-autonomics" format="default"/>
           provides a way for a customer to define performance monitoring relevant for its VN/network slice
           via the NETCONF subscription mechanisms <xref target="RFC8639" format="default"/>, <xref target="RFC8640" format="default"/>,
           or using the equivalent mechanisms in RESTCONF <xref target="RFC8641" format="default"/>, <xref target="RFC8650" format="default"/>.</t>

        <t>Key characteristics of <xref target="I-D.ietf-teas-actn-pm-telemetry-autonomics" format="default"/> include the following.</t>

        <ul spacing="normal">

          <li>An ability to provide scalable VN-level telemetry aggregation
              based on a customer subscription model for key performance
              parameters defined by the customer.</li>

          <li>An ability to facilitate proactive re-optimization and
              reconfiguration of VNs/network slices based on
              autonomic network traffic engineering scaling configuration
              mechanisms.</li>

        </ul>

      </section>

    </section>

    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>

        <t>This document makes no requests for action by IANA.</t>

    </section>

    <section anchor="SEC" numbered="true" toc="default">
      <name>Security Considerations</name>

      <t>Network slicing involves the control of network resources in order
         to meet the service requirements of customers.  In some deployment
         models using ACTN, the customer is able to directly request modification in
         the behaviour of resources owned and operated by a service provider.
         Such changes could significantly affect the service provider's
         ability to provide services to other customers.  Furthermore, the
         resources allocated for or consumed by a customer will normally be
         billable by the service provider.</t>

      <t>Therefore, it is crucial that the mechanisms used in any network
         slicing system allow for authentication of requests, security of
         those requests, and tracking of resource allocations.</t>

      <t>It should also be noted that while the partitioning or slicing of
         resources is virtual, as mentioned in <xref target="SVCISOL" format="default"/> the
         customers expect and require that there is no risk of leakage of
         data from one slice to another, no transfer of knowledge of the
         structure or even existence of other slices.  Further, in some service
         requests, there is an expectation that changes to
         one slice (under the control of one customer) should not have
         detrimental effects on the operation of other slices (whether
         under control of different or the same customers) even within the limits
         allowed within the SLA.  Thus, slices are assumed to be private and
         to provide the appearance of genuine physical connectivity.</t>

      <t>Some service providers may offer secure network slices as a service.
         Such services may claim to include edge-to-edge encryption for the
         customer's traffic.  However, a customer should take full
         responsibility for the privacy and integrity of their traffic and
         should carefully consider using their own edge-to-edge encryption.</t>

      <t>ACTN operates using the NETCONF <xref target="RFC6241" format="default"/> or RESTCONF
         <xref target="RFC8040" format="default"/> protocols and assumes the security
         characteristics of those protocols.  Deployment models for ACTN should
         fully explore the authentication and other security aspects before
         networks start to carry live traffic.</t>

    </section>

    <section anchor="ACK" numbered="true" toc="default">
      <name>Acknowledgements</name>

      <t>Thanks to Qin Wu, Andy Jones, Ramon Casellas, Gert Grammel, and Kiran
         Makhijani for their insight and useful discussions about network
         slicing.</t>

      <t>This work is partially supported by the European Commission under Horizon 2020 grant agreement number 101015857
         Secured autonomic traffic management for a Tera of SDN flows (Teraflow).</t>
    </section>

    <section anchor="CONT" numbered="true" toc="default">
      <name>Contributors</name>

      <t>The following people contributed text to this document.</t>
      <artwork name="" type="" align="left" alt="">
        <![CDATA[
      Young Lee
      Email: younglee.tx@gmail.com

      Mohamed Boucadair
      Email: mohamed.boucadair@orange.com

      Sergio Belotti
      Email: sergio.belotti@nokia.com

      Daniele Ceccarelli
      Email: daniele.ceccarelli@ericsson.com
        ]]>
      </artwork>

    </section>

  </middle>

  <back>

    <references>
      <name>Informative References</name>

      &RFC6241;
      &RFC7665;
      &RFC8040;
      &RFC8299;
      &RFC8309;
      &RFC8453;
      &RFC8454;
      &RFC8466;
      &RFC8639;
      &RFC8640;
      &RFC8641;
      &RFC8650;

      &I-D.dong-teas-enhanced-vpn-vtn-scalability;
      &I-D.ietf-ccamp-l1csm-yang;
      &I-D.ietf-teas-actn-pm-telemetry-autonomics;
      &I-D.ietf-teas-actn-vn-yang;
      &I-D.ietf-teas-enhanced-vpn;
      &I-D.ietf-teas-rfc3272bis;
      &I-D.ietf-teas-ietf-network-slice-nbi-yang;
      &I-D.ietf-teas-ietf-network-slices;
      &I-D.ietf-teas-te-service-mapping-yang;
      &I-D.ietf-teas-yang-te;

    </references>

  </back>

</rfc>
