<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.19 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-network-slice-topology-yang-02" category="std">

  <front>
    <title abbrev="Network Slice Topology Data Model">IETF Network Slice Topology YANG Data Model</title>

    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="L.M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="S." surname="Belotti" fullname="Sergio Belotti">
      <organization>Nokia</organization>
      <address>
        <email>Sergio.belotti@nokia.com</email>
      </address>
    </author>
    <author initials="A." surname="Guo" fullname="Aihua Guo">
      <organization>Futurewei</organization>
      <address>
        <email>aihuaguo.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>

    <date year="2025" month="July" day="22"/>

    
    <workgroup>TEAS Working Group</workgroup>
    

    <abstract>


<t>An RFC 9543 network slice customer may utilize intent-based topologies to
   express resource reservation intentions within the provider's network.
   These customer-defined intent topologies allow customers to request
   shared resources for future connections that can be flexibly allocated
   and customized. Additionally, they provide an extensive level of control
   over underlay service paths within the network slice.</t>

<t>This document describes a YANG data model for expressing customer intent
   topologies which can be used to enhance the RFC 9543 Network Slice Services
   in specific use cases, such as Network wholesale scenarios, where both topology
   and connectivity intents need to be expressed.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Network service providers utilize topologies to convey controlled information
   about their networks, such as bandwidth availability and connectivity, 
   with customers, to facilitates customer service requests. Customers can also
   define intent-based topologies to streamline their internal operations. When
   requesting provider support for such custom topologies, they are considered
   as customer intent topologies.</t>

<t>In the context of network slicing, customer intent topologies enables customers
   to express resource reservation preferences. These topologies allow flexible
   configuration and activation of network slices on demand. By providing full
   control over resource allocation timing and methods, customer intent topologies
   ensure that resources are consistently available. Moreover, the resources
   reserved via customer intent topologies can be shared across network slices created
   at different times or between different connectivity constructs within the same slice.
   Compared to network slices with dedicated full-mesh connectivity constructs between
   endpoints, network slices utilizing customer intent topologies can reduce overall
   resource requirements, offering significant economic benefits to the customer.</t>

<t>Consider a hub-and-spoke network slice scenario where multiple customer spoke
   sites dynamically connect to a central hub site, sharing available bandwidth.
   By designing a customer intent topology with two virtual nodes - one representing
   all the spoke sites and the other representing the hub site - connected via
   a shared link, we proactively reserve resources for the shared connection.
   This ensures that bandwidth is readily available whenever the customer requires
   it. In contrast, achieving equivalent bandwidth assurance through individual
   dedicated connectivity constructs would necessitate creating separate links between each
   spoke and the hub, which would lead to substantial bandwidth inefficiency.</t>

<t>Customer intent topology complements connectivity-based network slicing by providing
   customers a mechanism to specify additional underlay service paths to gain
   extensive control over specific or all connectivity constructs within the network slice,
   as outlined in <xref target="RFC9543"/>.</t>

<t>A customer intent topology is defined within the customer's context. It can include pure customer information or may also refer to network
   resources identifiable within the provider's context. There is a minimum
   level of a-prior shared knowledge between the customer and the provider,
   and this is the same information needed to supported connectivity-based
   network slice services as described in <xref target="RFC9543"/>.
   The provider's responsibility lies in understanding the customer intent topology request and translating that into suitable realization within their domain.</t>

<t>This document introduces a YANG data model, based on <xref target="RFC7950"/>, for
   configuring customer intent topologies. The YANG model extends the existing
   data model from <xref target="RFC8345"/>, allowing customers to express desired
   service-level objectives (SLOs) and service-level expectations (SLEs)
   across different elements within the customer intent topology.</t>

<t>The defined data model serves as an interface between customers and providers,
   enabling configurations and state retrievals for network slicing as a service.
   Customers can use this model to request or negotiate the creation of network
   slice instances. Additionally, they can incrementally adjust requirements for
   individual topology elements within the slice - for instance, adding or removing
   nodes or links, updating link bandwidth - and retrieve operational states.
   Leveraging other IETF mechanisms and data models, telemetry information can
   also be convey to the customer.</t>

<t>The YANG model encompasses constructs that are independent of specific technologies,
   accommodating network slicing across diverse layers (including IP/MPLS, MPLS-TP,
   OTN, and WDM optical). As a result, this model serves as a foundational framework
   upon which technology-specific network slicing models - such as 
   <xref target="I-D.ietf-ccamp-yang-otn-slicing"/> - can be developed.</t>

<t>Section 3 of <xref target="I-D.ietf-teas-ns-controller-models"/> outlines that the use
   of customer intent topologies and resource reservation control is optional within network
   slicing. These features complement the data model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) <xref target="RFC8342"/>.</t>

<section anchor="use-case-applicability"><name>Use Case Applicability</name>

<t>In Traffic Engineering (TE)-enabled networks like Layer-0/1 transport (OTN, MW, DWDM), customer intent topology is useful for routing RFC 9543 network slices across varied paths with TE constraints. Thus, most of the use cases for which this model target are transport oriented. Nonetheless, it is also relevant to non-transport networks like IP/MPLS, where customers may use intent topologies to influence the realization of network slices. These intents help build the logical view of the desired RFC 9543 Network Slice service (and its constituent parts), aiding providers in fulfilling slice requests and defining the service instantiation.</t>

<section anchor="use-case-1-multi-tenancy-in-network-wholesaling"><name>Use Case 1 : Multi-tenancy in Network Wholesaling</name>

<t>A typical use case in which the customer intent topology is essential is the wholesale multi-tenant case. Here, customer C may acquire a network slice from provider P and resell sub-slices to other customers/tenants. The creation of these sub-slices within C's slice necessitates specifying a topology intent - reflecting the topology of C's purchased slice - as a key input parameter.</t>

</section>
<section anchor="use-case-2-scoped-connectivity-constructs-in-network-slicing"><name>Use Case 2 : Scoped Connectivity Constructs in Network Slicing</name>

<t>The current expression of slice requests leveraging on <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> allows the customer to request distinct connectivity constructs as part of the same Network Resource Partition (NRP). The topology provided by the customer could imply different NRPs, instead.</t>

<t>As another example, a slice request leveraging <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> without topology differentiation could result in all connectivity constructs being realized in the same manner on the same NRP, e.g. implementing all of them within the same VRF in a L3VPN. Using topological views can help providers infer differentiated realizations of some of the connectivity constructs, for instance, by implementing them on different VRFs. This approach can offer operational advantages, like limiting the necessary VRF reconfiguration to only those affected connectivity constructs when adding new nodes or SDPs.</t>

<t>Finally, by using customer intent topology it can be easier for the slice provider to infer different technologies for sets of connectivity constructs of every topology segment (e.g., IP/MPLS, optical, microwave, etc).</t>

</section>
</section>
<section anchor="terminologies-and-notations"><name>Terminologies and Notations</name>

<t>The following terminologies for describing network slices are defined in 
   <xref target="RFC9543"/> and are not redefined herein.</t>

<t><list style="symbols">
  <t>Network Slice (NS)</t>
  <t>Network Slice Customer</t>
  <t>Network Slice Service Provider</t>
  <t>Network Slice Controller (NSC)</t>
  <t>Network Resource Partition (NRP)</t>
</list></t>

<t>The following terms are defined and used in this document.</t>

<t><list style="symbols">
  <t>Customer Intent Topology:
  A topology defined by the customer and provided as input to the
  network slice service provider (specifically, the Network Slice
  Controller or NSC). It represents the customer's desired network
  topology.</t>
  <t>Abstract Topology:
  A topology exposed to the customer by the network slice service
  provider prior to the creation of network slices. The provider
  may optionally uses an abstract topology to expose useful information,
  such as available resources to the customer, which can facilitate
  the build-up of customer intent topologies by the customer.</t>
  <t>NRP Topology:
  A topology internal to the NSC to facilitate the mapping of
  network slices to underlying network resources.</t>
</list></t>

</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t>Tree diagrams used in this document follow the notation defined in
   <xref target="RFC8340"/>.</t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects
   are prefixed using the standard prefix associated with the
   corresponding YANG imported modules, as shown in <xref target="tab-prefixes"/>.</t>

<texttable title="Prefixes and Corresponding YANG Modules" anchor="tab-prefixes">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG Module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>nt</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>nw</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>tet</c>
      <c>ietf-te-topology</c>
      <c><xref target="RFC8795"/></c>
      <c>ns-path</c>
      <c>ietf-ns-underlay-path</c>
      <c>RFC XXXX</c>
      <c>ns-topo</c>
      <c>ietf-ns-topo</c>
      <c>RFC XXXX</c>
      <c>ietf-nss</c>
      <c>ietf-network-slice-service</c>
      <c>RFC YYYY</c>
</texttable>

<t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please replace YYYY with the RFC number assigned to <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
Please remove this note.</t>

</section>
</section>
<section anchor="modeling-considerations"><name>Modeling Considerations</name>

<t>A network slice topology is a customer intent topology 
   modeled as network topology defined in <xref target="RFC8345"/>, with augmentations. 
   A new network type "network-slice" is defined in this document.<br />
   When a network topology data instance contains the network-slice 
   network type, it represents an instance of a network slice 
   topology.</t>

<t>This data model augments the network topology model by incorporating 
   intent-based Service-Level Objectives (SLOs) and Service-Level
   Expectations (SLEs). These apply to various components within the
   customer intent topology, including nodes, links, and termination points (TPs).</t>

<section anchor="relationship-with-traffic-engineering-te-based-topology"><name>Relationship with Traffic Engineering (TE)-based Topology</name>

<t>The model defined in this document can be combined through multi-inheritance
   with other topology data models, such as Traffic Engineering (TE) topologies
   described in <xref target="RFC8795"/> or Optical Transport Network (OTN) topologies
   described in <xref target="I-D.ietf-ccamp-otn-topo-yang"/>. This flexibility allows
   the creation of technology-specific customer intent topologies tailored to
   specific network requirements.</t>

</section>
<section anchor="relationship-with-actn-virtual-network-vn"><name>Relationship with ACTN Virtual Network (VN)</name>

<t>The ACTN VN model, defined in <xref target="RFC9731"/>, provides a self-consistent set of methods for expressing connectivity intents (Type 1 VN),
   optional path constraints and topology intents (Type 2 VN), using TE metrics and TE objective functions defined in
   <xref target="RFC8795"/>. Type 2 VN path constraints rely on Type 1 VN for expressing connectivity intents. See <xref target="vn-intro"/> for more details.</t>

<t>On the other hand, RFC9543 network slice services provide connectivity intents equivalent to Type 1 VN, using SLO and SLE attributes in a technology-agnostic manner not tied to TE technologies. This
   distinction is detailed in <xref section="D" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>The proposed models in this draft aim to deliver a solution equivalent to Type 2 VN to provide optional path constraints and topology intent within the
   context of RFC 9543 network slicing. These models complement the existing solution outlined in
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, while ensuring consistent use of SLO and SLE attributes in a technology-agnostic manner to express customer intent.</t>

<t>In a nutshell:</t>

<t><list style="symbols">
  <t>the data models, defined in this draft, are intended to be used when there is a need to extend, with more control over network resources allocation by the customer, the connectivity service intent, expressed using the Network Slice Service data model, defined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>;</t>
  <t>the VN type 2 data models, defined in <xref target="RFC9731"/>, are intended to be used when there is a need to extend, with more control over network resources allocation by the customer, the connectivity service intent expressed using the VN type 1 data models, defined in <xref target="RFC9731"/>.</t>
</list></t>

<t><xref section="D" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> provides guidance to decide when to use the Network Slice Service data model, defined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, or the VN type 1 data models, defined in <xref target="RFC9731"/>, to express the connectivity intent.</t>

</section>
<section anchor="relationship-with-service-attachment-point-sap-topology"><name>Relationship with Service Attachment Point (SAP) Topology</name>

<t><xref target="RFC9408"/> introduces a YANG data model that represents an abstract
   view of the provider network topology. This model includes a list of
   Service Attachment Points (SAPs), where customer services can be
   connected. The SAP topology is made visible to customers by the provider
   before configuring network slice services. In contrast, the customer
   intent topology described in this document captures a customer's
   intentions, while the provider acts as the recipient of these intents.
   As a result, these two models serve distinct purposes.</t>

<t>In certain scenarios, customers can leverage the SAP topology to
   construct customer intent topologies to aid in the realization
   of their intended network configurations. For instance, within a node
   of a customer intent topology, the Link Termination Point (LTP)
   identifiers may explicitly reference their supporting Termination
   Points (TPs), which correspond to the SAPs exposed in the provider's
   SAP model. However, the specifics of this mechanism fall beyond the
   scope of this document.</t>

</section>
<section anchor="data-model-relationship"><name>Data Model Relationship</name>

<t>The data model presented in this document builds upon the generic network
   topology model defined in <xref target="RFC8345"/>. Other data models, including OTN
   Slicing (as defined in <xref target="I-D.ietf-ccamp-yang-otn-slicing"/>), can leverage
   this extended model.</t>

<t>The relationship of the related data models is illustrated in <xref target="fig-model-relationship"/>. 
   Within this diagram, the box outlined with dotted lines specifically represents
   the data model defined in this document.</t>

<figure title="Model Relationship" anchor="fig-model-relationship"><artwork><![CDATA[
     +----------+                 +----------+
     | Network  |                 | Network  |
     | Slice    |                 | Topology +
     | NBI YANG +------+          | Model    |
     | Model    |      |          | RFC 8345 |
     +----+-----+      |          +-----+----+
          |            |                |
          |augments    |augments        |augments
          |            |                |
     +----^-----+      |          ......^.....
     | OTN      |      +----------< Network  :
     | Slicing  | augments        : Slice    :
     | Model    >-----------------: Topology :
     |          |                 : Model    :
     +----------+                 :..........:
]]></artwork></figure>

</section>
</section>
<section anchor="model-applicability"><name>Model Applicability</name>

<t>Network slicing can be achieved through various technologies. The data
   model defined in this document serves as a means for configuring
   resource reservation-based network slices. In this approach, resources for
   network slices are reserved and represented using a customer intent topology.
   This topology can then be mapped to a network resource partition (NRP)
   and realized based on the scenarios outlined in <xref target="RFC9543"/>.</t>

<t>Network slices can be abstracted in various ways, depending on the specific
   requirements of the network slice customer. For instance, a customer might
   request a network slice with direct connectivity between pairs of Service
   Demarcation Points (SDPs). Within this network slice, each connectivity construct
   could be further supported by an end-to-end tunnel that follows a specific path
   defined in a customer intent topology, which the customer provides. The 
   resources associated with each link are immediately commissioned during
   the network slice configuration process.</t>

<t>Alternatively, a customer can request resources to be reserved for potential
   network slices through a customer intent topology. These reserved resources
   are not immediately commissioned at the time of the request. Instead, they
   serve as a pool of allocated resources that the customer can utilize to build
   network slices in the future. By adopting this approach, customers gain the
   flexibility to share resources across multiple endpoints and activate them
   on demand.</t>

<t>In the example shown in <xref target="fig-ns-topo-example"/>, two topology intents named as
   Network Slice Blue and Network Slice Red, are created
   by separate customers and delivered to the network slice service provider.
   The provider maps the two intents to corresponding network resource partitions (NRPs)
   internally. In realizing the network resource partitions, node virtualization
   is used to separate and allocate resources in physical devices.  Two virtual
   routers VR1 and VR2 are created over physical router R1, and two virtual
   routers VR3 and VR4 are created over physical router R2, respectively.  Each of the
   virtual routers,as a partition of the physical router, takes a portion 
   of the resources such as ports and memory in the physical router.<br />
   Depending on the requirements and the implementations, they may share 
   certain resources such as processors, ASICs, and switch fabric.</t>

<t>A network slice customer has the capability to configure customer intent topologies
   without needing any prior knowledge of the provider's network or resource
   availability. However, this approach could potentially create challenges for
   the provider in understanding and realizing the intended topology.</t>

<t>Alternatively, the provider can choose to describe the available resources and
   capabilities in the form of an abstract topology, which is then exposed to the
   customer before network slice requests. By doing so, the provider empowers the
   customer to build their customized intent topologies based on this pre-exposed
   information. This approach streamlines the process, minimizing unnecessary
   negotiations between the customer and the provider. The process and the data models
   for the provider to expose abstract topologies are outside the scope of this document.</t>

<t>The provider communicates the operational state of the customer intent topology, reflecting the allocated resources that result from negotiations between the customer and the provider. Subsequently, customers can process the requested customer intent topology and seamlessly integrate it into their own network topology. Importantly, this relationship between the customer and provider can be recursive. For instance, a customer who requests network slices can also serve as a provider, offering network slice services to its own customers further up the hierarchy.</t>

<t>As an example, Appendix B. shows the JSON encoded data instances of
   the customer topology intent for Network Slice Blue.</t>

<figure title="Network Slicing Topologies for Virtualization" anchor="fig-ns-topo-example"><artwork><![CDATA[
       Customer Topology (Merged)          Customer Topology (Merged)
       Network Slice Blue                  Network Slice Red
                            +---+         +---+      +---+
                       -----|R3 |---   ---|R1 |------|R2 |
                      /     +---+         +---+      +---+                  
      +---+      +---+        ^             ^          ^  \     +---+
   ---|R1 |------|R2 |        |             |          |   -----|R4 |---
      +---+      +---+        |             |          |        +---+
        ^          ^          v             v          v          ^
        |          |        +---+         +---+      +---+        |
        |          |   -----|VR5|---   ---|VR2|------|VR4|        |
        v          v  /     +---+         +---+      +---+        v         
      +---+      +---+                                    \     +---+
   ---|VR1|------|VR3|                                     -----|VR6|---
      +---+      +---+                                          +---+
       Customer Topology (Intended)        Customer Topology (Intended)
       Network Slice Blue                  Network Slice Red

                                 Customers
   ---------------------------------------------------------------------
                                 Provider

        Customized Topology (Network Resouce Partition)
        Provider Network with Virtual Devices

        Network Slice Blue: VR1, VR3, VR5         +---+             
                                        ----------|VR5|------
                                       /          +---+
                    +---+         +---+
              ------|VR1|---------|VR3|                              
                    +---+         +---+
              ------|VR2|---------|VR4|
                    +---+         +---+
                                       \          +---+
                                        ----------|VR6|------
        Network Slice Red: VR2, VR4, VR6          +---+

                                 Virtual Devices 
   ---------------------------------------------------------------------
                                 Physical Devices

        Native Topology
        Provider Network with Physical Devices
                                                  +---+
                                        ----------|R3 |------
                                       /          +---+
                    +---+         +---+
              ======|R1 |=========|R2 |                             
                    +---+         +---+
                                       \          +---+
                                        ----------|R4 |------
                                                  +---+
]]></artwork></figure>

</section>
<section anchor="yang-model-overview"><name>YANG Model Overview</name>

<t>The YANG data model in this draft consists of two modules for flexible use
   and augmentation:
   - The first YANG module defines a customer intent topology, with SLO and SLE
   associated with the topological constructs.
   - The second YANG module extends the YANG model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> by adding underlay paths to
   the connectivity constructs.</t>

<t>Within the YANG model, the following constructs and attributes are defined:
   - Network Topology: This represents a set of shared and reserved resources,
   organized as a virtual topology connecting all endpoints. Customers can utilize
   this network topology to define detailed connectivity paths traversing the
   topology. Additionally, it enables resource sharing between different endpoints.</t>

<t><list style="symbols">
  <t>Service-Level Objectives (SLOs): These objectives are associated with
   various objects within the topology, including nodes, links, and termination
   points. SLOs provide guidelines for achieving specific performance or quality
   targets.</t>
</list></t>

</section>
<section anchor="model-tree-structure"><name>Model Tree Structure</name>

<section anchor="network-slice-topology-model-tree-structure"><name>Network Slice Topology Model Tree Structure</name>

<figure title="Tree diagram for network slice topology" anchor="fig-ietf-ns-topo-tree"><artwork><![CDATA[
module: ietf-ns-topo

  augment /nw:networks/nw:network/nw:network-types:
    +--rw network-slice!
  augment /nw:networks/nw:network:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nt:link:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
]]></artwork></figure>

</section>
<section anchor="network-slice-underlay-path-model-tree-structure"><name>Network Slice Underlay Path Model Tree Structure</name>

<figure title="Tree diagram for underlay path" anchor="fig-ietf-ns-underlay-path-tree"><artwork><![CDATA[
module: ietf-ns-underlay-path

  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:slo-sle-policy/ietf-nss:custom
            /ietf-nss:service-slo-sle-policy/ietf-nss:sle-policy
            /ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:type
            /ietf-nss:a2a/ietf-nss:a2a-sdp/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
]]></artwork></figure>

</section>
</section>
<section anchor="yang-modules"><name>YANG Modules</name>

<section anchor="yang-module-for-network-slice-topology"><name>YANG Module for Network Slice Topology</name>

<figure title="YANG model for network slice topology" anchor="fig-ietf-ns-topo-yang"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-topo@2025-07-03.yang"
   module ietf-ns-topo {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-topo";
     prefix "ns-topo";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-25:
          A YANG Data Model for the RFC 9543 Network Slice Service";
     }
 
     organization
       "IETF TEAS Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/teas/>
        WG List: <mailto:teas@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        customer intent topologies for RFC9543 network slices.

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2025-07-03 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Augmented data nodes
      */
     /* network type augments */
     augment "/nw:networks/nw:network/nw:network-types" {
       description
         "Defines the Network Slice topology type.";
       container network-slice {
         presence "Indicates a Network Slice topology";
         description
           "Its presence identifies the Network Slice type.";
       }
     }
     
     /* network topology augments */
     augment "/nw:networks/nw:network" {
       when "./nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for topology.";

       uses ietf-nss:service-slo-sle-policy;
     }

     /* network node augments */
     augment "/nw:networks/nw:network/nw:node" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for nodes.";

       uses ietf-nss:service-slo-sle-policy;
     }

     /* network node's termination point augments */
     augment "/nw:networks/nw:network/nw:node" +
             "/nt:termination-point" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for termination points.";
     
     uses ietf-nss:service-slo-sle-policy;
     }
   
     /* network link augments */
     augment "/nw:networks/nw:network/nt:link" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for links.";

       uses ietf-nss:service-slo-sle-policy;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="yang-module-for-network-slice-underlay-path"><name>YANG Module for Network Slice Underlay Path</name>

<figure title="YANG model for underlay path" anchor="fig-ietf-ns-underlay-path"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-underlay-path@2025-07-03.yang"
   module ietf-ns-underlay-path {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path";
     prefix "ns-path";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-25:
          A YANG Data Model for the RFC 9543 Network Slice Service";
     }
 
     organization
       "IETF TEAS Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/teas/>
        WG List: <mailto:teas@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        the underlay path of connectivity intent over a customer
        intent topology for RFC9543 network slices.

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2025-07-03 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Groupings
      */   
     grouping underlay-path {
       description
         "Underlay explicit path within a customer intent
          topology.";
 
       container underlay-path {
         description
           "Defines an underlay explicit path within specific
            customer intent topology.";
 
         uses nw:network-ref;

         list path-element {
          key "index";
          description
            "List of path elements.";
          leaf index {
            type uint32;
            description
              "Index of the hop within the underlay path.";
          }
          leaf is-strict-hop {
            type boolean;
            description
              "Indicate whether the hop is strict or loose";
          }
          choice type {
            description
              "Type of the hop.";
            case node-hop {
              leaf node-id {
                type nw:node-id;
                description
                  "Node identifier.";
              }
            }
            case link-hop {
              leaf link-id {
                type nt:link-id;
                description
                  "Link identifier.";
              }
            }
            case tp-hop {
              leaf tp-id {
                type nt:tp-id;
                description
                  "Termination Point (TP) identifier.";
              }
            }
          }
         }
       }
     } 

     /*
      * Augmented data nodes
      */
     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connection group.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connectivity construct.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:type" +
             "/ietf-nss:a2a" +
             "/ietf-nss:a2a-sdp" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for a2a connectivity constructs.";
 
       uses underlay-path;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="manageability-considerations"><name>Manageability Considerations</name>

<t>To ensure the security and controllability of physical resource
   isolation, slice-based independent operation and management are
   required to achieve management isolation.
   Each network slice typically requires dedicated accounts,
   permissions, and resources for independent access and O&amp;M. This
   mechanism is to guarantee the information isolation among slice
   tenants and to avoid resource conflicts. The access to slice
   management functions will only be permitted after successful security
   checks.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>

<t>The NETCONF access control model <xref target="RFC8341"/> provides the means to
   restrict access for particular NETCONF or RESTCONF users to a
   preconfigured subset of all available NETCONF or RESTCONF protocol
   operations and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   to these data nodes without proper protection can have a negative
   effect on network operations.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

<t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>It is proposed to IANA to assign new URIs from the "IETF XML
   Registry" <xref target="RFC3688"/> as follows:</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
   registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   name: ietf-ns-topo
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   prefix: ns-topo
   reference: RFC XXXX
]]></artwork></figure>

<figure><artwork><![CDATA[
   name: ietf-ns-underlay-path
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path
   prefix: ns-path
   reference: RFC XXXX
]]></artwork></figure>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank Danielle Ceccarelli, Bo Wu,
   Mohamed Boucadair, Vishnu Beeram, Dhruv Dhody, Oscar G. De Dios,
   Adrian Farrel, and many others for their valuable comments and
   suggestions.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7950'/>
  <seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>

<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='N. Bahadur' initials='N.' surname='Bahadur'/>
    <author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8345'/>
  <seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>


<reference anchor='I-D.ietf-ccamp-yang-otn-slicing' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-yang-otn-slicing-09'>
   <front>
      <title>Framework and Data Model for OTN Network Slicing</title>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Yunbin Xu' initials='Y.' surname='Xu'>
         <organization>CAICT</organization>
      </author>
      <author fullname='Yang Zhao' initials='Y.' surname='Zhao'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <date day='3' month='July' year='2025'/>
      <abstract>
	 <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and
   defines YANG data models with OTN technology-specific augments
   deployed at both the north and south bound of the OTN network slice
   controller.  Additional YANG data model augmentations will be defined
   in a future version of this draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-yang-otn-slicing-09'/>
   
</reference>


<reference anchor='I-D.ietf-teas-ietf-network-slice-nbi-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice-nbi-yang-25'>
   <front>
      <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='9' month='May' year='2025'/>
      <abstract>
	 <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-25'/>
   
</reference>

<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'/>
    <author fullname='P. Shafer' initials='P.' surname='Shafer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <author fullname='R. Wilton' initials='R.' surname='Wilton'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8342'/>
  <seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>

<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='215'/>
  <seriesInfo name='RFC' value='8340'/>
  <seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>

<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
  <front>
    <title>Common YANG Data Types</title>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <date month='July' year='2013'/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6991'/>
  <seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>

<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='H. Shah' initials='H.' surname='Shah'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <date month='August' year='2020'/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8795'/>
  <seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>


<reference anchor='I-D.ietf-ccamp-otn-topo-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-otn-topo-yang-20'>
   <front>
      <title>A YANG Data Model for Optical Transport Network Topology</title>
      <author fullname='Haomian Zheng' initials='H.' surname='Zheng'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Italo Busi' initials='I.' surname='Busi'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Oscar Gonzalez de Dios' initials='O. G.' surname='de Dios'>
         <organization>Telefonica</organization>
      </author>
      <date day='7' month='November' year='2024'/>
      <abstract>
	 <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-otn-topo-yang-20'/>
   
</reference>

<reference anchor='RFC9731' target='https://www.rfc-editor.org/info/rfc9731'>
  <front>
    <title>A YANG Data Model for Virtual Network (VN) Operations</title>
    <author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'/>
    <author fullname='D. Dhody' initials='D.' role='editor' surname='Dhody'/>
    <author fullname='D. Ceccarelli' initials='D.' surname='Ceccarelli'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='B. Yoon' initials='B.' surname='Yoon'/>
    <date month='March' year='2025'/>
    <abstract>
      <t>A Virtual Network (VN) is a network provided by a service provider to a customer for the customer to use in any way it wants as though it were a physical network. This document provides a YANG data model generally applicable to any mode of VN operations. This includes VN operations as per the Abstraction and Control of TE Networks (ACTN) framework (RFC 8453).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9731'/>
  <seriesInfo name='DOI' value='10.17487/RFC9731'/>
</reference>

<reference anchor='RFC9408' target='https://www.rfc-editor.org/info/rfc9408'>
  <front>
    <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
    <author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <author fullname='S. Barguil' initials='S.' surname='Barguil'/>
    <author fullname='Q. Wu' initials='Q.' surname='Wu'/>
    <author fullname='V. Lopez' initials='V.' surname='Lopez'/>
    <date month='June' year='2023'/>
    <abstract>
      <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
      <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9408'/>
  <seriesInfo name='DOI' value='10.17487/RFC9408'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>

<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname='M. Wasserman' initials='M.' surname='Wasserman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6242'/>
  <seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>

<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
  <front>
    <title>The IETF XML Registry</title>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <date month='January' year='2004'/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='81'/>
  <seriesInfo name='RFC' value='3688'/>
  <seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>

<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='October' year='2010'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6020'/>
  <seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>

<reference anchor='RFC7951' target='https://www.rfc-editor.org/info/rfc7951'>
  <front>
    <title>JSON Encoding of Data Modeled with YANG</title>
    <author fullname='L. Lhotka' initials='L.' surname='Lhotka'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7951'/>
  <seriesInfo name='DOI' value='10.17487/RFC7951'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC9543' target='https://www.rfc-editor.org/info/rfc9543'>
  <front>
    <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
    <author fullname='A. Farrel' initials='A.' role='editor' surname='Farrel'/>
    <author fullname='J. Drake' initials='J.' role='editor' surname='Drake'/>
    <author fullname='R. Rokui' initials='R.' surname='Rokui'/>
    <author fullname='S. Homma' initials='S.' surname='Homma'/>
    <author fullname='K. Makhijani' initials='K.' surname='Makhijani'/>
    <author fullname='L. Contreras' initials='L.' surname='Contreras'/>
    <author fullname='J. Tantsura' initials='J.' surname='Tantsura'/>
    <date month='March' year='2024'/>
    <abstract>
      <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
      <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
      <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9543'/>
  <seriesInfo name='DOI' value='10.17487/RFC9543'/>
</reference>


<reference anchor='I-D.ietf-teas-ns-controller-models' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ns-controller-models-05'>
   <front>
      <title>IETF Network Slice Controller and its Associated Data Models</title>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Nvidia</organization>
      </author>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         </author>
      <date day='7' month='July' year='2025'/>
      <abstract>
	 <t>   This document describes an approach for structuring the IETF Network
   Slice Controller as well as how to use different data models being
   defined for IETF Network Slice Service provision (and how they are
   related).  It is not the purpose of this document to standardize or
   constrain the implementation the IETF Network Slice Controller.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ns-controller-models-05'/>
   
</reference>

<reference anchor='RFC8453' target='https://www.rfc-editor.org/info/rfc8453'>
  <front>
    <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
    <author fullname='D. Ceccarelli' initials='D.' role='editor' surname='Ceccarelli'/>
    <author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
      <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
      <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8453'/>
  <seriesInfo name='DOI' value='10.17487/RFC8453'/>
</reference>




    </references>


<section anchor="vn-intro"><name>Relationship with ACTN Virtual Network (VN)</name>

<t><xref target="RFC8453"/> and <xref target="RFC9731"/> introduce the concept of a Virtual
   Network (VN), which can be presented to customers. These VNs are constructed from
   abstractions of the underlying networks, specifically those that are 
   traffic-engineering (TE) capable. While VNs share similarities with RFC 9543 network slicing,
   they operate under the assumption of TE-capable networks.</t>

<t>Two distinct types of VNs are defined:</t>

<t><list style="symbols">
  <t>Type 1 VN: Modeled as a single abstract node with edge-to-edge connectivity 
between customer endpoints.</t>
  <t>Type 2 VN: Modeled as a single abstract node with an underlay topology, allowing
configuration of intended underlay paths for connections within the single abstract
node.</t>
</list></t>

<t>The topologies for VNs, including both the single-node abstract topology and the
   underlay topology, can either be mutually agreed upon between the Customer Network
   Controller (CNC) and the Multi-Domain Service Coordinator (MDSC) prior to VN creation,
   or they can be created as part of VN instantiation by the customer.</t>

<t>In the context of network slicing, <xref target="RFC9543"/> defines
   a network slice service as a collection of connectivity constructs between pairs of
   Service Demarcation Points (SDPs). This concept closely resembles the Type 1 VN,
   which is implemented as a single abstract node.</t>

<t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> further elaborates on network slices
   by incorporating references to a customer intent topology based on <xref target="RFC8345"/>. 
   This approach aligns with the ACTN Type 2 VN, although without specifying the 
   explicit use of such a topology.</t>

<t>Consequently, the data model defined in this document serves as a complementary
   option to the data model outlined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
   It empowers customers to define a customized intent topology specifically tailored
   for their network slices.</t>

<t>Reusing the Type 2 VN for defining customer intent topologies alongside the RFC9543 network slice service model would result in duplicated information for connectivity intents (SDPs and connectivity-constructs vs. LTPs and connectivity matrices), and additionally, would bind the network slice solution to TE technologies (as discussed in <xref section="D" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> for VN Type 1).</t>

</section>
<section anchor="data-tree-for-the-example-in-section-3"><name>Data Tree for the Example in Section 3</name>

<section anchor="native-topology"><name>Native Topology</name>

<t>This section contains an example of an instance data tree in the JSON
   encoding <xref target="RFC7951"/>.  The example instantiates "ietf-network" for the
   topology of Network Slice Blue depicted in <xref target="fig-ns-topo-example"/>.</t>

<figure><artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "example-customized-blue-topology",
        "network-types": {
          "ietf-ns-topo:network-slice": {
          }
        },
        "node": [
          {
            "node-id": "VR1",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "1-0-1"
              },
              {
                "tp-id": "1-3-1"
              }
            ]
          },
          {
            "node-id": "VR3",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "3-1-1"
              },
              {
                "tp-id": "3-5-1"
              }
            ]
          },
          {
            "node-id": "VR5",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "5-3-1"
              },
              {
                "tp-id": "5-0-1"
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "VR1,1-0-1,,",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 60
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": ",,VR1,1-0-1",
            "destination": {
              "dest-node": "VR1",
              "dest-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR1,1-3-1,VR3,3-1-1",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-1-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-1-1,VR1,1-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-1-1"
            },
            "destination": {
              "dest-node": "R1",
              "dest-tp": "1-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-5-1,VR5,5-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-5-1"
            },
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-3-1,VR3,3-5-1",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-5-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-0-1,,",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              }
      }
          },
          {
            "link-id": ",,VR5,5-0-1",
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          }
        ],
        "ietf-ns-topo:service-slo-sle-policy": {
          "sle-policy": {
            "isolation": [
              {
                "ietf-network-slice-service:service-traffic-isolati\
on"
              }
            ]
          } 
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="R." surname="Rokui" fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <email>rrokui@ciena.com</email>
      </address>
    </contact>
    <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Microsoft</organization>
      <address>
        <email>jefftant.ietf@gmail.com</email>
      </address>
    </contact>
    <contact initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </contact>
    <contact initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source:
H4sIAHCnfmgAA+19aXMbR5Lod0b4P9TSEc+kjYYkSvIBj21RJC1rQ6K0JEea
jfF4owEUgB41ujF9kMJaer/95VVXHyApjdfeeWCEFCRQlZWVlVdlZWVFUfTJ
ziSfJtl8pOpqFn39yc4nO1VSpXqknp5c/KhOdXWVF2/UeZpMtLrIV3maz9fq
Pw9Pn6jjuIrV83yqU+wVj8eFvhz19fAbT/NJFi9hiGkRz6oo0TBypeMyyrhv
VGLfqJK+0TrO5tHdg0928Mt5kderkbo4OTxXr+FvwF09wc9gJnGl53mxHqmy
mn6yk6yKkaqKuqwO7t79Bvt/slNWcTb9rzjNMxh+rctPdlbJSP21yicDVeZF
VehZCb+tl/zLJF8udVaVf6MZ1tUiL0af7CgV4X9K8Sz+Us80IPEsqfnTvABq
HqZ6pk6mc82f6WWcpCP1lpoO06Qe4qwfzfHjIYzSAvqsTkr1fKiO8gyQKuLS
g32hAXieJZM4AJ5Cl2UyrzVClF7LukjSNH9U2S6do53rYp7k6rFO86pKvKFO
8zdJOAo3HY656aMMG3TCPEwWdaye1LkH7se6qgt9pZMAZIwt53V+HU2eVrBw
6nFd+hj+VMdNeAm2G46h3aMFfcvQkNWBLMm4rrqW8Uz/d6zO8je1D/0o0Vk4
/6LAJo8m+EUnlv+uZzN1EQPX1EXsgXqeTIq8zGdVAO7v0Bp4srp27sDY6nGx
LoHhPaBPs2lymUzrOA0p8F9jbvpoHS/yvBPifySZel1vpuQYmGd4VTfIGEWR
isdlVcSTCv+G9oeZOvvxSH3z8MF9JVKsSIrVBOQvX+pCLeM16JgkTf5bqySr
QKyicVzqqRI5T3QJvxI0/XZV6LJU8F9eFwAEftHFZVwleSZ94bdSXSXVAmZR
LbRaFTnQQReflWb8IYG6WEBXi0Q01bMkgzEZiD90DGJyZRsiKjDqP2pd8nqV
i7iAfgajUs1gPWbEzqAlskxPGKVqEVdqEmdqrNUs1W+Tcbom2KicpgQKNJCM
A6SYDtXhdJpgZ2i1HuBk1mY20BRoAZiWyaVWqb7Uqcpnitg45xXPL4G0dQYz
T4G+SCUk+iquFgF5gjVhygh5QM2APq5RzampLicgH0gNVvFT1NpL1No0X1kX
VLl2WZmSBMyj5tUimSwMHWpeZaWzRZwBdoiQ5ZbQXpzzBFjbAe7lSk+SWTJB
GACu1KidawAdl7bn1SJPdRmnWpUTEMoiyaHR1ULDyozzamHQWjviy3pdJtVa
8EeuYSQBX5kmrA10YXZfJtNpqpHZPwWZA+pPa1pwYX+DiqW/cGNpOT5gcsTg
EpZZFjIlhgQCL2OGiXiO87pCSiWFWTxv6mOYxlUyhcnFlyCoMcgpzqU5uQEv
MvKB4+wBIjCLJ9gFeLJ0S2mwF74vwfpYccCljNOS5ZOlaIMUgwEudLxMsRXP
AdsWwOIqX4FdIlkZqtcLzbOVEZGxDOlgrqsVWGRiPJo34+kNJMISswiW2MuI
WNlkUK+bx/5PWTpwHUDOULZ8QQF0BhvgAD/H49QjYClSsFl/wVczQBQEASjA
6qmlhkRzsPMA2M3ArDPVaI1jXF/+s4EyQIAPp6C+M9Asj40mQcLO6jQ18JDr
WHVYFEVHIcwqWWIHHGmpweeZlpvIwBo7K1ETkvZzOtKuTIl9UBEyt6Z6CL5g
oREDWkTXR9gByQVMdZnEmxZA9Ivo5hjta9kkxwQY0WpeUHHJjKhf4SyRWgVA
qK60zryvAgWBEwAvclIFCrUEG+pr06N8uSIsYPkbGJD4TfU0IRNA6xDB0Ive
YQQhIex0lcPMYQkaYFmzdOjiJoUAqxoWGIkdCwt4jPmPOik0ObkDYCYgAEIs
k3mGahccE6UBMzBVE0ArA7mvSL5JamTYoSjBI5FBMB6LehwB+0TlKn/TMD5W
SYuKXtZplaxSz1GgTmx0E9RP0zU4LIALmEdDMkQBOAOwhinhaNR0QJxArGv4
zGlKXiaQCDByODts1Ue5Na8ZYA0cWFTgXakMjGCpIpAuJBqKNzoh2Zz5Kk2Z
KWi6jDVKD34GFojEzHWhjw3OAFLmxOzO8AxLgwJ9A7aMDAoJvQYaiHQ0fBEa
n3s5f2TojDxLqDgozn4kqKXiaeILJ65MplE7+MtseEVsczVE7Um6JC6rAUjf
ItGXOD1sdgnmOPPHiUt0h9n6w25tDiOHrqsTkF7py+t0Csw0QRcETRfLNvGr
BuHDT5BgVoCUBqSYkWhhzJIA7QfioTDMFChAVqse4waxSmDBPRIB24MsgMM/
WXu246iPd8BLBn4mkQrmIoayYWHU2FPSrJ+t0QXfS0/AZ4J9HaFHzhAslHUY
+zw/aDyPZaPgHMhA8VvPCngH+fcGOi+Q44ExtOCnpOJTq19//QEcO/Tr3r83
auGwX8rQ9xSH3BvGNP+sNIYZWI2d6iSbpDX4xStyux1Y6zvhbHCjga6KIkPr
KeRA9ZUKdBUs9Sxhlu/cStjxL0hXJbQkSZYsa9pPOZc8jlag0gojgW+y/Aq8
urm2rBhIkmFEM9LAuqYVimpSOhPjzw1dVC2MSr5RQ1iYwQhWQ+WKV43LZXz8
rvXi/ZJPAKDWCtW6OJgp2hToR2xHsRSjz3rXWFw7nh1ogDKNRQmCHoLGOBmQ
ZlwDkGawaDxXtx7gPE5z2I5mhqHCPUsi3njXpmWgWORynOm/wUy/+ubh3ffv
B6gwA9dqsxWl5WfYvBcikZryKoGjVlpD4O+XCvBVedSv7z94iKOSb+cPVfrO
Itol47/KgkXCX+O/0xLDFPfOn70o94mYYRuAAm3YscZWJ+U+MxU7Rc630UY1
dUhcc/GYJdxeUVtx9SZKxohYK+bNeQGbC8f4njYDpO3GaCDeDSw8UcT3cblp
SSq+0FUBdgXkmaxcU3niqIYSw0Ats++D20aSKcbVbeoVAZvnoOsr3pGyMQlc
al4LEqEkQ3Ynn71jvy66iR0pclTi6d8BkcC/slznLJ8Tk65l4ZEjmrgZf0Da
H2aeo0Fe5peG9dhBgU/JBA5UvZqyoOHfnjWLiLhCVu22Y4AMUVy2R8/Q/sdz
Gok8GAoHW3PES+S4APdiNIWqWAc6CygjLlJJe2vZ+fa4kE05y9CWguugS98k
kerAvQUQUq9AEpFnYdWsSasAzcxsEkUMMJSbC0laXGSEBOYMDAP2FPlnj60N
Nnj68s7zl8/OBwr/jy5eMtAXF6cDosPr4+dAyAp91H3gD+RJEGlwbAc+83mC
AksKKtTQfVaAprf8Vq9Q/ZF3Yuexjuzcmrgz+WFZTWyAgIDieRodU1Axmkzi
5YqD6HmVRdLx/Xt0PXkDNUUVApwwNetwzu6juo9kBSNhYXGYvoxs5KKIGAEA
J46ArA8uL0gfB6lmm/YozI8dO2XjrwAFkbpEKxGPpoDChMxmegZiTJ6u88MI
GU9luShgm1o0Q/otPI3IxgnR0BjKkF894CS8voVC3QbyYPdNpx7uz+MsnjOO
eEICNAK2PizAl4a1p+Di3unz48N9Z0kOxLP69FP1Z5jtERg4dbhaAY4SBZIl
BOf8oojRcVUnGcix5p3d3sXJfsSBC+uKlqAjwD1+hmwf3b1zj+00BV/2iMef
vx6oY2Dy/d44APlysNywuSV1BS4+SVp3ULg0EncJ2zXAw4Ur1cWJSHqMm15c
0xp0yzIvScKFqTgSSAOJoHgqPi7mmtWDm0YOwwC+06E6hQ0cQEnB4g5gE0Mu
HfuKYEdjmhCo0ixyfUMiWU3Au1dn3Si8XeoO/gaIoBHTWpvYp+/ntOI3ho1N
XBJwXalxnaTsMiJMUDOwVdRXhiLiOfTFVM3WYA8FLalElSZVjXjCvqkqYV1j
DhK5wCWwMSzmLEnJPrMpMoFBVv4oRMb9M2OwmUKjyrtP5FOPUe+pkXqOG34Q
swzMGdoKi+1rieOSRZOtQ7Ve0XTNomN7s+QbnE7c75a03Y5T4067MPHSYVAR
1KH6CRbTY+4j3kRMyHiDug7daXLtbJzypVFgGnZRsIOMhMVh2dlyWh65w0OK
P+n7GxUtuddZ1NwRuOA8prftLc1GkGMYbtJMhAj3PSkqcFkb2wAGQoCweQIr
jn6xcTDIJL3RCGJVE0+AQarELAcLeAALeD5BU4HhHrdhPHLW2VvRc9bMnnGf
1AV7oXKSwNNvcFfq+R7ZLZUzO9llyB6e2zclb33SH+MDWqBMGNmiTZiZz5mx
Ui+hBfmAoJ7PXu7zglo6C2tMcWsf4DGhaEMCZmnteeQAAXURYKBja4HRiciY
f/TbGA3ZAD1dn1A+nW5JJGQvOl8wKFtsEmN6EVN2YnBFN0UIxhoxYKXGRtUS
bhlDlwJX0dHy7OVA6SGY68SYZ+LjNBWSL1th1ldnPxIO6tn9Vy9Ph8CNxNqi
YY02ZIef1KWvxTAE4M+ODvGs/i2J/WBxzHr3THLQcMJhZQP0Ce/cjyED0iTo
aGBWFL7j8zCKsQZudzxFwwNuAIxCNiZNlomVXhb8GNxqJEOhw9MAVDJZimyW
g3SCuedAYm8wZwE7MtlAZGBA7Kbh/PhlaVjvx0S2NmO0aBu2xms0oOJCAs8l
0MBGIlP/GExMoL8SgY/OZzy6KuV0sxN3+Ar5fe1GL/WcPKc9ZKeBM83iioPb
gEfuV/ElLJiuJvvGb7rQxTLJfPfzNJets6eqZrnZrldBe8RVgijNvYQcebTd
Sxdl4fMbaATCjZF5aYrORJJ5nmXUMOJ7p+f7/d+aTW9/CzlYVS9lSTbAsq49
DnrUOWqfIgw945CCIW2QDHQu3HSXAxrYGOtTZjyTTjQygQl0EawOE9BNrevF
Haao3tnIsTNu4XQGzBwD75n9l930h1SzcDzqAZ8g/Sh4aeP/oWX6zIZ9gh2N
cofpLgZjaHIomRebiQEGNpdj94AYQpzO6Vo4dtoc1DQw2gES32e1vSwY9KHM
xi0l75hiRCZ1xCHLUTDUYLKF8CIIAwvObHDdOYWL5TamOfASENxRt6MtNCWX
OqpX12xOG8zUWg3g+s0LYQ++ze7v/Cg8gKdPl2AjyN+ZdXMkzZCD/Wtf61gK
WN1WaK2Ok3gOLpxRZvjRlD8qu4VORJVZQ3Shp8bMJpl3oHfdFhgGfAneZvKW
w8KU5HcKNkWdgt0u3U40GGxACUik0GnbzEYIpZT9HW8vzZFPPnFC7bHiwaZi
l8jSYBQ6LqbyHR405RO283yItzCn6AUHs8n40aYdLDgH0WGwOkXzC9xVLvKr
jGPjVTyOZMTSnWe8kynTrwTnOXVXrZ93oCflqN99xjAi++P92vXT9bXAUOjM
yUDk7lGIB3ZMQM0GHrx2X37zzT2wQD4eeLhV+TDw79vCyCrbKHA7rQw0YHA8
vAHj6uNhVDIVA6PSre4hjK++aeNRRhiNcHiUkTljky/s2sJu+y/w48F1MHBc
Hwb/3fjZBEM6lk16sCtv7JOB8Z/wE8D4daQ+9dlXUVLvd7tWWlHcjtoiwaxc
7r5HZkfIJ9OkQkOWVxrU28tU4y4QrFmKMX5C3UgZIZLVyzGa3BLP2I35Ca17
Awahfh2MWwfo7CDL/FJOAECvadaSnIeMczYpC4Hzd9iwjn5UYUPKAPUltcVu
hgHS8k+SrHEuRLOPa3JmTWqUxeTKAQKpVLvBpHf9I9SWJyVG6jU5/R34oJ41
WxoKtsZJVvruAQ+ighNFxIIiZ55LQ6cfAgcPQxsE9JMD10H0FLF12l5IEKDg
0OU2uPHKQJeD5uZYvpyoeJlo4upGz+hg7EXn4VnQhkCctA/QTCgObHNKTgqG
K/OaI8t51jiuCc7um9wxUO4wgezdwJzT0LkobTAkPYyyfdTexcvSbljOdMqI
LZKVhEn7QrtMAuORhP54K/jdiFPzTg4mN6YGJlGDw2VJBrY5oTV2SYVssEOO
MudBxl3rQ7WZQtY4mPYUNOifF7ylQ2ASljXuN0aor4XVOAvBYxDsYfQFcyIn
3UkmJUWRmHGbsbqOQ5kNDiQIVZpzYpikojQOcvwjwv4FPzy6OFWvJBnJzv3V
aWPLxc1OzfF3S+V889X9e6hyxFfn09N0FrksPdyH4zQl86+V99uVO7t3garp
Hgy8z+66Pa4hk+kF9Jndw4il6X9A/cW1uzhBDIpkwl3gT3sKrmZ1JtnW3S4q
cQ0sqgHaxqLAPCpYTov3TaY5BK2hYYzLLKKkA+BM7LXMaVuL6+ynlr7IvPSv
BcxhoCQI0JecYZK+O0nsJVWBIrJ4G3KBZmO99uxExRVfcmCfPPYZNp5neQmS
ZAJzGISoEraxQGI/JsNCwdIkMVPKvi9lroarDld4Agvu8DFyzUeco8H0ecsq
J5pWP+ElIRUnlAKFdvuSUgzLPK0Jow7K0KLDH4ait2LHlkp3ycGdp1ne0aNg
3jh4NBkiDmUvZeoDzh9pcwv7DcroE2Y1wovnJIDoB7KDl43S0GikmJ6SG1FX
5UKn6YhugjROVstB27zg8g3kuB7TZmyaPe1EKSJZuewqk4bPKTbiG5GIBdlr
rf2vn7/c2LMP2oFdd1xV0YbUZvx7G8vu+JmfXBRq11us4LeGcsimzLB9NAzV
9h+Zip1ENBO8d6MJEpd9jEpxdm1eJ1NON0WlMUEtwETKJSfoN13ggZI4+O3m
P/AlsEVuTxI7XQQzg8OqiicLUj8v0ZkEb/bw5b7vE3rG8psHd78Gum3KojNZ
/b67765/AST/LNqGDpv+uzhZJkeC8jhxsDSho31JO+meQUlTwGPq8NTd2U72
XY2+5nRqjkpCx2AHt4yBFS6TEq9X0FUce4IvDB+EMcd6JlJj8wS7rXcjG9qX
HG+H4m8GPQ+16YevOIEl9uLEHhBcdGMDApLHcn7JOQaTZJVIYlTlZxQM7fmi
l6REt1CucmPBOMHcnpWu6gJNc+PmzEQXuGP0b11NguQ7OZ9kLIN1EF/Ynu5s
dKBzTE4wx4re2Z1JLXIXjEgtmvUJUwqH6sfgAE+MPEcfDaT+3T2v6DNMpbvw
NmsiX88u5OjDpBSbhBCQZfQQKsraN6FAxldSeMnXdRAJyktvC2gj2TZWYwLJ
KBE2zN9KXWZ5AprTig7VT/mVtrdtzB6kZPKhVNg88xmexI71OuccZd6z4Im/
bevFckgTuavdgVLyjtI8XSJKpIvvKSJfcv4bYjnX4JO4jVIQRWjvZf2QylC9
aESSS38DDjtGJo+k0O3FZZ+q78udw0woj8Nlo4hpJ2+FDZnuoYtb+DpbFCZ9
FmTUUgJ4kqY1qtjK4AS8zKl2kQ8F58pBHuO0IkU51s9rPc7fOn+TryLlVcV3
S2wqidyucTre7ny7s+baJ3af7Pxf+JHDiy9crPqLVtTT/1Lav7O2GH5tR0nd
l7Y922zV3d4WHfDgP37KZu2LFlrvhHeVD999ZBp57XEbgIxm2xPQL3zAXnv5
3J9vs0nHNN4FTW1krPlH8MHtoRNWv/QgPqSfX+h/SxiQnaCht5p/cgs1ChYK
ZQx+beI9cqs4ahP++9axx8gtrGvfP0dMNTPARjdhzNHQ/owMO2McvVvyTES9
rfgweE6HYzJ+V3bmabiBNLE3vkTlxd5MxLG5M2fBdCHn/qien3W81HHGER3P
oSEgXfm3HfeVxM+p/KyWQXgRLQgWe0kR9k4nZ8s5O8CbhX7T691hc1esYjIR
RDM8OuXdTtza0FAqVzM/gRGQbCV7QYTsovFkNl1qUqLQT8M5mhUUx5i7muW7
itfk9dO+htPafDssS+BdFRDj0F1KoenLeLRbJvNFZcHRvZsGEDYBMFAzB85c
2FjFSUEInHtZAcd6GRcTz+lBl/wYQ9SB5QlviNH9u558HvH/MMsMKyXUBRls
d69pvKbiB9k0qvJIoy9SAxjZi/BpNQUvTTQVIzsS+rWCsMmd60giNXtHlq9A
LMrWsTJNja5W0J58udRT/JauqC6XCaU2olV3ItaxnkEqFwyPmV4ehx2mlDrA
1z6DZeZrvbzAQRLE2BM0lPNVXnEWbJdYGiWzQfYksGVhhve0TR5T7/TlHgBe
tXb+DqGNeoQSHvkGDbuZtOsgTbXKc75XZypn+NM01wsCcrhCC+xIdk1YvGQu
20HX4+MpxgYpWBGoNLeRwXuU1hH2jwjw5tpCNJthEs5qt1ea7eVt/9Y+bQD4
+qC7qu+nSmiT8ennIqARknPkSL6meAHs2VrhdEyvwCPIQE2xrX2c1nwPNvz4
TE85uOTflh+v3b3a8BaXRGFdetHm7Kn2zUJU2rxPxQkYvKkwhn8k3a/OS9Ln
csfNpNika7JOrNtd/mQvjAFt/swVb39XmZS2aIklAS2hsKN/ixQkd7Eu6XRq
qiUWoC7c1XFWJGBQkHqvzu4RoFdnBz69ORxn4XBrdXZPjgd7gd0XYA9uAOyA
DPVKyzVyQPIEdRiLpcRx+HhJ4A9YEq0FNRGeEDDwYPxGs8wW1M7bl3t0MseB
2KqU2hLLnG6LdYE1h9fHTZsZmElzkdbm4saysKhTaAfOIsrWRuIVHTix6s2x
OMrh+dMjOZYtQdNDg1k8hm3osCc7wCqhhUReJvEqdirC6PjeywrmyNKkZGPo
lqtvrCX9zl0mbsTYXK0jvg3I02LN7JWFCTb/QToymV9rIlB5EwepyQL+0tnc
8+iCQFPrBrBzqYzYeVFq68Z1GbUALurxySLPSwnbcoiM2nQl/cGovLCG4omn
4/NiSQakI9/QWH++GJI1ciXDc3wJAIZr7grkYD2JnM92GnPRyxVQvSjbII2F
kkCQKwXVlX7o3NME+VRHgqwoPpsm2Uw1dwV4SoPXhO480fV1Xif0qCS5XKwl
34cl/Xqji+s28RPB2G+9UAZbTQmG++ngku/ZXJtEdgsgCZiYI155Z/RJeQEm
x0HgfdQZFZLgebfut9pE/17XsHF9ptcFkdsRdBvoQ0h3Xo9LZCSsjNMMnRqS
eh6TnvbnHvF9cFhv6JOyIzAno5XIHXtmNfQm2nH5p5QGGTMaRONgn9s7m0Bs
yfGc1AUWmtiwP7la2Ks47Uo9UmIq8ANNhQRXm6bn9ByvGODG6cq/cm72FfWK
0IfNdQHbmIVTRiWXWJMLNvbg6fGQfC+m/7+fvzilq8hTE6azl8HNwUVAm+Z5
MrJ/2wsjFLyYmVdQxIY59p7rYq6n+y5G0d/Ggulw+Fo/Le/PDx21f74I4iXe
X180g1rBDyergpOCSaz89zvwfySl9R24QO/6+t65wbjtXgZaX8tfgta/BL/+
3JhQB7KmdRhqasSgpPkD6nkdQhshNRDqwNn8XAZgLjt//cUB6R1HdfwV4tsL
hKf96uyht9bg5BrygYv6rgNIiOptFt31vI7Gm366Fh1cdIf1/XZYsevHNP/y
Jot+/U+46B0y/1S8K6sZNrX5WM2wWTcEw5eGih//c4NR3V0m1/jIeVOOFMG1
Jf/WkqONBebKSmKYx2TcHWspS+k6tKk5wu3dALdl+N/DcDkDzG8wOflxBDHC
dTPa8M8d9+sGVd0hcc2GFoV773yErhOPjx/vIBjvQY/BuAHE3p+fG2A+cG2+
bK1NS5SQPw6QNR7gf1+2xr3ByA1+VP+z8ma26F3SQDu6MPGYO3XKVRvUTYne
otpNm3urJS7J7yJJ39EPuRbfmZ/Au+j8+YOyvbg5tyGk9yPjhidtjSCnOWZr
lBQwjGYu5L4KYni77xVf9DB3WvAewCXuFPRVs9JQV+UWyjiVrEo+i+HUGLwa
w4WfpT6rrXBDwUHvBgcfOEZ8DTYpysqWNcKbYnxGsek2iaTseXmcPEz7cltw
D95dlx56CJR4aXwaYOBXMPMKLn1cYRw6tOHL5bYuoalH6LZJ3de7zY7stbv7
7/AaSEjH1k/zyjUg4V2Gq3fF2CyB4Rx7S5MjJX4+m8l5N4VkpZ5HeOIhme3F
PM7IvaD9qQmZesUfeXpS0sCeADRrKctxhUscad13oQgY1Vm2CdcB7YSyRYxF
qyRYweDszj6sVJZUtmKxDYabgqntGrgOc1mZ6LqLNSM5LPLK1eFyNHiWI81y
Lir3O/2KD7e+MUMADZEREZv2jTmgmkNgKLSuQqk7NdQFRdDo4lKh/oEqpGLj
xXWE7HGcOcyny7TnxHx1oSUDqufNi74erPBYEkfBFcEdGEzUiLqTXY1M7SHv
d+9Xvqc52hFdWtirYiyZ/3Y9ML/vXpnm0FFHgH0yWe//sOPU9GjPXLPdN5++
M/1Mt0qDvoZl/sHqd3nGQz6PCj0LQLLu2/cMhwAUNgvxCe0Lt+QIMSX346ig
E2B1uxoiqC4wdhJ81yQaY1m2z9Vf5U+k799aPZqdKMHX/nAKYLX2Ztvbs86S
yjXoQt/vdBnDHiO6wZz9TsDhWCYZ1EdE/Wl13If9HYkUP6jwpwYp+/JBDw39
M4cfrqGEkKGqgxEQ/P2D7gXs5gPXAIOPMNjn4Ze9ONiOSZlzsPPzW3Zcxm+j
fDKpV1jHiqtw/iBz+LqnC6rsyLt+0uUzhTJgrzr1N+WqhYBqjwfWaEXs+kNP
W/ODN6dJt8AvhPQ0Kf+OKhZ0aXlDHQXKb6tetuqlp+NWvWzVy8eqlztZNfIc
wYicwK3O2eqcno5bnbPVOR+uc6oR7j+36mWrXno6btXLVr10q5dmjNsP+UQV
xockyu2Xamu9d+BiY1yeqRV4+rMJur7EMge3iz4FRa6CMJSpRDUKw74m8cZ9
H3wekMu1cU8TRfSQa9n/VQ+EUMd53Uk39nXqVJA+0E5hcQ2afOibgZB0AQ8Z
koFMkNhG3zfsizEu0i6Zhv1pWHkaApQsvnfw9m8t9U8f+3i3tIIR3AiV36SK
FvkK8RnnearjrNVwD1l5/4eWWhntoduNvfd79BN9n5AWFCfdm5MHB03pJjj0
vcBhw9sNp1p1QLHzgG8T0ci4VVgxjD8qZwdP+dgjjj7O7wNCYnAd5/fKVls0
tpy/5fzfm/NxUXq6xgdx8EdUTldbkdmKzD9FZPr8tmARNztwwUE43wxWfmYC
phSIM+fXkm3nDLvMGi9t+E9HL45P1OOTJ09Pz79XM6wIsus7l48O7h48jO5+
Fd29P8Qz+l1zYxjHCGqT/spUoUoH5Pfmmbo3vPctf0wFe1exUwG7dZGNEMCI
HosoR2+X6SgrR9h/5APeFQhSnXfXfcyfcw3eoMapwcXrdGXAKFdHwy7jrrmP
P1KHTESvIoVPSJczYsC970XCVY5tY1P9Ztj0oxPWfW3hZHTPJszULiW2RDfK
5ogOHo48QemeiqnY2v+Qt0do/kXyJ2j/aJmJ3ha7ODk8V68BAp7QP0FrYTpT
adJJZZu/fqJe6/FI/WlRVavRnTsVaKaSklSGAP7O1fwOzu7O9xZ/6PAsKSvo
gc/aV/kIv39kOny/YxtytduR+ks904DFs6RuKQsD4i01GaZJTSM/muPnw0m+
7AD3tIrTXD2uy6QXXIJNhmNo8mhRx1c66QF1mMDX6kmd90KKscW8zq9HC9Zo
ngBeOs2rqh+1kpoNx9zsUZa/SeIeiM/qpFTPh1wFXxdxexNugKbQcpnMa43I
SeNlXSRpmj/Cl+RmOd7ioWGsrvACOZYXTFGpMK0Kr011vmDv1T2wqG2oPYRd
Oqs2lkM3eVdaFZ92Xve999X51pcF0vHmlzfEUb5aF3i1X+1N9hUo9fv8Ht9F
UZunNfFqEehtP/BhqxFxslJdLfLClhbA6yxDvI6XKoJc2pQnb9wzjTWgKLnK
vD3Ob1wp82o4fDJOMnyehObMeWu2Pz7QJfcagUJUZ4Zq+uPVuxWe3FAlmlVd
lDW/vUXZPbZ7WVN+kCEkEj7Du4H0moQULKZsNU4QO9OXSald98fnxyDC3Acz
vABDes7XPm/3YDgx5HDk/MwR8JmexylnsJZ0s4vLfNDjM9zjWG6juT57qJRK
1EoITGunlwT9CG/t7Qf8A9QwNtdcc/OT9RL3JJEpGP4tTMgxj9HDSYXFXDlD
EVhRpYR/llfEsShH3KXQPCHl3ANnUjwpA82cJfSGlumx2b4Y7EZMnJ60qIYl
aVq/O58LxM/VIe9XzLUrSgMzX94xrcP62LbIjGlg9jy7N82n2u0khTfLY1Ez
7RqCLncPAA0drQyrFmGClhtISV0s+AxIPpX7i3EPeAe4B0U0qVXpYFpF0Il0
iOv7wDNqE9leObwtoT26UiXG3WGL9HfEOwy3pbs+nfrme+gl37oHzEqp3U1v
JHnx1NAuocwh73RTu02bPsbwq66Se+RBMM3oEZRrtpotgbDUp3oFH8bi0LO9
Av/yS0Aq459L/8/Kdr32j1mTL0Ifabczq6Fr6f71V69dF9/C2rn9aqoOdcYV
fG6/eBxm+P9QoCgH+4MFCv/zAhcnp8fn3288HKMnbiS24t1T2HQ0ppS6UUAl
OC27cVQlCP3cKLwSPh/zW8RZghE6Ai7y8Tbgsg24CF7bgMs24PL7BVyQi4O4
eOvZT4nE5PzUgwnQuMBGo/zJNkyzDdNswzS/W5iGbAeQ28VmlHG15/KV6vSC
+pxO65qZ+umsJWzN9kbE1tN5gYPbDr/0YNHvgptYT5w5jdWJlLlSGOjf3rKa
PnbiQnv7Blgz518rfiHBP9z1Eadn23fpUNcPC/VNSO0+4/cWGHkBWA6DvqmO
Z3JO/GvQmXYUfF78bfBF32iKwlkAR8R3ka/8u56BEQhxeN/Cxz+P7sJLzqdv
gxjF2XDrRkWiDIIgxzwS6sUUq9H1YjZZ5CaE1kBpw8D0RJEjSDhvrGZXamWO
zhtQhRZyVN76UijhDtO/bTXox4two8db3SsGTdzC2Tf/IszNYX035nI434u5
Pb6/Neb0NsNHYc7pAd14UzrABqzp+1vj3PGUxMXL/Q+chfe7/dUEc9UHxdZd
GOSafKGOIFZ3BtGmhq00ots03oyBH4uAlqofLCnsjU26Ixybu/jNels1s4au
PYf4c+BCi7MtVGHD24rTBPavYdD/RVa7O5dsyx8+f4S1N7ZcchMuQU2/6fv4
IL7ma0xN3PIhVeI4iHvrwPiu8QZuVLeIJIdef3c0uZGnp7jkEtX9oHiAKenc
+WL0Rc6PMUq9WrlYQ7tueW/P3PIhz9tWuvYrNttbNQO5Bcalf9ENx6KkFA4x
tWy5fLaLU8SF9p+Q4Mcw+CkRv5kdgouaUPnvRhR9vbJPAREofBiJ3WSsXz/J
a1hwLoRDcQGq8y8lWYJXQAK8oaMpD/zi/zz3HhZ1r07R4x5qXsdFDD6JlhLS
trqxQ13FyxwruKTmZQrYWMXuJU8VX+aJw4WCPNC0kkcdBBMs624BeARyD8te
JbAvpxOWsfZCIPGsolcqCAzs3e1ac4XnhZ68kTd8MXjBXNDNMV59I4wdyPax
6wEXF2QrYYBlTOS1r79QJWJ6lNW9lj42E4U/LxP3AIg301WRV/kkT7kGutSW
UqcnF0cvTn+Ut7S+PHhwj19fPjs597/4+u6Du/jwFM0iza/wFQrTFUTIvHhX
OmnQWKdIHm6mFgMbDcPnD+IqL9b40Iet4y7deIq2K4A8Z3Dn+ASp2js//2nf
YXvQRMriHWD108XFy/MbIhAOfvHs3JTFQjI8ePClvFkpK2qIIGxm3tpkLWMf
KLvnv1NJGNCzPFIjC1iXN58ChF7xwHqVkzqNCzuEvyqgJgt+J48ls9C26vwU
g3NS3QrrUbky6l2ADFdwpSujbUqryMyjbzxdrO2E/1RWL8cgFjCE20q0HiTy
uZ2Y1iitK3xVHDC6Q8Xn6Tcgl6bf1F4y1MOBRJFhMWodFm8nCDBUXKfVPi9+
qX008A0AetSchRAJAqo6oWKFMPXLOs1gmjCUFFRXZb505d51dpkUecYxEqVe
A6raJ8yeHs4BPVCRVcQ47ksJLkQuxMREWPGdY35tphJfHeuBLeJLIqWeUyFF
gqJnMwyr5q5otxt6qBqKxQ+Yfm3qUgfPqNNiYX3tWB6k4gcwzXOEY8xjt/Xz
gwi/qTbf8f4ffH6e+6+7xFMC7E28iwNay0KQepbmumV5WjE31PJKpqlnLu8v
kAwiYkakZNVQNc51NcD/ZPXw3VYuhZ9XNgy+37WcfxT6f6qeHp4edhsZpot9
VxuD4dgWFUWJ1gLoeaX+fPa05Br2OCyfDP7l+TMCcKbneK4A7iBP5P6XX+Nj
sXFpXmAaBefmAGqkbnoxwB8A1+qIzxypiJx6enL+hBoAJiN1eufw20YlfBiK
XjrOsIU7Nh8abD4Eq8BN/K3RU3KgYM18QWORIr/KfVmxLOGnM5wiSLEXvEbG
DN49uCtGyVIAxw/rzNmPCa1bLhofgY+U/5k9ZhjZs4+OpQgRadP7lhi1AXio
2c82ovapOpyY91XkDUVrzc1J3BU9k5Imb0Rc4+yNOga3FTwQrY70ZAKCnabJ
QD3O1euavePn+YIeYXqc1xPQiAk4PK+ScpHV6rHW9Dbn8aKoL+H/fLoeqBcl
AFFPhupYq2N8SZeAHE6LBFjox7gosAamOP2wh8BwdWkSAkB5YJ0CUif4/IV5
GIc1aj2fA0uSxaAH26NIjePJG557+w3pw6OLU1tk2BwM7b06BS/r08ssomei
3wuN+F28rx88vI86AZDzn7J2L0qbqp8TvWI3xMAnIP4Y9q1bfk/CPRHoP9Ns
niR7dcrlJe3WEV88AzXGvqw8K0KKWUwTc8vae0ICNi7B86ew3KVzTpRxPmfw
faSzOShifoFi7+Jknx+dSfVQvaaHmBEdfmuoTJbgYhX8Gg0R1WZs+JstADQw
RVHXYtgFSX52pCzr5co8vHRxEsmAFnnriYG6sC81U8oZdjDkccVQTUFYfo78
1ak8j2kqmWIJ0dR7kIVSTfmpu+lc0yt8+ARRsG2Xor+meKg97vJrh7pBD24z
qH/g5kqCxlIBVgYOH9DLZ+7VoUb92TA4GtQbbaAgkBER37Nv3AkB6vr1Sce5
1OJlYBGn6TafHTI7DgLaMTlke53QURQ+a1mjjABXxnPwC6b8LLL/Fost+S8i
RGCPJNwAH+8dnR7t213Oc3yTLjrOlzH5KZzVdJTnxRQPIGBKe8+Pz6E9PzkF
AvfqlF+DwoiEVL5lVhXpNI+Nxe7UG7rwyyjyEo55Ud29WymFrNk7yYxmqPRb
6t8Uj+DlTbMPZvnueXGOmGqC858YluiJM7Weu2RXVuBseO6SrLZRZ5MUNAZF
S0q9pMq6OCUrYkw4u1+xm8tN7D+02vVWpZfNSzeg0cd5QdcHvH0DJ8MQ3DFm
10zyYoWtkHmtfeQtZP8jQ/YtqvCpbefL2Men4hS8y9KVqCarYnUAijFuheYL
uydiNbw2Ty7x7sccs2MqCxZnpsfaWu+JoefrXlEKn5+62au4YDTN63HyEFbO
elfyWTx44bOwt1mgofHI7btg7pUiV+k57n8NbN2wVbCPz82+yXkCjewnodGZ
rk2FaLcMHEfCcamkdv8luDjNs7l9jaszz8oKIJOJPSZ5HwtINa1pw8OP4rqg
XutIwjwESbJmog4dcfpSXYIf8OyioxF4SBg+0eU+O0xxUAKbERsnohQbc8jT
2qz7xUnw5DI/EZ+UQKXSrL59LOoYufN2wkomRPTE/tAoxU853YbukJtszxMp
g+/tLu+b4j/NJxecJJYmssCZL/4rV/IonnnCirmbrrCLQcTnrlgA8ckr5A2W
d9jE3rMBNm3RMvoeiLTrz3rXTCGoSY6jdzxDM9WrZBI8dd9669QU4mbP/bvw
R52+uDgZqc9+/oyetVdXBegiRB0jLZQf/NU3B6rR6budHTy5CLC22f67IznW
2DXzGam/yrmESwMwX0bJFL7fFWQjJ8TRGCuQ2eT0Qbsn3zkbBbkFwR3+xsWB
sKU79H/vw8aLJQ7fEGfbQpB+dXbPw6s9fM9B0qiVDbG78VsEa4L4Ddy6cWxg
03XIaHEzXjqM8POOjNEB7H3rs0atOsyUCP7sJEwjYb3jtk57fh3koJwRXIF7
0d3oXhPfxtDXQbjfASH4259pAHsTZ9zfcoZt8XtwBqzqR3LG/ejhb8IZD7ec
YVv8HpzxsFPib8MZDzu1Tj9n2N//5lma7snR3biN9key/MT+DEgDDgZNnuJD
3E62oW8iMXQdNsy1qVY9OrZ7oT6Ag/ONHOwXSm0a+s5GPZzex+uuN6WojK5h
/p933MSgRXQVryPw2eN1i4BN8Fh7FcEvy/6mZgJf3u1s0Ramtji1W70fqDbR
/+XUxg21sCc5g4GVnabkTDHomxkKtHgWv94sPNRiKzq/g+jc34rOdfP8eNFh
wQETOsDXOtnN+i2NT8tYNyXodgLb9MtDge3wGrcCuxXYZrf/ZQIrYjqwovsR
AtshP4HA3kCCbiOw1xrYa9XDVl43g9/K6x9SXh+SvD4cPPzN5bUV5fg4A9sM
b4QC27H53grsbyiwD7cCe808/xkCK2I6sKL7EQLbIT+BwN5Agv65HvG1+mEr
sJvBbwX2DymwHxs3vV5Qt8Gf/0HJOdhKznXzNC0+MGAqQvNxAdPr3MOtzGxl
xv78EWRmg7Wxv7fP9W7Dn5vItJFEXRS9FWkQ8s87bdJsOMt05Ai1CTZ6v/Pe
Xlmgu8R8vU1Pv9udxWmp8RGP/wf50L2xOeMAAA==

-->

</rfc>

