<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.19 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-liu-teas-transport-network-slice-yang-06" category="std">

  <front>
    <title abbrev="Network Slice Topology Data Model">IETF Network Slice Topology YANG Data Model</title>

    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>IBM Corporation</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Microsoft</organization>
      <address>
        <email>jefftant.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>
    <author initials="L.M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Belotti" fullname="Sergio Belotti">
      <organization>Nokia</organization>
      <address>
        <email>Sergio.belotti@nokia.com</email>
      </address>
    </author>
    <author initials="R." surname="Rokui" fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <email>rrokui@ciena.com</email>
      </address>
    </author>
    <author initials="A." surname="Guo" fullname="Aihua Guo">
      <organization>Futurewei</organization>
      <address>
        <email>aihuaguo.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>

    <date year="2023" month="March" day="13"/>

    
    <workgroup>TEAS Working Group</workgroup>
    

    <abstract>


<t>An IETF network slice may use an abstract topology to describe intended 
   underlay for connectivities between slice endpoints. Abstract topologies
   help the customer to request network slices with shared resources
   amongst connections, and connections can be activated within the slice
   as needed.</t>

<t>This document describes a YANG data model for managing and
   controlling abstract topologies for IETF network slices defined in
   RFC YYYY.</t>

<t>[RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-ietf-network-slices once it has been published.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document defines a YANG <xref target="RFC7950"/> data model for representing,
   managing, and controlling IETF network slices as abstract
   network topologies, where the network slices are defined
   in <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>

<t>The defined data model is an interface between customers and
   providers for configurations and state retrievals, so as to support
   network slicing as a service.  Through this model, a customer can
   learn the slicing capabilities and the available resources of the
   provider.  A customer can request or negotiate with a network slicing
   provider to create an instance.  The customer can incrementally
   update its requirements on individual topology elements in the slice
   instance, e.g., adding or removing a node or link, updating desired
   bandwidth of a link, and retrieve the operational states of these elements.
   With the help of other mechanisms and data models defined in IETF,
   the telemetry information can be published to the customer.</t>

<t>The YANG model defines technology-agnostic constructs common to network slicing
   at network layers of different technologies, e.g. IP/MPLS(-TP), OTN and WDM.
   Therefore, this model may be used as a common base model on which other
   network slicing models, such as <xref target="I-D.ietf-ccamp-yang-otn-slicing"/>, may
   augments with technology-specific constructs.</t>

<t>As described in Section 3 of
   <xref target="I-D.contreras-teas-slice-controller-models"/>, the data model defined
   in this document complements the data model defined in
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.  In addition to the
   provider's view, the data model defined in this document models the
   Type 2 service defined in <xref target="RFC8453"/>.</t>

<t>The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) <xref target="RFC8342"/>.</t>

<section anchor="tree-diagram"><name>Tree Diagram</name>

<t>Tree diagrams used in this document follow the notation defined in
   <xref target="RFC8340"/>.</t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects
   are prefixed using the standard prefix associated with the
   corresponding YANG imported modules, as shown in <xref target="tab-prefixes"/>.</t>

<texttable title="Prefixes and Corresponding YANG Modules" anchor="tab-prefixes">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG Module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>nt</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>nw</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>tet</c>
      <c>ietf-te-topology</c>
      <c><xref target="RFC8795"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="RFC8776"/></c>
      <c>ns-topo</c>
      <c>ietf-ns-topo</c>
      <c>RFCXXXX</c>
</texttable>

<t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please remove this note.</t>

</section>
</section>
<section anchor="modeling-considerations"><name>Modeling Considerations</name>

<t>An IETF network slice topology is modeled as network topology defined in
   <xref target="RFC8345"/>, with augmentations.  A new network type "network-slice" is
   defined in this document.  When a network topology data instance
   contains the network-slice network type, it represents an instance of
   an IETF network slice topology.</t>

<section anchor="relationships-to-related-topology-models"><name>Relationships to Related Topology Models</name>

<t>There are several related YANG data models that have been defined in
   IETF.  Some of these are:</t>

<t>Network Topology Model:
      Defined in <xref target="RFC8345"/>.</t>

<t>Network Slicing Model:
      Defined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>OTN Slicing:
      Defined in <xref target="I-D.ietf-ccamp-yang-otn-slicing"/>.</t>

<t><xref target="fig-model-relationship"/> shows the relationships among these models.  The box of
   dotted lines denotes the model defined in this document.</t>

<figure title="Model Relationships" anchor="fig-model-relationship"><artwork><![CDATA[
     +----------+                 +----------+
     | Network  |                 | Network  |
     | Slice    |                 | Topology +
     | NBI YANG >------+          | Model    |
     | Model    |      |          | RFC 8345 |
     +----+-----+      |          +-----+----+
          |            |                |
          |augments    |references      |augments
          |            |                |
     +----^-----+      |          ......^.....
     | OTN      |      +----------: Network  :
     | Slicing  | augments        : Slice    :
     | Model    >-----------------: Topology :
     |          |                 : Model    :
     +----------+                 ''''''''''''
]]></artwork></figure>

</section>
<section anchor="actn-for-network-slicing"><name>ACTN for Network Slicing</name>

<t>Since ACTN topology data models are based on the network topology
   model defined in <xref target="RFC8345"/>, the augmentations defined in this
   document are effective augmentations to the ACTN topology data
   models, resulting in making the ACTN framework <xref target="RFC8453"/> and data
   models <xref target="I-D.ietf-teas-actn-yang"/> capable of slicing networks with the
   required network characteristics.</t>

</section>
</section>
<section anchor="model-applicability"><name>Model Applicability</name>

<t>There are many technologies to achieve network slicing.  The data
   model defined in this document can be used to configure resource-based
   network slices, where the resources of a network slice is represented
   in the form of an abstract network topology, which can then be mapped
   to a network resource partition (NRP) according to the scenarios defined
   in <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>

<t>Network slices may be abstracted differently depending on the requirement
   contained in the configuration provided by the slice customer. A customer
   may request a network slice to provide just connectivity between specified
   endpoints, in which case the network slice can be represented as a set of
   endpoint-to-endpoint links, with each link formed by an end-to-end tunnel
   across the underlying transport networks. The resources associated with
   each link of the slice is reserved and commissioned in the underlying
   physical network upon the completion of configuring the network slice and
   all the links are active.</t>

<t>Alternatively a network slice can also be represented as an abstract topology
   when the customer requests the slice to share resources between multiple
   endpoints and to use the resources on demand. The abstract topology may
   consist of virtual nodes and virtual links, and their associated resources
   are reserved but not commissioned across the underlying transport networks.
   The customer can later commission resources within the slice dynamically 
   using the NBI provided by the service provider.</t>

<t>According to <xref target="I-D.ietf-teas-ietf-network-slices"/>, the IETF Network Slice
   service customer might ask for some level of control of, e.g., to customize
   the service paths in a network slice. The abstract topology defined in this
   draft could serve to enable this capability and optimize the resource utilization
   for network slice connections activated on top of the abstract topology.</t>

<t>In the example shown in <xref target="fig-ns-topo-example"/>, two network resource partitions
   are created by the provider to support the two network slice topology requests
   from the customers.  In realizing the network resource partitions, node virtualization
   is used to separate and allocate resources in physical devices.  Two virtual
   routers VR1 and VR2 are created over physical router R1, and two virtual
   routers VR3 and VR4 are created over physical router R2, respectively.  Each of the
   virtual routers,as a partition of the physical router, takes a portion 
   of the resources such as ports and memory in the physical router.<br />
   Depending on the requirements and the implementations, they may share 
   certain resources such as processors, ASICs, and switch fabric.</t>

<t>The network slice topology intent requested by the customers is then
   mapped to a corresponding network resource partition. The provider also reports the
   operational state of the topology, which shows the resources that are allocated.
   Customers can process the requested topology and integrate it with their own topology.</t>

<t>As an example, Appendix B. shows the JSON encoded data instances of
   the customer topology intent for Network Slice Blue.</t>

<figure title="Network Slicing Topologies for Virtualization" anchor="fig-ns-topo-example"><artwork><![CDATA[
       Customer Topology (Merged)          Customer Topology (Merged)
       Network Slice Blue                  Network Slice Red
                            +---+         +---+      +---+
                       -----|R3 |---   ---|R2 |------|R3 |
                      /     +---+         +---+      +---+                  
      +---+      +---+        ^             ^          ^  \     +---+
   ---|R1 |------|R2 |        |             |          |   -----|R4 |---
      +---+      +---+        |             |          |        +---+
        ^          ^          v             v          v          ^
        |          |        +---+         +---+      +---+        |
        |          |   -----|VR5|---   ---|VR2|------|VR4|        |
        v          v  /     +---+         +---+      +---+        v         
      +---+      +---+                                    \     +---+
   ---|VR1|------|VR3|                                     -----|VR6|---
      +---+      +---+                                          +---+
       Customer Topology (Intended)        Customer Topology (Intended)
       Network Slice Blue                  Network Slice Red

                                 Customers
   ---------------------------------------------------------------------
                                 Provider

        Customized Topology (Network Resouce Partition)
        Provider Network with Virtual Devices

        Network Slice Blue: VR1, VR3, VR5         +---+             
                                        ----------|VR5|------
                                       /          +---+
                    +---+         +---+
              ------|VR1|---------|VR3|                              
                    +---+         +---+
              ------|VR2|---------|VR4|
                    +---+         +---+
                                       \          +---+
                                        ----------|VR6|------
        Network Slice Red: VR2, VR4, VR6          +---+

                                 Virtual Devices 
   ---------------------------------------------------------------------
                                 Physical Devices

        Native Topology
        Provider Network with Physical Devices
                                                  +---+
                                        ----------|R3 |------
                                       /          +---+
                    +---+         +---+
              ======|R1 |=========|R2 |                             
                    +---+         +---+
                                       \          +---+
                                        ----------|R4 |------
                                                  +---+
]]></artwork></figure>

</section>
<section anchor="yang-model-overview"><name>YANG Model Overview</name>
<t>The following constructs and attributes are defined within the YANG model:</t>

<t><list style="symbols">
  <t>Network topology, which represent set of shared, reserved resources organized as a virtual 
 topology between all of the endpoints. A customer could use such network topology
 to define detailed connectivity path traversing the topology, and allow sharing of 
 resources between its multiple endpoint pairs.</t>
  <t>Service-level objectives (SLOs) associated with different objects, including node, link, 
termination point of the topology.</t>
</list></t>

</section>
<section anchor="model-tree-structure"><name>Model Tree Structure</name>

<figure title="Tree diagram for network slice topology" anchor="fig-ietf-ns-topo-tree"><artwork><![CDATA[
module: ietf-ns-topo

  augment /nw:networks/nw:network/nw:network-types:
    +--rw network-slice!
  augment /nw:networks/nw:network:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?              string
             +--rw metric-bounds
             |  +--rw metric-bound* [metric-type]
             |     +--rw metric-type          identityref
             |     +--rw metric-unit          string
             |     +--rw value-description?   string
             |     +--rw percentile-value?    percentile
             |     +--rw bound?               uint64
             +--rw security*                 identityref
             +--rw isolation?                identityref
             +--rw max-occupancy-level?      uint8
             +--rw mtu?                      uint16
             +--rw steering-constraints
             |  +--rw path-constraints
             |  +--rw service-function
             |  +--rw disjointness?
             |          te-types:te-path-disjointness
             +--rw optimization-criterion?   identityref
             +--rw resize-requirement?       identityref
             +--rw service-info?             string
  augment /nw:networks/nw:network/nw:node:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?              string
             +--rw metric-bounds
             |  +--rw metric-bound* [metric-type]
             |     +--rw metric-type          identityref
             |     +--rw metric-unit          string
             |     +--rw value-description?   string
             |     +--rw percentile-value?    percentile
             |     +--rw bound?               uint64
             +--rw security*                 identityref
             +--rw isolation?                identityref
             +--rw max-occupancy-level?      uint8
             +--rw mtu?                      uint16
             +--rw steering-constraints
             |  +--rw path-constraints
             |  +--rw service-function
             |  +--rw disjointness?
             |          te-types:te-path-disjointness
             +--rw optimization-criterion?   identityref
             +--rw resize-requirement?       identityref
             +--rw service-info?             string
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?              string
             +--rw metric-bounds
             |  +--rw metric-bound* [metric-type]
             |     +--rw metric-type          identityref
             |     +--rw metric-unit          string
             |     +--rw value-description?   string
             |     +--rw percentile-value?    percentile
             |     +--rw bound?               uint64
             +--rw security*                 identityref
             +--rw isolation?                identityref
             +--rw max-occupancy-level?      uint8
             +--rw mtu?                      uint16
             +--rw steering-constraints
             |  +--rw path-constraints
             |  +--rw service-function
             +--rw optimization-criterion?   identityref
             +--rw resize-requirement?       identityref
             +--rw service-info?             string
  augment /nw:networks/nw:network/nt:link:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?              string
             +--rw metric-bounds
             |  +--rw metric-bound* [metric-type]
             |     +--rw metric-type          identityref
             |     +--rw metric-unit          string
             |     +--rw value-description?   string
             |     +--rw percentile-value?    percentile
             |     +--rw bound?               uint64
             +--rw security*                 identityref
             +--rw isolation?                identityref
             +--rw max-occupancy-level?      uint8
             +--rw mtu?                      uint16
             +--rw steering-constraints
             |  +--rw path-constraints
             |  +--rw service-function
             |  +--rw disjointness?
             |          te-types:te-path-disjointness
             +--rw optimization-criterion?   identityref
             +--rw resize-requirement?       identityref
             +--rw service-info?             string
]]></artwork></figure>

</section>
<section anchor="yang-modules"><name>YANG Modules</name>

<figure title="YANG model for network slice topology" anchor="fig-ietf-ns-topo-yang"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-topo@2023-03-11.yang"
   module ietf-ns-topo {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-topo";
     prefix "ns-topo";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-te-types {
       prefix "te-types";
       reference
         "RFC 8776: Traffic Engineering Common YANG Types";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-00:
          IETF Network Slice Service YANG Model";
     }
 
     organization
       "IETF CCAMP Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/ccamp/>
        WG List: <mailto:ccamp@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        generic network slices in optical transport networks, e.g.,
        Optical Transport Network (OTN).

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2023-03-11 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Identities
      */
     identity resize-option {
       description
         "Base identity for link or connectivity resizing options";
     }
 
     identity resize-none {
       base resize-option;
       description
         "Not resizable";
     }
 
     identity resize-with-hit {
       base resize-option;
       description
         "Resizable with traffic hits";
     }

     identity resize-hitless {
       base resize-option;
       description
         "Hitless resizable";
     }
 
     /*
      * Groupings
      */

     grouping ns-topo-slo-sle-policy {
       description
         "Policy grouping for Transport Network Slices.";

       leaf optimization-criterion {
           type identityref {
             base te-types:objective-function-type;
           }
           description
             "Optimization criterion applied to this topology.";
       }
       leaf resize-requirement {
         type identityref {
           base resize-option;
         }
         description
           "Indicates resizing requirments";
       }
       leaf service-info {
         type string;
         description
           "Describe type of services running on the slice. It may be
            useful information to help the slice controller to 
            optimize resource allocation";
       }
     }
   
     grouping ns-topo-steering-constraints {
       description
         "Policy grouping for specifying steering constraints for
          Transport Network Slices.";

       leaf disjointness {
         type te-types:te-path-disjointness;
         description
           "Indicate the level of disjointness for slice
            resources.";
       }
     }

     /*
      * Augmented data nodes
      */
     /* network type augments */
     augment "/nw:networks/nw:network/nw:network-types" {
       description
         "Defines the Network Slice topology type.";
       container network-slice {
         presence "Indicates Network Slice topology";
         description
           "Its presence identifies the Network Slice type.";
       }
     }
     
     /* network topology augments */
     augment "/nw:networks/nw:network" {
       when "./nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment topology configuration and state.";
       uses ietf-nss:service-slo-sle-policy;
     }

     augment "/nw:networks/nw:network" +
             "/ns-topo:slo-sle-policy" +
             "/ns-topo:custom" +
             "/ns-topo:service-slo-sle-policy" {
       when "../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment topology configuration and state.";
       uses ns-topo-slo-sle-policy;
     }

     augment "/nw:networks/nw:network" +
             "/ns-topo:slo-sle-policy" +
             "/ns-topo:custom" +
             "/ns-topo:service-slo-sle-policy" +
       "/ns-topo:steering-constraints" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment topology configuration and state.";
       uses ns-topo-steering-constraints;
     }

     /* network node augments */
     augment "/nw:networks/nw:network/nw:node" {
       when "../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment node configuration and state.";
       uses ietf-nss:service-slo-sle-policy;
     }

     augment "/nw:networks/nw:network/nw:node" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment node configuration and state.";
       uses ns-topo-slo-sle-policy;
     }

     augment "/nw:networks/nw:network/nw:node" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" +
       "/ns-topo:steering-constraints" {
       when "../../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description
       "Augment IETF network slice services to include steering
          constraints for nodes.";
       uses ns-topo-steering-constraints;
     }

     /* network node's termination point augments */
     augment "/nw:networks/nw:network/nw:node" +
             "/nt:termination-point" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment node configuration and state.";
     
     uses ietf-nss:service-slo-sle-policy;
     }
   
     augment "/nw:networks/nw:network/nw:node" +
             "/nt:termination-point" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" {
       when "../../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment node configuration and state.";
     
       uses ns-topo-slo-sle-policy;
     }

     /* network link augments */
     augment "/nw:networks/nw:network/nt:link" {
       when "../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment link configuration and state.";
       uses ietf-nss:service-slo-sle-policy;
     }

     augment "/nw:networks/nw:network/nt:link" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description "Augment link configuration and state.";
       uses ns-topo-slo-sle-policy;
     }

     augment "/nw:networks/nw:network/nt:link" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" + 
             "/ns-topo:steering-constraints" {
       when "../../../nw:network-types/ns-topo:network-slice" {
         description "Augment only for Network Slice topology.";
       }
       description
       "Augment IETF network slice services to include steering
          constraints for links within a resource-based transport
          network slice.";
       uses ns-topo-steering-constraints;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="manageability-considerations"><name>Manageability Considerations</name>

<t>To ensure the security and controllability of physical resource
   isolation, slice-based independent operation and management are
   required to achieve management isolation.
   Each network slice typically requires dedicated accounts,
   permissions, and resources for independent access and O&amp;M. This
   mechanism is to guarantee the information isolation among slice
   tenants and to avoid resource conflicts. The access to slice
   management functions will only be permitted after successful security
   checks.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>

<t>The NETCONF access control model <xref target="RFC8341"/> provides the means to
   restrict access for particular NETCONF or RESTCONF users to a
   preconfigured subset of all available NETCONF or RESTCONF protocol
   operations and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   to these data nodes without proper protection can have a negative
   effect on network operations.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

<t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>It is proposed to IANA to assign new URIs from the "IETF XML
   Registry" <xref target="RFC3688"/> as follows:</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers a YANG module in the YANG Module Names
   registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   name: ietf-ns-topo
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   prefix: ns-topo
   reference: RFC XXXX
]]></artwork></figure>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
<front>
<title>The YANG 1.1 Data Modeling Language</title>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<date month='August' year='2016'/>
<abstract><t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='7950'/>
<seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>



<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
<front>
<title>Network Management Datastore Architecture (NMDA)</title>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'><organization/></author>
<author fullname='P. Shafer' initials='P.' surname='Shafer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='R. Wilton' initials='R.' surname='Wilton'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model.  This document updates RFC 7950.</t></abstract>
</front>
<seriesInfo name='RFC' value='8342'/>
<seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>



<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
<front>
<title>YANG Tree Diagrams</title>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='L. Berger' initials='L.' role='editor' surname='Berger'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t></abstract>
</front>
<seriesInfo name='BCP' value='215'/>
<seriesInfo name='RFC' value='8340'/>
<seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>



<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
<front>
<title>Common YANG Data Types</title>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t></abstract>
</front>
<seriesInfo name='RFC' value='6991'/>
<seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>



<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
<front>
<title>A YANG Data Model for Network Topologies</title>
<author fullname='A. Clemm' initials='A.' surname='Clemm'><organization/></author>
<author fullname='J. Medved' initials='J.' surname='Medved'><organization/></author>
<author fullname='R. Varga' initials='R.' surname='Varga'><organization/></author>
<author fullname='N. Bahadur' initials='N.' surname='Bahadur'><organization/></author>
<author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'><organization/></author>
<author fullname='X. Liu' initials='X.' surname='Liu'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories.  The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t></abstract>
</front>
<seriesInfo name='RFC' value='8345'/>
<seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>



<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
<front>
<title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
<author fullname='X. Liu' initials='X.' surname='Liu'><organization/></author>
<author fullname='I. Bryskin' initials='I.' surname='Bryskin'><organization/></author>
<author fullname='V. Beeram' initials='V.' surname='Beeram'><organization/></author>
<author fullname='T. Saad' initials='T.' surname='Saad'><organization/></author>
<author fullname='H. Shah' initials='H.' surname='Shah'><organization/></author>
<author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t></abstract>
</front>
<seriesInfo name='RFC' value='8795'/>
<seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>



<reference anchor='RFC8776' target='https://www.rfc-editor.org/info/rfc8776'>
<front>
<title>Common YANG Data Types for Traffic Engineering</title>
<author fullname='T. Saad' initials='T.' surname='Saad'><organization/></author>
<author fullname='R. Gandhi' initials='R.' surname='Gandhi'><organization/></author>
<author fullname='X. Liu' initials='X.' surname='Liu'><organization/></author>
<author fullname='V. Beeram' initials='V.' surname='Beeram'><organization/></author>
<author fullname='I. Bryskin' initials='I.' surname='Bryskin'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>This document defines a collection of common data types and groupings in YANG data modeling language. These derived common types and groupings are intended to be imported by modules that model Traffic Engineering (TE) configuration and state capabilities.</t></abstract>
</front>
<seriesInfo name='RFC' value='8776'/>
<seriesInfo name='DOI' value='10.17487/RFC8776'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
<front>
<title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
<author fullname='M. Wasserman' initials='M.' surname='Wasserman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6242'/>
<seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
<front>
<title>Network Configuration Access Control Model</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t><t>This document obsoletes RFC 6536.</t></abstract>
</front>
<seriesInfo name='STD' value='91'/>
<seriesInfo name='RFC' value='8341'/>
<seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>



<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
<front>
<title>The IETF XML Registry</title>
<author fullname='M. Mealling' initials='M.' surname='Mealling'><organization/></author>
<date month='January' year='2004'/>
<abstract><t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t></abstract>
</front>
<seriesInfo name='BCP' value='81'/>
<seriesInfo name='RFC' value='3688'/>
<seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>



<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
<front>
<title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<date month='October' year='2010'/>
<abstract><t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6020'/>
<seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>



<reference anchor='RFC7951' target='https://www.rfc-editor.org/info/rfc7951'>
<front>
<title>JSON Encoding of Data Modeled with YANG</title>
<author fullname='L. Lhotka' initials='L.' surname='Lhotka'><organization/></author>
<date month='August' year='2016'/>
<abstract><t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t></abstract>
</front>
<seriesInfo name='RFC' value='7951'/>
<seriesInfo name='DOI' value='10.17487/RFC7951'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-teas-ietf-network-slices' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slices-19'>
   <front>
      <title>A Framework for IETF Network Slices</title>
      <author fullname='Adrian Farrel' initials='A.' surname='Farrel'>
         <organization>Old Dog Consulting</organization>
      </author>
      <author fullname='John Drake' initials='J.' surname='Drake'>
         <organization>Juniper Networks</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Shunsuke Homma' initials='S.' surname='Homma'>
         <organization>NTT</organization>
      </author>
      <author fullname='Kiran Makhijani' initials='K.' surname='Makhijani'>
         <organization>Futurewei</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Microsoft Inc.</organization>
      </author>
      <date day='21' month='January' year='2023'/>
      <abstract>
	 <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term &quot;IETF Network
   Slice&quot; and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slices-19'/>
   
</reference>


<reference anchor='I-D.ietf-ccamp-yang-otn-slicing' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-yang-otn-slicing-03'>
   <front>
      <title>Framework and Data Model for OTN Network Slicing</title>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Yunbin Xu' initials='Y.' surname='Xu'>
         <organization>CAICT</organization>
      </author>
      <author fullname='Yang Zhao' initials='Y.' surname='Zhao'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>IBM Corporation</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and a
   YANG data model augmentation of the OTN topology model.  Additional
   YANG data model augmentations will be defined in a future version of
   this draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-yang-otn-slicing-03'/>
   
</reference>


<reference anchor='I-D.contreras-teas-slice-controller-models' target='https://datatracker.ietf.org/doc/html/draft-contreras-teas-slice-controller-models-04'>
   <front>
      <title>IETF Network Slice Controller and its associated data models</title>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>IBM Corporation</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>   This document describes the major functional components of an IETF
   Network Slice Controller (NSC) as well as references the data models
   required for supporting the requests of IETF network slice services
   and their realization.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-contreras-teas-slice-controller-models-04'/>
   
</reference>


<reference anchor='I-D.ietf-teas-ietf-network-slice-nbi-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice-nbi-yang-04'>
   <front>
      <title>A YANG Data Model for the IETF Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='Liuyan Han' initials='L.' surname='Han'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-04'/>
   
</reference>



<reference anchor='RFC8453' target='https://www.rfc-editor.org/info/rfc8453'>
<front>
<title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
<author fullname='D. Ceccarelli' initials='D.' role='editor' surname='Ceccarelli'><organization/></author>
<author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane.  They also have a range of management and provisioning protocols to configure and activate network resources.  These mechanisms represent key technologies for enabling flexible and dynamic networking.  The term &quot;Traffic Engineered network&quot; refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t><t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t><t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t></abstract>
</front>
<seriesInfo name='RFC' value='8453'/>
<seriesInfo name='DOI' value='10.17487/RFC8453'/>
</reference>


<reference anchor='I-D.ietf-teas-actn-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-actn-yang-11'>
   <front>
      <title>Applicability of YANG models for Abstraction and Control of Traffic Engineered Networks</title>
      <author fullname='Young Lee' initials='Y.' surname='Lee'>
         <organization>Samsung</organization>
      </author>
      <author fullname='Haomian Zheng' initials='H.' surname='Zheng'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Daniele Ceccarelli' initials='D.' surname='Ceccarelli'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Bin Yeong Yoon' initials='B. Y.' surname='Yoon'>
         <organization>ETRI</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <date day='7' month='March' year='2023'/>
      <abstract>
	 <t>   Abstraction and Control of TE Networks (ACTN) refers to the set of
   virtual network operations needed to orchestrate, control and manage
   large-scale multi-domain TE networks, so as to facilitate network
   programmability, automation, efficient resource sharing, and end-to-
   end virtual service aware connectivity and network function
   virtualization services.

   This document explains how the different types of YANG models
   defined in the Operations and Management Area and in the Routing
   Area are applicable to the ACTN framework. This document also shows
   how the ACTN architecture can be satisfied using classes of data
   model that have already been defined, and discusses the
   applicability of specific data models that are under development. It
   also highlights where new data models may need to be developed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-actn-yang-11'/>
   
</reference>




    </references>


<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The TEAS Network Slicing Design Team (NSDT) members included Aijun
   Wang, Dong Jie, Eric Gray, Jari Arkko, Jeff Tantsura, John E Drake,
   Luis M.  Contreras, Rakesh Gandhi, Ran Chen, Reza Rokui, Ricard
   Vilalta, Ron Bonica, Sergio Belotti, Tomonobu Niwa, Xuesong Geng, and
   Xufeng Liu.</t>

</section>
<section anchor="data-tree-for-the-example-in-section-31"><name>Data Tree for the Example in Section 3.1</name>

<section anchor="native-topology"><name>Native Topology</name>
<t>This section contains an example of an instance data tree in the JSON
   encoding <xref target="RFC7951"/>.  The example instantiates "ietf-network" for the
   topology of Network Slice Blue depicted in <xref target="fig-ns-topo-example"/>.</t>

<figure><artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "example-customized-blue-topology",
        "network-types": {
          "ietf-ns-topo:network-slice": {
          }
        },
        "node": [
          {
            "node-id": "VR1",
            "ietf-ns-topo:service-slo-sle-policy": {
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated",
              "resize-requirement": "resize-hitless"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "1-0-1"
              },
              {
                "tp-id": "1-3-1"
              }
            ]
          },
          {
            "node-id": "VR3",
            "ietf-ns-topo:service-slo-sle-policy": {
              "isolation": "ietf-network-slice-service:service-isola\
tion-shared",
              "resize-requirement": "resize-hitless"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "3-1-1"
              },
              {
                "tp-id": "3-5-1"
              }
            ]
          },
          {
            "node-id": "VR5",
            "ietf-ns-topo:service-slo-sle-policy": {
              "isolation": "ietf-network-slice-service:service-isola\
tion-shared",
              "resize-requirement": "resize-hitless"
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "5-3-1"
              },
              {
                "tp-id": "5-0-1"
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "VR1,1-0-1,,",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 60
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-shared"
            }
          },
          {
            "link-id": ",,VR1,1-0-1",
            "destination": {
              "dest-node": "VR1",
              "dest-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 60
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          },
          {
            "link-id": "VR1,1-3-1,VR3,3-1-1",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-1-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 30
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          },
          {
            "link-id": "VR3,3-1-1,VR1,1-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-1-1"
            },
            "destination": {
              "dest-node": "R1",
              "dest-tp": "1-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 30
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          },
          {
            "link-id": "VR3,3-5-1,VR5,5-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-5-1"
            },
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 35
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          },
          {
            "link-id": "VR5,5-3-1,VR3,3-5-1",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-5-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 35
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          },
          {
            "link-id": "VR5,5-0-1,,",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 25
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          },
          {
            "link-id": ",,VR5,5-0-1",
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "metric-bounds": {
                "metric-bound": [
                  {
                    "metric-type": "ietf-network-slice-service:servi\
ce-slo-two-way-delay",
                    "metric-unit": "ms",
                    "bound": 25
                  }
                ]
              },
              "isolation": "ietf-network-slice-service:service-isola\
tion-dedicated"
            }
          }
        ],
        "ietf-ns-topo:service-slo-sle-policy": {
          "isolation": "ietf-network-slice-service:service-isolation\
-dedicated",
          "optimization-criterion": "ietf-te-types:of-minimize-cost-\
path"
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

