<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.19 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-liu-teas-transport-network-slice-yang-09" category="std">

  <front>
    <title abbrev="Network Slice Topology Data Model">IETF Network Slice Topology YANG Data Model</title>

    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Microsoft</organization>
      <address>
        <email>jefftant.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>
    <author initials="L.M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Belotti" fullname="Sergio Belotti">
      <organization>Nokia</organization>
      <address>
        <email>Sergio.belotti@nokia.com</email>
      </address>
    </author>
    <author initials="R." surname="Rokui" fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <email>rrokui@ciena.com</email>
      </address>
    </author>
    <author initials="A." surname="Guo" fullname="Aihua Guo">
      <organization>Futurewei</organization>
      <address>
        <email>aihuaguo.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="02"/>

    
    <workgroup>TEAS Working Group</workgroup>
    

    <abstract>


<t>An IETF network slice customer may utilize intent-based topologies to
   express resource reservation intentions within the provider's network.
   These customer-defined intent topologies allow customers to request
   shared resources for future connections that can be flexibly allocated
   and customized. Additionally, they provide an extensive level of control
   over underlay service paths within the network slice.</t>

<t>This document describes a YANG data model for configuring customer intent
   topologies for network slices using IETF technologies defined in RFC YYYY.</t>

<t>[RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-ietf-network-slices once it has been published.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Network service providers utilize topologies to convey controlled information
   about their networks, such as bandwidth availability and connectivity, 
   with customers, to facilitates customer service requests. Customers can also
   define intent-based topologies to streamline their internal operations. When
   requesting provider support for such custom topologies, they are considered
   as customer intent topologies.</t>

<t>In the context of network slicing, customer intent topologies enables customers
   to express resource reservation preferences. These topologies allow flexible
   configuration and activation of network slices on demand. By providing full
   control over resource allocation timing and methods, customer intent topologies
   ensure that resources are consistently available. Moreover, the resources
   reserved via customer intent topologies can be shared across network slices created
   at different times or between different connectivity constructs within the same slice.
   Compared to network slices with dedicated full-mesh connectivity constructs between
   endpoints, network slices utilizing customer intent topologies can reduce overall
   resource requirements, offering significant economic benefits to the customer.</t>

<t>Consider a hub-and-spoke network slice scenario where multiple customer spoke
   sites dynamically connect to a central hub site, sharing available bandwidth.
   By designing a customer intent topology with two virtual nodes - one representing
   all the spoke sites and the other representing the hub site - connected via
   a shared link, we proactively reserve resources for the shared connection.
   This ensures that bandwidth is readily available whenever the customer requires
   it. In contrast, achieving equivalent bandwidth assurance through individual
   dedicated connectivity constructs would necessitate creating separate links between each
   spoke and the hub, which would lead to substantial bandwidth inefficiency.</t>

<t>Customer intent topology complements connectivity-based network slicing by providing
   customers a mechanism to specify additional underlay service paths to gain
   extensive control over specific or all connectivity constructs within the network slice,
   as outlined in <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>

<t>A customer intent topology embodies the customer's intent and is defined within
   their context. It can include pure customer information or refer to network
   resources identifiable within the provider's context. There is a minimum
   level of a-prior shared knowledge between the customer and the provider,
   and this is the same information needed to supported connectivity-based
   network slice services as desdribed in <xref target="I-D.ietf-teas-ietf-network-slices"/>.
   The provider's responsibility lies in understanding and translating the
   customer intent topology into suitable realizations within their domain.</t>

<t>This document introduces a YANG data model, based on <xref target="RFC7950"/>, for
   configuring customer intent topologies. The YANG model extends the existing
   data model from <xref target="RFC8345"/>, allowing customers to express desired
   service-level objectives (SLOs) and service-level expectations (SLEs)
   across different elements within the customer intent topology.</t>

<t>The defined data model serves as an interface between customers and providers,
   enabling configurations and state retrievals for network slicing as a service.
   Customers can use this model to request or negotiate the creation of network
   slice instances. Additionally, they can incrementally adjust requirements for
   individual topology elements within the slice - for instance, adding or removing
   nodes or links, updating link bandwidth - and retrieve operational states.
   Leveraging other IETF mechanisms and data models, telemetry information can
   also be convey to the customer.</t>

<t>The YANG model encompasses constructs that are independent of specific technologies,
   accommodating network slicing across diverse layers (including IP/MPLS, MPLS-TP,
   OTN, and WDM optical). As a result, this model serves as a foundational framework
   upon which technology-specific network slicing models - such as 
   <xref target="I-D.ietf-ccamp-yang-otn-slicing"/> - can be developed.</t>

<t>Section 3 of <xref target="I-D.contreras-teas-slice-controller-models"/> outlines that the use
   of customer intent topologies and resource reservation control is optional within network
   slicing. These features complement the data model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) <xref target="RFC8342"/>.</t>

<section anchor="terminologies-and-notations"><name>Terminologies and Notations</name>

<t>The following terminologies for describing network slices are defined in 
   <xref target="I-D.ietf-teas-ietf-network-slices"/> and are not redefined herein.</t>

<t><list style="symbols">
  <t>Network Slice (NS)</t>
  <t>Network Slice Customer</t>
  <t>Network Slice Service Provider</t>
  <t>Network Slice Controller (NSC)</t>
  <t>Network Resource Partition (NRP)</t>
</list></t>

<t>The following terms are defined and used in this document.</t>

<t><list style="symbols">
  <t>Customer Intent Topology:
  A topology defined by the customer and provided as input to the
      network slice service provider (specifically, the Network Slice
      Controller or NSC). It represents the customer's desired network
      topology.</t>
  <t>Abstract Topology:
  A topology exposed to the customer by the network slice service
      provider prior to the creation of network slices. The provider
      may optionally uses an abstract topology to expose useful information,
  such as available resources to the customer, which can facilitate
      the build-up of customer intent topologies by the customer.</t>
  <t>NRP Topology:
  A topology internal to the NSC to facilitate the mapping of
      network slices to underlying network resources.</t>
</list></t>

</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t>Tree diagrams used in this document follow the notation defined in
   <xref target="RFC8340"/>.</t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects
   are prefixed using the standard prefix associated with the
   corresponding YANG imported modules, as shown in <xref target="tab-prefixes"/>.</t>

<texttable title="Prefixes and Corresponding YANG Modules" anchor="tab-prefixes">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG Module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>nt</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>nw</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>tet</c>
      <c>ietf-te-topology</c>
      <c><xref target="RFC8795"/></c>
      <c>ns-topo</c>
      <c>ietf-ns-topo</c>
      <c>[RFCXXXX]</c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c>[RFCYYYY]</c>
      <c>ietf-nss</c>
      <c>ietf-network-slice-service</c>
      <c>[RFCZZZZ]</c>
</texttable>

<t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please replace YYYY with the RFC number assigned to <xref target="I-D.ietf-teas-rfc8776-update"/>.
Please replace ZZZZ with the RFC number assigned to <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
Please remove this note.</t>

</section>
</section>
<section anchor="modeling-considerations"><name>Modeling Considerations</name>

<t>An IETF network slice topology is a cusomer intent topology 
   modeled as network topology defined in <xref target="RFC8345"/>, with augmentations. 
   A new network type "network-slice" is defined in this document.<br />
   When a network topology data instance contains the network-slice 
   network type, it represents an instance of an IETF network slice 
   topology.</t>

<t>This data model augments the network topology model by incorporating 
   intent-based Service-Level Objectives (SLOs) and Service-Level
   Expectations (SLEs). These apply to various components within the
   customer intent topology, including nodes, links, and termination points (TPs).</t>

<section anchor="relationship-with-traffic-engineering-te-based-topology"><name>Relationship with Traffic Engineering (TE)-based Topology</name>

<t>The model defined in this document can be combined through multi-inheritance
   with other topology data models, such as Traffic Engineering (TE) topologies
   described in <xref target="RFC8795"/> or Optical Transport Network (OTN) topologies
   described in <xref target="I-D.ietf-ccamp-otn-topo-yang"/>. This flexibility allows
   the creation of technology-specific customer intent topologies tailored to
   specific network requirements.</t>

</section>
<section anchor="relationship-with-service-attachment-point-sap-topology"><name>Relationship with Service Attachment Point (SAP) Topology</name>

<t><xref target="RFC9408"/> introduces a YANG data model that represents an abstract
   view of the provider network topology. This model includes a list of
   Service Attachment Points (SAPs), where customer services can be
   connected. The SAP topology is made visible to customers by the provider
   before configuring network slice services. In contrast, the customer
   intent topology described in this document captures a customer's
   intentions, while the provider acts as the recipient of these intents.
   As a result, these two models serve distinct purposes.</t>

<t>In certain scenarios, customers can leverage the SAP topology to
   construct customer intent topologies to aid in the realization
   of their intended network configurations. For instance, within a node
   of a customer intent topology, the Link Termination Point (LTP)
   identifiers may explicitly reference their supporting Termination
   Points (TPs), which correspond to the SAPs exposed in the provider's
   SAP model. However, the specifics of this mechanism fall beyond the
   scope of this document.</t>

</section>
<section anchor="relationship-with-actn-virtual-network-vn"><name>Relationship with ACTN Virtual Network (VN)</name>

<t><xref target="RFC8453"/> and <xref target="I-D.ietf-teas-actn-vn-yang"/> introduce the concept of a Virtual
   Network (VN), which can be presented to customers. These VNs are constructed from
   abstractions of the underlying networks, specifically those that are 
   traffic-engineering (TE) capable. While VNs share similarities with IETF network slicing,
   they operate under the assumption of TE-capable networks.</t>

<t>Two distinct types of VNs are defined:</t>

<t><list style="symbols">
  <t>Type 1 VN: Modeled as a single abstract node with edge-to-edge connectivity 
between customer endpoints.</t>
  <t>Type 2 VN: Modeled as a single abstract node with an underlay topology, allowing
configuration of intended underlay paths for connections within the single abstract
node.</t>
</list></t>

<t>The topologies for VNs, including both the single-node abstract topology and the
   underlay topology, can either be mutually agreed upon between the Customer Network
   Controller (CNC) and the Multi-Domain Service Coordinator (MDSC) prior to VN creation,
   or they can be created as part of VN instantiation by the customer.</t>

<t>In the context of network slicing, <xref target="I-D.ietf-teas-ietf-network-slices"/> defines
   an IETF network slice as a collection of connectivity constructs between pairs of
   Service Demarcation Points (SDPs). This concept closely resembles the Type 1 VN,
   which is implemented as a single abstract node.</t>

<t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> further elaborates on network slices
   by incorporating references to a customer intent topology based on <xref target="RFC8345"/>. 
   This approach aligns with the ACTN Type 2 VN, although without specifying the 
   explicit use of such a topology.</t>

<t>Consequently, the data model defined in this document serves as a complementary
   option to the data model outlined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
   It empowers customers to define a customized intent topology specifically tailored
   for their network slices.</t>

</section>
<section anchor="data-model-relationship"><name>Data Model Relationship</name>

<t>The data model presented in this document builds upon the generic network
   topology model defined in <xref target="RFC8345"/>. Other data models, including OTN
   Slicing (as defined in <xref target="I-D.ietf-ccamp-yang-otn-slicing"/>), can leverage
   this extended model.</t>

<t>The relationship of the related data models is illustrated in <xref target="fig-model-relationship"/>. 
   Within this diagram, the box outlined with dotted lines specifically represents
   the data model defined in this document.</t>

<figure title="Model Relationship" anchor="fig-model-relationship"><artwork><![CDATA[
     +----------+                 +----------+
     | Network  |                 | Network  |
     | Slice    |                 | Topology +
     | NBI YANG +------+          | Model    |
     | Model    |      |          | RFC 8345 |
     +----+-----+      |          +-----+----+
          |            |                |
          |augments    |augments        |augments
          |            |                |
     +----^-----+      |          ......^.....
     | OTN      |      +----------< Network  :
     | Slicing  | augments        : Slice    :
     | Model    >-----------------: Topology :
     |          |                 : Model    :
     +----------+                 :..........:
]]></artwork></figure>

</section>
</section>
<section anchor="model-applicability"><name>Model Applicability</name>

<t>Network slicing can be achieved through various technologies. The data
   model defined in this document serves as a means for configuring
   resource reservation-based network slices. In this approach, resources for
   network slices are reserved and represented using a customer intent topology.
   This topology can then be mapped to a network resource partition (NRP)
   and realized based on the scenarios outlined in 
   <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>

<t>Network slices can be abstracted in various ways, depending on the specific
   requirements of the network slice customer. For instance, a customer might
   request a network slice with direct connectivity between pairs of Service
   Demarcation Points (SDPs). Within this network slice, each connectivity construct could be further supported by an end-to-end tunnel that follows a specific path
   defined in a customer intent topology, which the customer provides. The 
   resources associated with each link are immediately commissioned during
   the network slice configuration process.</t>

<t>Alternatively, a customer can request resources to be reserved for potential
   network slices through a customer intent topology. These reserved resources
   are not immediately commissioned at the time of the request. Instead, they
   serve as a pool of allocated resources that the customer can utilize to build
   network slices in the future. By adopting this approach, customers gain the
   flexibility to share resources across multiple endpoints and activate them
   on demand.</t>

<t>In the example shown in <xref target="fig-ns-topo-example"/>, two topology intents named as
   Network Slice Blue and Network Slice Red, are created
   by separate customers and delivered to the network slice service provider.
   The provider maps the two intents to corresponding network resource partitions (NRPs)
   internally. In realizing the network resource partitions, node virtualization
   is used to separate and allocate resources in physical devices.  Two virtual
   routers VR1 and VR2 are created over physical router R1, and two virtual
   routers VR3 and VR4 are created over physical router R2, respectively.  Each of the
   virtual routers,as a partition of the physical router, takes a portion 
   of the resources such as ports and memory in the physical router.<br />
   Depending on the requirements and the implementations, they may share 
   certain resources such as processors, ASICs, and switch fabric.</t>

<t>A network slice customer has the capability to configure customer intent topologies
   without needing any prior knowledge of the provider's network or resource
   availability. However, this approach could potentially create challenges for
   the provider in understanding and realizing the intended topology.</t>

<t>Alternatively, the provider can choose to describe the available resources and
   capabilities in the form of an abstract topology, which is then exposed to the
   customer before network slice requests. By doing so, the provider empowers the
   customer to build their customized intent topologies based on this pre-exposed
   information. This approach streamlines the process, minimizing unnecessary
   negotiations between the customer and the provider. The process and the data models
   for the provider to expose abstract topologies are outside the scope of this document.</t>

<t>The provider communicates the operational state of the customer intent topology, reflecting the allocated resources that result from negotiations between the customer and the provider. Subsequently, customers can process the requested customer intent topology and seamlessly integrate it into their own network topology. Importantly, this relationship between the customer and provider can be recursive. For instance, a customer who requests network slices can also serve as a provider, offering network slice services to its own customers further up the hierarchy.</t>

<t>As an example, Appendix B. shows the JSON encoded data instances of
   the customer topology intent for Network Slice Blue.</t>

<figure title="Network Slicing Topologies for Virtualization" anchor="fig-ns-topo-example"><artwork><![CDATA[
       Customer Topology (Merged)          Customer Topology (Merged)
       Network Slice Blue                  Network Slice Red
                            +---+         +---+      +---+
                       -----|R3 |---   ---|R2 |------|R3 |
                      /     +---+         +---+      +---+                  
      +---+      +---+        ^             ^          ^  \     +---+
   ---|R1 |------|R2 |        |             |          |   -----|R4 |---
      +---+      +---+        |             |          |        +---+
        ^          ^          v             v          v          ^
        |          |        +---+         +---+      +---+        |
        |          |   -----|VR5|---   ---|VR2|------|VR4|        |
        v          v  /     +---+         +---+      +---+        v         
      +---+      +---+                                    \     +---+
   ---|VR1|------|VR3|                                     -----|VR6|---
      +---+      +---+                                          +---+
       Customer Topology (Intended)        Customer Topology (Intended)
       Network Slice Blue                  Network Slice Red

                                 Customers
   ---------------------------------------------------------------------
                                 Provider

        Customized Topology (Network Resouce Partition)
        Provider Network with Virtual Devices

        Network Slice Blue: VR1, VR3, VR5         +---+             
                                        ----------|VR5|------
                                       /          +---+
                    +---+         +---+
              ------|VR1|---------|VR3|                              
                    +---+         +---+
              ------|VR2|---------|VR4|
                    +---+         +---+
                                       \          +---+
                                        ----------|VR6|------
        Network Slice Red: VR2, VR4, VR6          +---+

                                 Virtual Devices 
   ---------------------------------------------------------------------
                                 Physical Devices

        Native Topology
        Provider Network with Physical Devices
                                                  +---+
                                        ----------|R3 |------
                                       /          +---+
                    +---+         +---+
              ======|R1 |=========|R2 |                             
                    +---+         +---+
                                       \          +---+
                                        ----------|R4 |------
                                                  +---+
]]></artwork></figure>

</section>
<section anchor="yang-model-overview"><name>YANG Model Overview</name>

<t>Within the YANG model, the following constructs and attributes are defined:</t>

<t><list style="symbols">
  <t>Network Topology: This represents a set of shared and reserved resources,
   organized as a virtual topology connecting all endpoints. Customers can utilize
   this network topology to define detailed connectivity paths traversing the
   topology. Additionally, it enables resource sharing between different endpoints.</t>
  <t>Service-Level Objectives (SLOs): These objectives are associated with
   various objects within the topology, including nodes, links, and termination
   points. SLOs provide guidelines for achieving specific performance or quality
   targets.</t>
</list></t>

</section>
<section anchor="model-tree-structure"><name>Model Tree Structure</name>

<figure title="Tree diagram for network slice topology" anchor="fig-ietf-ns-topo-tree"><artwork><![CDATA[
module: ietf-ns-topo

  augment /nw:networks/nw:network/nw:network-types:
    +--rw network-slice!
  augment /nw:networks/nw:network:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint16
             +--rw sle-policy
                +--rw security*               identityref
                +--rw isolation*              identityref
                +--rw max-occupancy-level?    uint8
                +--rw steering-constraints
                   +--rw path-constraints
                   +--rw service-function
                   +--rw disjointness?
                           te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint16
             +--rw sle-policy
                +--rw security*               identityref
                +--rw isolation*              identityref
                +--rw max-occupancy-level?    uint8
                +--rw steering-constraints
                   +--rw path-constraints
                   +--rw service-function
                   +--rw disjointness?
                           te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint16
             +--rw sle-policy
                +--rw security*               identityref
                +--rw isolation*              identityref
                +--rw max-occupancy-level?    uint8
                +--rw steering-constraints
                   +--rw path-constraints
                   +--rw service-function
  augment /nw:networks/nw:network/nt:link:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         leafref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint16
             +--rw sle-policy
                +--rw security*               identityref
                +--rw isolation*              identityref
                +--rw max-occupancy-level?    uint8
                +--rw steering-constraints
                   +--rw path-constraints
                   +--rw service-function
                   +--rw disjointness?
                           te-types:te-path-disjointness
  augment /ietf-nss:network-slice-services/ietf-nss:slo-sle-templates
            /ietf-nss:slo-sle-template/ietf-nss:sle-policy
            /ietf-nss:steering-constraints:
    +--rw disjointness?   te-types:te-path-disjointness
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:slo-sle-policy/ietf-nss:custom
            /ietf-nss:service-slo-sle-policy/ietf-nss:sle-policy
            /ietf-nss:steering-constraints:
    +--rw disjointness?   te-types:te-path-disjointness
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:slo-sle-policy/ietf-nss:custom
            /ietf-nss:service-slo-sle-policy/ietf-nss:sle-policy
            /ietf-nss:steering-constraints:
    +--rw disjointness?   te-types:te-path-disjointness
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:slo-sle-policy/ietf-nss:custom
            /ietf-nss:service-slo-sle-policy/ietf-nss:sle-policy
            /ietf-nss:steering-constraints/ietf-nss:path-constraints:
    +--rw network-ref?    -> /nw:networks/network/network-id
    +--rw path-element* [index]
       +--rw index            uint32
       +--rw is-strict-hop?   boolean
       +--rw (type)?
          +--:(node-hop)
          |  +--rw node-id?   nw:node-id
          +--:(link-hop)
          |  +--rw link-id?   nt:link-id
          +--:(tp-hop)
             +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:steering-constraints:
    +--rw disjointness?   te-types:te-path-disjointness
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:steering-constraints
            /ietf-nss:path-constraints:
    +--rw network-ref?    -> /nw:networks/network/network-id
    +--rw path-element* [index]
       +--rw index            uint32
       +--rw is-strict-hop?   boolean
       +--rw (type)?
          +--:(node-hop)
          |  +--rw node-id?   nw:node-id
          +--:(link-hop)
          |  +--rw link-id?   nt:link-id
          +--:(tp-hop)
             +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:type
            /ietf-nss:a2a/ietf-nss:a2a-sdp/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:steering-constraints:
    +--rw disjointness?   te-types:te-path-disjointness
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:type
            /ietf-nss:a2a/ietf-nss:a2a-sdp/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:steering-constraints
            /ietf-nss:path-constraints:
    +--rw network-ref?    -> /nw:networks/network/network-id
    +--rw path-element* [index]
       +--rw index            uint32
       +--rw is-strict-hop?   boolean
       +--rw (type)?
          +--:(node-hop)
          |  +--rw node-id?   nw:node-id
          +--:(link-hop)
          |  +--rw link-id?   nt:link-id
          +--:(tp-hop)
             +--rw tp-id?     nt:tp-id
]]></artwork></figure>

</section>
<section anchor="yang-modules"><name>YANG Modules</name>

<figure title="YANG model for network slice topology" anchor="fig-ietf-ns-topo-yang"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-topo@2023-07-07.yang"
   module ietf-ns-topo {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-topo";
     prefix "ns-topo";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-te-types {
       prefix "te-types";
       reference
         "draft-ietf-teas-rfc8776-update-04: 
          Common YANG Data Types for Traffic Engineering";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-05:
          IETF Network Slice Service YANG Model";
     }
 
     organization
       "IETF CCAMP Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/ccamp/>
        WG List: <mailto:ccamp@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        generic network slices in optical transport networks, e.g.,
        Optical Transport Network (OTN).

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2023-07-07 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Groupings
      */   
     grouping ns-topo-steering-constraints {
       description
         "Policy grouping for specifying steering constraints for
          Transport Network Slices.";

       leaf disjointness {
         type te-types:te-path-disjointness;
         description
           "Indicate the level of disjointness for slice
            resources.";
       }
     }

     grouping underlay-path {
       description
         "Underlay explicit path within a customer intent
          topology.";
                 
       uses nw:network-ref;

       list path-element {
        key "index";
        description
          "List of path elements.";
        leaf index {
          type uint32;
          description
            "Index of the hop within the underlay path.";
        }
        leaf is-strict-hop {
              type boolean;
              description
                "Indicate whether the hop is strict or loose";
        }
        choice type {
          description
            "Type of the hop.";
          case node-hop {
            leaf node-id {
              type nw:node-id;
              description
                "Node identifier.";
            }
          }
          case link-hop {
            leaf link-id {
              type nt:link-id;
              description
                "Link identifier.";
            }
          }
          case tp-hop {
            leaf tp-id {
              type nt:tp-id;
              description
                "Termination Point (TP) identifier.";
            }
          }
        }
       }
     }

     /*
      * Augmented data nodes
      */
     /* network type augments */
     augment "/nw:networks/nw:network/nw:network-types" {
       description
         "Defines the Network Slice topology type.";
       container network-slice {
         presence "Indicates a Network Slice topology";
         description
           "Its presence identifies the Network Slice type.";
       }
     }
     
     /* network topology augments */
     augment "/nw:networks/nw:network" {
       when "./nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE of the topology.";

       uses ietf-nss:service-slo-sle-policy;
     }

     augment "/nw:networks/nw:network" +
             "/ns-topo:slo-sle-policy" +
             "/ns-topo:custom" +
             "/ns-topo:service-slo-sle-policy" +
             "/ns-topo:sle-policy" +
             "/ns-topo:steering-constraints" {
       when "../../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "Steering constraints for the topology.";

       uses ns-topo-steering-constraints;
     }

     /* network node augments */
     augment "/nw:networks/nw:network/nw:node" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for nodes.";

       uses ietf-nss:service-slo-sle-policy;
     }

     augment "/nw:networks/nw:network/nw:node" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" +
             "/ns-topo:sle-policy" +
             "/ns-topo:steering-constraints" {
       when "../../../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "Steering constraints for nodes.";

       uses ns-topo-steering-constraints;
     }

     /* network node's termination point augments */
     augment "/nw:networks/nw:network/nw:node" +
             "/nt:termination-point" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for termination points.";
     
     uses ietf-nss:service-slo-sle-policy;
     }
   
     /* network link augments */
     augment "/nw:networks/nw:network/nt:link" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for links.";

       uses ietf-nss:service-slo-sle-policy;
     }

     augment "/nw:networks/nw:network/nt:link" +
             "/ns-topo:slo-sle-policy" + 
             "/ns-topo:custom" + 
             "/ns-topo:service-slo-sle-policy" + 
             "/ns-topo:sle-policy" +
             "/ns-topo:steering-constraints" {
       when "../../../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }

       description
       "Steering constraints for links.";

       uses ns-topo-steering-constraints;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slo-sle-templates" +
             "/ietf-nss:slo-sle-template" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" {
       description
           "Steering constraints for network slice service
            templates.";
  
       uses ns-topo-steering-constraints;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" + 
             "/ietf-nss:steering-constraints" {
       description
           "Steering constraints for network slice services.";
          
       uses ns-topo-steering-constraints;
     }

     /* connectivity construct augments */
     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" {
       description
         "Steering constraints for connectivity-constructs
          within a network slice.";

       uses ns-topo-steering-constraints;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connection group.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" {
       description
         "Steering constraints for connectivity constructs
          within a network slice.";

       uses ns-topo-steering-constraints;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connection group.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:type" +
             "/ietf-nss:a2a" +
             "/ietf-nss:a2a-sdp" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" {
       description
         "Steering constraints for a2a connectivity-constructs.";

       uses ns-topo-steering-constraints;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:type" +
             "/ietf-nss:a2a" +
             "/ietf-nss:a2a-sdp" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:steering-constraints" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for a2a connectivity constructs.";
 
       uses underlay-path;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="manageability-considerations"><name>Manageability Considerations</name>

<t>To ensure the security and controllability of physical resource
   isolation, slice-based independent operation and management are
   required to achieve management isolation.
   Each network slice typically requires dedicated accounts,
   permissions, and resources for independent access and O&amp;M. This
   mechanism is to guarantee the information isolation among slice
   tenants and to avoid resource conflicts. The access to slice
   management functions will only be permitted after successful security
   checks.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>

<t>The NETCONF access control model <xref target="RFC8341"/> provides the means to
   restrict access for particular NETCONF or RESTCONF users to a
   preconfigured subset of all available NETCONF or RESTCONF protocol
   operations and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   to these data nodes without proper protection can have a negative
   effect on network operations.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

<t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>It is proposed to IANA to assign new URIs from the "IETF XML
   Registry" <xref target="RFC3688"/> as follows:</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers a YANG module in the YANG Module Names
   registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   name: ietf-ns-topo
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   prefix: ns-topo
   reference: RFC XXXX
]]></artwork></figure>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7950'/>
  <seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>

<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='N. Bahadur' initials='N.' surname='Bahadur'/>
    <author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8345'/>
  <seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>

<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'/>
    <author fullname='P. Shafer' initials='P.' surname='Shafer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <author fullname='R. Wilton' initials='R.' surname='Wilton'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8342'/>
  <seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>

<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='215'/>
  <seriesInfo name='RFC' value='8340'/>
  <seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>

<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
  <front>
    <title>Common YANG Data Types</title>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <date month='July' year='2013'/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6991'/>
  <seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>

<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='H. Shah' initials='H.' surname='Shah'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <date month='August' year='2020'/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8795'/>
  <seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>

<reference anchor='RFC9408' target='https://www.rfc-editor.org/info/rfc9408'>
  <front>
    <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
    <author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <author fullname='S. Barguil' initials='S.' surname='Barguil'/>
    <author fullname='Q. Wu' initials='Q.' surname='Wu'/>
    <author fullname='V. Lopez' initials='V.' surname='Lopez'/>
    <date month='June' year='2023'/>
    <abstract>
      <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
      <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9408'/>
  <seriesInfo name='DOI' value='10.17487/RFC9408'/>
</reference>

<reference anchor='RFC8453' target='https://www.rfc-editor.org/info/rfc8453'>
  <front>
    <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
    <author fullname='D. Ceccarelli' initials='D.' role='editor' surname='Ceccarelli'/>
    <author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
      <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
      <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8453'/>
  <seriesInfo name='DOI' value='10.17487/RFC8453'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>

<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname='M. Wasserman' initials='M.' surname='Wasserman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6242'/>
  <seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>

<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
  <front>
    <title>The IETF XML Registry</title>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <date month='January' year='2004'/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='81'/>
  <seriesInfo name='RFC' value='3688'/>
  <seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>

<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='October' year='2010'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6020'/>
  <seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>

<reference anchor='RFC7951' target='https://www.rfc-editor.org/info/rfc7951'>
  <front>
    <title>JSON Encoding of Data Modeled with YANG</title>
    <author fullname='L. Lhotka' initials='L.' surname='Lhotka'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7951'/>
  <seriesInfo name='DOI' value='10.17487/RFC7951'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-teas-ietf-network-slices' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slices-25'>
   <front>
      <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
      <author fullname='Adrian Farrel' initials='A.' surname='Farrel'>
         <organization>Old Dog Consulting</organization>
      </author>
      <author fullname='John Drake' initials='J.' surname='Drake'>
         <organization>Juniper Networks</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Shunsuke Homma' initials='S.' surname='Homma'>
         <organization>NTT</organization>
      </author>
      <author fullname='Kiran Makhijani' initials='K.' surname='Makhijani'>
         <organization>Futurewei</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Nvidia</organization>
      </author>
      <date day='14' month='September' year='2023'/>
      <abstract>
	 <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term &quot;IETF Network
   Slice&quot; to describe this type of network slice, and establishes the
   general principles of network slicing in the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slices-25'/>
   
</reference>


<reference anchor='I-D.ietf-ccamp-yang-otn-slicing' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-yang-otn-slicing-06'>
   <front>
      <title>Framework and Data Model for OTN Network Slicing</title>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Yunbin Xu' initials='Y.' surname='Xu'>
         <organization>CAICT</organization>
      </author>
      <author fullname='Yang Zhao' initials='Y.' surname='Zhao'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <date day='24' month='January' year='2024'/>
      <abstract>
	 <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and
   defines YANG data models with OTN technology-specific augments
   deployed at both the north and south bound of the OTN network slice
   controller.  Additional YANG data model augmentations will be defined
   in a future version of this draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-yang-otn-slicing-06'/>
   
</reference>


<reference anchor='I-D.contreras-teas-slice-controller-models' target='https://datatracker.ietf.org/doc/html/draft-contreras-teas-slice-controller-models-05'>
   <front>
      <title>IETF Network Slice Controller and its associated data models</title>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>IBM Corporation</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-contreras-teas-slice-controller-models-05'/>
   
</reference>


<reference anchor='I-D.ietf-teas-ietf-network-slice-nbi-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice-nbi-yang-09'>
   <front>
      <title>A YANG Data Model for the RFC AAAA Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='17' month='February' year='2024'/>
      <abstract>
	 <t>   This document defines a YANG data model for RFC AAAA Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC AAAA
   Network Slice Services.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-09'/>
   
</reference>


<reference anchor='I-D.ietf-teas-rfc8776-update' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-rfc8776-update-10'>
   <front>
      <title>Common YANG Data Types for Traffic Engineering</title>
      <author fullname='Italo Busi' initials='I.' surname='Busi'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems Inc.</organization>
      </author>
      <author fullname='Igor Bryskin' initials='I.' surname='Bryskin'>
         <organization>Individual</organization>
      </author>
      <date day='22' month='February' year='2024'/>
      <abstract>
	 <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   types and groupings are intended to be imported by modules that model
   Traffic Engineering (TE) configuration and state capabilities.  This
   document obsoletes RFC 8776.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-rfc8776-update-10'/>
   
</reference>


<reference anchor='I-D.ietf-ccamp-otn-topo-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-otn-topo-yang-17'>
   <front>
      <title>A YANG Data Model for Optical Transport Network Topology</title>
      <author fullname='Haomian Zheng' initials='H.' surname='Zheng'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Italo Busi' initials='I.' surname='Busi'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>IBM Corporation</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Oscar Gonzalez de Dios' initials='O. G.' surname='de Dios'>
         <organization>Telefonica</organization>
      </author>
      <date day='10' month='July' year='2023'/>
      <abstract>
	 <t>   This document describes a YANG data model to describe the topologies
   of an Optical Transport Network (OTN).  It is independent of control
   plane protocols and captures topological and resource-related
   information pertaining to OTN.  This model enables clients, which
   interact with a transport domain controller, for OTN topology-related
   operations such as obtaining the relevant topology resource
   information.


	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-otn-topo-yang-17'/>
   
</reference>


<reference anchor='I-D.ietf-teas-actn-vn-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-actn-vn-yang-23'>
   <front>
      <title>A YANG Data Model for Virtual Network (VN) Operations</title>
      <author fullname='Young Lee' initials='Y.' surname='Lee'>
         <organization>Samsung Electronics</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Daniele Ceccarelli' initials='D.' surname='Ceccarelli'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Igor Bryskin' initials='I.' surname='Bryskin'>
         <organization>Individual</organization>
      </author>
      <author fullname='Bin Yeong Yoon' initials='B. Y.' surname='Yoon'>
         <organization>ETRI</organization>
      </author>
      <date day='30' month='January' year='2024'/>
      <abstract>
	 <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants.  This
   document provides a YANG data model generally applicable to any mode
   of VN operations.  This includes VN operations as per Abstraction and
   Control of TE Networks (ACTN) framework.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-actn-vn-yang-23'/>
   
</reference>




    </references>


<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank Danielle Ceccarelli, Bo Wu,
   Mohamed Boucadair, and Vishnu Beeram for providing valuable
   insights.</t>

</section>
<section anchor="data-tree-for-the-example-in-section-3"><name>Data Tree for the Example in Section 3</name>

<section anchor="native-topology"><name>Native Topology</name>

<t>This section contains an example of an instance data tree in the JSON
   encoding <xref target="RFC7951"/>.  The example instantiates "ietf-network" for the
   topology of Network Slice Blue depicted in <xref target="fig-ns-topo-example"/>.</t>

<figure><artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "example-customized-blue-topology",
        "network-types": {
          "ietf-ns-topo:network-slice": {
          }
        },
        "node": [
          {
            "node-id": "VR1",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "1-0-1"
              },
              {
                "tp-id": "1-3-1"
              }
            ]
          },
          {
            "node-id": "VR3",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "3-1-1"
              },
              {
                "tp-id": "3-5-1"
              }
            ]
          },
          {
            "node-id": "VR5",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "5-3-1"
              },
              {
                "tp-id": "5-0-1"
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "VR1,1-0-1,,",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 60
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": ",,VR1,1-0-1",
            "destination": {
              "dest-node": "VR1",
              "dest-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR1,1-3-1,VR3,3-1-1",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-1-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-1-1,VR1,1-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-1-1"
            },
            "destination": {
              "dest-node": "R1",
              "dest-tp": "1-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-5-1,VR5,5-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-5-1"
            },
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-3-1,VR3,3-5-1",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-5-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-0-1,,",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              }
                        }
          },
          {
            "link-id": ",,VR5,5-0-1",
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          }
        ],
        "ietf-ns-topo:service-slo-sle-policy": {
          "sle-policy": {
            "isolation": [
              {
                "ietf-network-slice-service:service-traffic-isolati\
on"
              }
            ]
          } 
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

