<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.19 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-liu-teas-transport-network-slice-yang-10" category="std">

  <front>
    <title abbrev="Network Slice Topology Data Model">IETF Network Slice Topology YANG Data Model</title>

    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Microsoft</organization>
      <address>
        <email>jefftant.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>
    <author initials="L.M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Belotti" fullname="Sergio Belotti">
      <organization>Nokia</organization>
      <address>
        <email>Sergio.belotti@nokia.com</email>
      </address>
    </author>
    <author initials="R." surname="Rokui" fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <email>rrokui@ciena.com</email>
      </address>
    </author>
    <author initials="A." surname="Guo" fullname="Aihua Guo">
      <organization>Futurewei</organization>
      <address>
        <email>aihuaguo.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="07"/>

    
    <workgroup>TEAS Working Group</workgroup>
    

    <abstract>


<t>An RFC 9543 network slice customer may utilize intent-based topologies to
   express resource reservation intentions within the provider's network.
   These customer-defined intent topologies allow customers to request
   shared resources for future connections that can be flexibly allocated
   and customized. Additionally, they provide an extensive level of control
   over underlay service paths within the network slice.</t>

<t>This document describes a YANG data model for expressing customer intent
   topologies which can be used to enhance the RFC 9543 Network Slice Services
   in specific use cases, such as Network wholesale scenarios, where both topology
   and connectivity intents need to be expressed.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Network service providers utilize topologies to convey controlled information
   about their networks, such as bandwidth availability and connectivity, 
   with customers, to facilitates customer service requests. Customers can also
   define intent-based topologies to streamline their internal operations. When
   requesting provider support for such custom topologies, they are considered
   as customer intent topologies.</t>

<t>In the context of network slicing, customer intent topologies enables customers
   to express resource reservation preferences. These topologies allow flexible
   configuration and activation of network slices on demand. By providing full
   control over resource allocation timing and methods, customer intent topologies
   ensure that resources are consistently available. Moreover, the resources
   reserved via customer intent topologies can be shared across network slices created
   at different times or between different connectivity constructs within the same slice.
   Compared to network slices with dedicated full-mesh connectivity constructs between
   endpoints, network slices utilizing customer intent topologies can reduce overall
   resource requirements, offering significant economic benefits to the customer.</t>

<t>Consider a hub-and-spoke network slice scenario where multiple customer spoke
   sites dynamically connect to a central hub site, sharing available bandwidth.
   By designing a customer intent topology with two virtual nodes - one representing
   all the spoke sites and the other representing the hub site - connected via
   a shared link, we proactively reserve resources for the shared connection.
   This ensures that bandwidth is readily available whenever the customer requires
   it. In contrast, achieving equivalent bandwidth assurance through individual
   dedicated connectivity constructs would necessitate creating separate links between each
   spoke and the hub, which would lead to substantial bandwidth inefficiency.</t>

<t>Customer intent topology complements connectivity-based network slicing by providing
   customers a mechanism to specify additional underlay service paths to gain
   extensive control over specific or all connectivity constructs within the network slice,
   as outlined in <xref target="RFC9543"/>.</t>

<t>A customer intent topology is defined within the customer's context. It can include pure customer information or may also refer to network
   resources identifiable within the provider's context. There is a minimum
   level of a-prior shared knowledge between the customer and the provider,
   and this is the same information needed to supported connectivity-based
   network slice services as desdribed in <xref target="RFC9543"/>.
   The provider's responsibility lies in understanding the customer intent topology request and translating that into suitable realization within their domain.</t>

<t>This document introduces a YANG data model, based on <xref target="RFC7950"/>, for
   configuring customer intent topologies. The YANG model extends the existing
   data model from <xref target="RFC8345"/>, allowing customers to express desired
   service-level objectives (SLOs) and service-level expectations (SLEs)
   across different elements within the customer intent topology.</t>

<t>The defined data model serves as an interface between customers and providers,
   enabling configurations and state retrievals for network slicing as a service.
   Customers can use this model to request or negotiate the creation of network
   slice instances. Additionally, they can incrementally adjust requirements for
   individual topology elements within the slice - for instance, adding or removing
   nodes or links, updating link bandwidth - and retrieve operational states.
   Leveraging other IETF mechanisms and data models, telemetry information can
   also be convey to the customer.</t>

<t>The YANG model encompasses constructs that are independent of specific technologies,
   accommodating network slicing across diverse layers (including IP/MPLS, MPLS-TP,
   OTN, and WDM optical). As a result, this model serves as a foundational framework
   upon which technology-specific network slicing models - such as 
   <xref target="I-D.ietf-ccamp-yang-otn-slicing"/> - can be developed.</t>

<t>Section 3 of <xref target="I-D.contreras-teas-slice-controller-models"/> outlines that the use
   of customer intent topologies and resource reservation control is optional within network
   slicing. These features complement the data model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) <xref target="RFC8342"/>.</t>

<section anchor="use-case-applicability"><name>Use Case Applicability</name>

<t>In Traffic Engineering (TE)-enabled networks like Layer-0/1 transport (OTN, MW, DWDM), customer intent topology is useful for routing RFC 9543 network slices across varied paths with TE constraints. Thus, most of the use cases for which this model target are transport oriented. Nonetheless, it is also relevant to non-transport networks like IP/MPLS, where customers may use intent topologies to influence the realization of network slices. These intents help build the logical view of the desired RFC 9543 Network Slice service (and its constituent parts), aiding providers in fulfilling slice requests and defining the service instantiation.</t>

<section anchor="use-case-1-multi-tenancy-in-network-wholesaling"><name>Use Case 1 : Multi-tenancy in Network Wholesaling</name>

<t>A typical use case in which the customer intent topology is essential is the wholesale multi-tenant case. Here, customer C may acquire a network slice from provider P and resell sub-slices to other customers/tenants. The creation of these sub-slices within C's slice necessitates specifying a topology intent - reflecting the topology of C's purchased slice - as a key input parameter.</t>

</section>
<section anchor="use-case-2-"><name>Use Case 2 :</name>

<t>The current expression of slice requests leveraging on <xref target="I-D.draft-ietf-teas-ietf-network-slice-nbi-yang"/> allows the customer to request distinct connectivity constructs as part of the same Network Resource Partition (NRP). The topology provided by the customer could imply different NRPs, instead.</t>

<t>As an another example, from realization perspective even on the same NRP, a slice requests leveraging on <xref target="I-D.draft-ietf-teas-ietf-network-slice-nbi-yang"/> without topology differentiation could imply the realization of all the connectivity constructs on the same manner. For instance, implementing all of them within the same VRF in a L3VPN. The usage of the topological views can help the provider to infer differentiated realization of some of the connectivity constructs, for instance, by implementing them on different VRFs. This can have operational advantages (e.g., adding new nodes / SDPs could affect / imply limit the necessary VRF reconfiguration only to the one including affected connectivity constructs).</t>

<t>Finally, by using customer intent topology it can be easier for the slice provider to infer different technologies for sets of connectivity constructs of every topology segment (e.g., IP/MPLS, optical, microwave, etc).</t>

</section>
</section>
<section anchor="terminologies-and-notations"><name>Terminologies and Notations</name>

<t>The following terminologies for describing network slices are defined in 
   <xref target="RFC9543"/> and are not redefined herein.</t>

<t><list style="symbols">
  <t>Network Slice (NS)</t>
  <t>Network Slice Customer</t>
  <t>Network Slice Service Provider</t>
  <t>Network Slice Controller (NSC)</t>
  <t>Network Resource Partition (NRP)</t>
</list></t>

<t>The following terms are defined and used in this document.</t>

<t><list style="symbols">
  <t>Customer Intent Topology:
  A topology defined by the customer and provided as input to the
      network slice service provider (specifically, the Network Slice
      Controller or NSC). It represents the customer's desired network
      topology.</t>
  <t>Abstract Topology:
  A topology exposed to the customer by the network slice service
      provider prior to the creation of network slices. The provider
      may optionally uses an abstract topology to expose useful information,
  such as available resources to the customer, which can facilitate
      the build-up of customer intent topologies by the customer.</t>
  <t>NRP Topology:
  A topology internal to the NSC to facilitate the mapping of
      network slices to underlying network resources.</t>
</list></t>

</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t>Tree diagrams used in this document follow the notation defined in
   <xref target="RFC8340"/>.</t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects
   are prefixed using the standard prefix associated with the
   corresponding YANG imported modules, as shown in <xref target="tab-prefixes"/>.</t>

<texttable title="Prefixes and Corresponding YANG Modules" anchor="tab-prefixes">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG Module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>nt</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>nw</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>tet</c>
      <c>ietf-te-topology</c>
      <c><xref target="RFC8795"/></c>
      <c>ns-path</c>
      <c>ietf-ns-underlay-path</c>
      <c>RFC XXXX</c>
      <c>ns-topo</c>
      <c>ietf-ns-topo</c>
      <c>RFC XXXX</c>
      <c>ietf-nss</c>
      <c>ietf-network-slice-service</c>
      <c>RFC YYYY</c>
</texttable>

<t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please replace YYYY with the RFC number assigned to <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
Please remove this note.</t>

</section>
</section>
<section anchor="modeling-considerations"><name>Modeling Considerations</name>

<t>A network slice topology is a cusomer intent topology 
   modeled as network topology defined in <xref target="RFC8345"/>, with augmentations. 
   A new network type "network-slice" is defined in this document.<br />
   When a network topology data instance contains the network-slice 
   network type, it represents an instance of a network slice 
   topology.</t>

<t>This data model augments the network topology model by incorporating 
   intent-based Service-Level Objectives (SLOs) and Service-Level
   Expectations (SLEs). These apply to various components within the
   customer intent topology, including nodes, links, and termination points (TPs).</t>

<section anchor="relationship-with-traffic-engineering-te-based-topology"><name>Relationship with Traffic Engineering (TE)-based Topology</name>

<t>The model defined in this document can be combined through multi-inheritance
   with other topology data models, such as Traffic Engineering (TE) topologies
   described in <xref target="RFC8795"/> or Optical Transport Network (OTN) topologies
   described in <xref target="I-D.ietf-ccamp-otn-topo-yang"/>. This flexibility allows
   the creation of technology-specific customer intent topologies tailored to
   specific network requirements.</t>

</section>
<section anchor="relationship-with-service-attachment-point-sap-topology"><name>Relationship with Service Attachment Point (SAP) Topology</name>

<t><xref target="RFC9408"/> introduces a YANG data model that represents an abstract
   view of the provider network topology. This model includes a list of
   Service Attachment Points (SAPs), where customer services can be
   connected. The SAP topology is made visible to customers by the provider
   before configuring network slice services. In contrast, the customer
   intent topology described in this document captures a customer's
   intentions, while the provider acts as the recipient of these intents.
   As a result, these two models serve distinct purposes.</t>

<t>In certain scenarios, customers can leverage the SAP topology to
   construct customer intent topologies to aid in the realization
   of their intended network configurations. For instance, within a node
   of a customer intent topology, the Link Termination Point (LTP)
   identifiers may explicitly reference their supporting Termination
   Points (TPs), which correspond to the SAPs exposed in the provider's
   SAP model. However, the specifics of this mechanism fall beyond the
   scope of this document.</t>

</section>
<section anchor="relationship-with-actn-virtual-network-vn"><name>Relationship with ACTN Virtual Network (VN)</name>

<t><xref target="RFC8453"/> and <xref target="I-D.ietf-teas-actn-vn-yang"/> introduce the concept of a Virtual
   Network (VN), which can be presented to customers. These VNs are constructed from
   abstractions of the underlying networks, specifically those that are 
   traffic-engineering (TE) capable. While VNs share similarities with RFC 9543 network slicing,
   they operate under the assumption of TE-capable networks.</t>

<t>Two distinct types of VNs are defined:</t>

<t><list style="symbols">
  <t>Type 1 VN: Modeled as a single abstract node with edge-to-edge connectivity 
between customer endpoints.</t>
  <t>Type 2 VN: Modeled as a single abstract node with an underlay topology, allowing
configuration of intended underlay paths for connections within the single abstract
node.</t>
</list></t>

<t>The topologies for VNs, including both the single-node abstract topology and the
   underlay topology, can either be mutually agreed upon between the Customer Network
   Controller (CNC) and the Multi-Domain Service Coordinator (MDSC) prior to VN creation,
   or they can be created as part of VN instantiation by the customer.</t>

<t>In the context of network slicing, <xref target="RFC9543"/> defines
   a network slice service as a collection of connectivity constructs between pairs of
   Service Demarcation Points (SDPs). This concept closely resembles the Type 1 VN,
   which is implemented as a single abstract node.</t>

<t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> further elaborates on network slices
   by incorporating references to a customer intent topology based on <xref target="RFC8345"/>. 
   This approach aligns with the ACTN Type 2 VN, although without specifying the 
   explicit use of such a topology.</t>

<t>Consequently, the data model defined in this document serves as a complementary
   option to the data model outlined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
   It empowers customers to define a customized intent topology specifically tailored
   for their network slices.</t>

<section anchor="consideration-on-reusing-actn-vn-for-network-slicing"><name>Consideration on Reusing ACTN VN for Network Slicing</name>

<t>The ACTN VN model provides a self-consistent method for expressing connectivity intents (Type 1 VN)
   and optional path constraints (Type 2 VN) using TE metrics and TE objective functions defined in
   <xref target="RFC8795"/>. Type 2 VN path constraints rely on Type 1 VN for expressing connectivity intents.</t>

<t>On the other hand, RFC9543 network slice services provide connectivity intents equivalent to Type 1 VN, using SLO and SLE attributes in a technology-agnostic manner not tied to TE technologies. This
   distinction is detailed in Appendix D of <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>Reusing the Type 2 VN for defining customer intent topologies alongside the RFC9543 network slice service model would result in duplicated information for connectivity intents (SDPs and connectivity-constructs vs. LTPs and connectivity matrices), and additionally, would bind the network slice solution to TE technologies.</t>

<t>The proposed models in this draft aim to deliver a solution equivalent to Type 2 VN within the
   context of network slicing. This complements the existing solution outlined in
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, while ensuring consistency.</t>

</section>
</section>
<section anchor="data-model-relationship"><name>Data Model Relationship</name>

<t>The data model presented in this document builds upon the generic network
   topology model defined in <xref target="RFC8345"/>. Other data models, including OTN
   Slicing (as defined in <xref target="I-D.ietf-ccamp-yang-otn-slicing"/>), can leverage
   this extended model.</t>

<t>The relationship of the related data models is illustrated in <xref target="fig-model-relationship"/>. 
   Within this diagram, the box outlined with dotted lines specifically represents
   the data model defined in this document.</t>

<figure title="Model Relationship" anchor="fig-model-relationship"><artwork><![CDATA[
     +----------+                 +----------+
     | Network  |                 | Network  |
     | Slice    |                 | Topology +
     | NBI YANG +------+          | Model    |
     | Model    |      |          | RFC 8345 |
     +----+-----+      |          +-----+----+
          |            |                |
          |augments    |augments        |augments
          |            |                |
     +----^-----+      |          ......^.....
     | OTN      |      +----------< Network  :
     | Slicing  | augments        : Slice    :
     | Model    >-----------------: Topology :
     |          |                 : Model    :
     +----------+                 :..........:
]]></artwork></figure>

</section>
</section>
<section anchor="model-applicability"><name>Model Applicability</name>

<t>Network slicing can be achieved through various technologies. The data
   model defined in this document serves as a means for configuring
   resource reservation-based network slices. In this approach, resources for
   network slices are reserved and represented using a customer intent topology.
   This topology can then be mapped to a network resource partition (NRP)
   and realized based on the scenarios outlined in <xref target="RFC9543"/>.</t>

<t>Network slices can be abstracted in various ways, depending on the specific
   requirements of the network slice customer. For instance, a customer might
   request a network slice with direct connectivity between pairs of Service
   Demarcation Points (SDPs). Within this network slice, each connectivity construct
   could be further supported by an end-to-end tunnel that follows a specific path
   defined in a customer intent topology, which the customer provides. The 
   resources associated with each link are immediately commissioned during
   the network slice configuration process.</t>

<t>Alternatively, a customer can request resources to be reserved for potential
   network slices through a customer intent topology. These reserved resources
   are not immediately commissioned at the time of the request. Instead, they
   serve as a pool of allocated resources that the customer can utilize to build
   network slices in the future. By adopting this approach, customers gain the
   flexibility to share resources across multiple endpoints and activate them
   on demand.</t>

<t>In the example shown in <xref target="fig-ns-topo-example"/>, two topology intents named as
   Network Slice Blue and Network Slice Red, are created
   by separate customers and delivered to the network slice service provider.
   The provider maps the two intents to corresponding network resource partitions (NRPs)
   internally. In realizing the network resource partitions, node virtualization
   is used to separate and allocate resources in physical devices.  Two virtual
   routers VR1 and VR2 are created over physical router R1, and two virtual
   routers VR3 and VR4 are created over physical router R2, respectively.  Each of the
   virtual routers,as a partition of the physical router, takes a portion 
   of the resources such as ports and memory in the physical router.<br />
   Depending on the requirements and the implementations, they may share 
   certain resources such as processors, ASICs, and switch fabric.</t>

<t>A network slice customer has the capability to configure customer intent topologies
   without needing any prior knowledge of the provider's network or resource
   availability. However, this approach could potentially create challenges for
   the provider in understanding and realizing the intended topology.</t>

<t>Alternatively, the provider can choose to describe the available resources and
   capabilities in the form of an abstract topology, which is then exposed to the
   customer before network slice requests. By doing so, the provider empowers the
   customer to build their customized intent topologies based on this pre-exposed
   information. This approach streamlines the process, minimizing unnecessary
   negotiations between the customer and the provider. The process and the data models
   for the provider to expose abstract topologies are outside the scope of this document.</t>

<t>The provider communicates the operational state of the customer intent topology, reflecting the allocated resources that result from negotiations between the customer and the provider. Subsequently, customers can process the requested customer intent topology and seamlessly integrate it into their own network topology. Importantly, this relationship between the customer and provider can be recursive. For instance, a customer who requests network slices can also serve as a provider, offering network slice services to its own customers further up the hierarchy.</t>

<t>As an example, Appendix B. shows the JSON encoded data instances of
   the customer topology intent for Network Slice Blue.</t>

<figure title="Network Slicing Topologies for Virtualization" anchor="fig-ns-topo-example"><artwork><![CDATA[
       Customer Topology (Merged)          Customer Topology (Merged)
       Network Slice Blue                  Network Slice Red
                            +---+         +---+      +---+
                       -----|R3 |---   ---|R2 |------|R3 |
                      /     +---+         +---+      +---+                  
      +---+      +---+        ^             ^          ^  \     +---+
   ---|R1 |------|R2 |        |             |          |   -----|R4 |---
      +---+      +---+        |             |          |        +---+
        ^          ^          v             v          v          ^
        |          |        +---+         +---+      +---+        |
        |          |   -----|VR5|---   ---|VR2|------|VR4|        |
        v          v  /     +---+         +---+      +---+        v         
      +---+      +---+                                    \     +---+
   ---|VR1|------|VR3|                                     -----|VR6|---
      +---+      +---+                                          +---+
       Customer Topology (Intended)        Customer Topology (Intended)
       Network Slice Blue                  Network Slice Red

                                 Customers
   ---------------------------------------------------------------------
                                 Provider

        Customized Topology (Network Resouce Partition)
        Provider Network with Virtual Devices

        Network Slice Blue: VR1, VR3, VR5         +---+             
                                        ----------|VR5|------
                                       /          +---+
                    +---+         +---+
              ------|VR1|---------|VR3|                              
                    +---+         +---+
              ------|VR2|---------|VR4|
                    +---+         +---+
                                       \          +---+
                                        ----------|VR6|------
        Network Slice Red: VR2, VR4, VR6          +---+

                                 Virtual Devices 
   ---------------------------------------------------------------------
                                 Physical Devices

        Native Topology
        Provider Network with Physical Devices
                                                  +---+
                                        ----------|R3 |------
                                       /          +---+
                    +---+         +---+
              ======|R1 |=========|R2 |                             
                    +---+         +---+
                                       \          +---+
                                        ----------|R4 |------
                                                  +---+
]]></artwork></figure>

</section>
<section anchor="yang-model-overview"><name>YANG Model Overview</name>

<t>The YANG data model in this draft consists of two modules for flexible use
   and augmentation:
   - The first YANG module defines a customer intent topology, with SLO and SLE
   associated with the topological constructs.
   - The second YANG module extends the YANG model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> by adding underlay paths to
   the connectivity constructs.</t>

<t>Within the YANG model, the following constructs and attributes are defined:
   - Network Topology: This represents a set of shared and reserved resources,
   organized as a virtual topology connecting all endpoints. Customers can utilize
   this network topology to define detailed connectivity paths traversing the
   topology. Additionally, it enables resource sharing between different endpoints.</t>

<t><list style="symbols">
  <t>Service-Level Objectives (SLOs): These objectives are associated with
   various objects within the topology, including nodes, links, and termination
   points. SLOs provide guidelines for achieving specific performance or quality
   targets.</t>
</list></t>

</section>
<section anchor="model-tree-structure"><name>Model Tree Structure</name>

<section anchor="network-slice-topology-model-tree-structure"><name>Network Slice Topology Model Tree Structure</name>
<figure title="Tree diagram for network slice topology" anchor="fig-ietf-ns-topo-tree"><artwork><![CDATA[
module: ietf-ns-topo

  augment /nw:networks/nw:network/nw:network-types:
    +--rw network-slice!
  augment /nw:networks/nw:network:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nt:link:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
]]></artwork></figure>

</section>
<section anchor="network-slice-underlay-path-model-tree-structure"><name>Network Slice Underlay Path Model Tree Structure</name>
<figure title="Tree diagram for underlay path" anchor="fig-ietf-ns-underlay-path-tree"><artwork><![CDATA[
module: ietf-ns-underlay-path

  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:slo-sle-policy/ietf-nss:custom
            /ietf-nss:service-slo-sle-policy/ietf-nss:sle-policy
            /ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:type
            /ietf-nss:a2a/ietf-nss:a2a-sdp/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
]]></artwork></figure>

</section>
</section>
<section anchor="yang-modules"><name>YANG Modules</name>

<section anchor="yang-module-for-network-slice-topology"><name>YANG Module for Network Slice Topology</name>
<figure title="YANG model for network slice topology" anchor="fig-ietf-ns-topo-yang"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-topo@2024-07-02.yang"
   module ietf-ns-topo {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-topo";
     prefix "ns-topo";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-10:
          IETF Network Slice Service YANG Model";
     }
 
     organization
       "IETF TEAS Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/teas/>
        WG List: <mailto:teas@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        customer intent topologies for RFC9543 network slices.

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2024-07-02 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Augmented data nodes
      */
     /* network type augments */
     augment "/nw:networks/nw:network/nw:network-types" {
       description
         "Defines the Network Slice topology type.";
       container network-slice {
         presence "Indicates a Network Slice topology";
         description
           "Its presence identifies the Network Slice type.";
       }
     }
     
     /* network topology augments */
     augment "/nw:networks/nw:network" {
       when "./nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for topology.";

       uses ietf-nss:service-slo-sle-policy;
     }

     /* network node augments */
     augment "/nw:networks/nw:network/nw:node" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for nodes.";

       uses ietf-nss:service-slo-sle-policy;
     }

     /* network node's termination point augments */
     augment "/nw:networks/nw:network/nw:node" +
             "/nt:termination-point" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for termination points.";
     
     uses ietf-nss:service-slo-sle-policy;
     }
   
     /* network link augments */
     augment "/nw:networks/nw:network/nt:link" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for links.";

       uses ietf-nss:service-slo-sle-policy;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="yang-module-for-network-slice-underlay-path"><name>YANG Module for Network Slice Underlay Path</name>
<figure title="YANG model for underlay path" anchor="fig-ietf-ns-underlay-path"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-underlay-path@2024-07-02.yang"
   module ietf-ns-underlay-path {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path";
     prefix "ns-path";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-05:
          IETF Network Slice Service YANG Model";
     }
 
     organization
       "IETF TEAS Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/teas/>
        WG List: <mailto:teas@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        the underlay path of connectivity intent over a customer
        intent topology for RFC9543 network slices.

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2024-07-02 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Groupings
      */   
     grouping underlay-path {
       description
         "Underlay explicit path within a customer intent
          topology.";
 
       container underlay-path {
         description
           "Defines an underlay explicit path within specific
            customer intent topology.";
 
         uses nw:network-ref;

         list path-element {
          key "index";
          description
            "List of path elements.";
          leaf index {
            type uint32;
            description
              "Index of the hop within the underlay path.";
          }
          leaf is-strict-hop {
            type boolean;
            description
              "Indicate whether the hop is strict or loose";
          }
          choice type {
            description
              "Type of the hop.";
            case node-hop {
              leaf node-id {
                type nw:node-id;
                description
                  "Node identifier.";
              }
            }
            case link-hop {
              leaf link-id {
                type nt:link-id;
                description
                  "Link identifier.";
              }
            }
            case tp-hop {
              leaf tp-id {
                type nt:tp-id;
                description
                  "Termination Point (TP) identifier.";
              }
            }
          }
         }
       }
     } 

     /*
      * Augmented data nodes
      */
     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connection group.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connectivity construct.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:type" +
             "/ietf-nss:a2a" +
             "/ietf-nss:a2a-sdp" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for a2a connectivity constructs.";
 
       uses underlay-path;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="manageability-considerations"><name>Manageability Considerations</name>

<t>To ensure the security and controllability of physical resource
   isolation, slice-based independent operation and management are
   required to achieve management isolation.
   Each network slice typically requires dedicated accounts,
   permissions, and resources for independent access and O&amp;M. This
   mechanism is to guarantee the information isolation among slice
   tenants and to avoid resource conflicts. The access to slice
   management functions will only be permitted after successful security
   checks.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>

<t>The NETCONF access control model <xref target="RFC8341"/> provides the means to
   restrict access for particular NETCONF or RESTCONF users to a
   preconfigured subset of all available NETCONF or RESTCONF protocol
   operations and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   to these data nodes without proper protection can have a negative
   effect on network operations.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

<t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>It is proposed to IANA to assign new URIs from the "IETF XML
   Registry" <xref target="RFC3688"/> as follows:</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
   registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   name: ietf-ns-topo
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   prefix: ns-topo
   reference: RFC XXXX
]]></artwork></figure>

<figure><artwork><![CDATA[
   name: ietf-ns-underlay-path
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path
   prefix: ns-path
   reference: RFC XXXX
]]></artwork></figure>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC9543' target='https://www.rfc-editor.org/info/rfc9543'>
  <front>
    <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
    <author fullname='A. Farrel' initials='A.' role='editor' surname='Farrel'/>
    <author fullname='J. Drake' initials='J.' role='editor' surname='Drake'/>
    <author fullname='R. Rokui' initials='R.' surname='Rokui'/>
    <author fullname='S. Homma' initials='S.' surname='Homma'/>
    <author fullname='K. Makhijani' initials='K.' surname='Makhijani'/>
    <author fullname='L. Contreras' initials='L.' surname='Contreras'/>
    <author fullname='J. Tantsura' initials='J.' surname='Tantsura'/>
    <date month='March' year='2024'/>
    <abstract>
      <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
      <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
      <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9543'/>
  <seriesInfo name='DOI' value='10.17487/RFC9543'/>
</reference>

<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7950'/>
  <seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>

<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='N. Bahadur' initials='N.' surname='Bahadur'/>
    <author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8345'/>
  <seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>

<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'/>
    <author fullname='P. Shafer' initials='P.' surname='Shafer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <author fullname='R. Wilton' initials='R.' surname='Wilton'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8342'/>
  <seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>

<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='215'/>
  <seriesInfo name='RFC' value='8340'/>
  <seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>

<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
  <front>
    <title>Common YANG Data Types</title>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <date month='July' year='2013'/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6991'/>
  <seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>

<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='H. Shah' initials='H.' surname='Shah'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <date month='August' year='2020'/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8795'/>
  <seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>

<reference anchor='RFC9408' target='https://www.rfc-editor.org/info/rfc9408'>
  <front>
    <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
    <author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <author fullname='S. Barguil' initials='S.' surname='Barguil'/>
    <author fullname='Q. Wu' initials='Q.' surname='Wu'/>
    <author fullname='V. Lopez' initials='V.' surname='Lopez'/>
    <date month='June' year='2023'/>
    <abstract>
      <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
      <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9408'/>
  <seriesInfo name='DOI' value='10.17487/RFC9408'/>
</reference>

<reference anchor='RFC8453' target='https://www.rfc-editor.org/info/rfc8453'>
  <front>
    <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
    <author fullname='D. Ceccarelli' initials='D.' role='editor' surname='Ceccarelli'/>
    <author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
      <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
      <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8453'/>
  <seriesInfo name='DOI' value='10.17487/RFC8453'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>

<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname='M. Wasserman' initials='M.' surname='Wasserman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6242'/>
  <seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>

<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
  <front>
    <title>The IETF XML Registry</title>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <date month='January' year='2004'/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='81'/>
  <seriesInfo name='RFC' value='3688'/>
  <seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>

<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='October' year='2010'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6020'/>
  <seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>

<reference anchor='RFC7951' target='https://www.rfc-editor.org/info/rfc7951'>
  <front>
    <title>JSON Encoding of Data Modeled with YANG</title>
    <author fullname='L. Lhotka' initials='L.' surname='Lhotka'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7951'/>
  <seriesInfo name='DOI' value='10.17487/RFC7951'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='I-D.ietf-ccamp-yang-otn-slicing' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-yang-otn-slicing-06'>
   <front>
      <title>Framework and Data Model for OTN Network Slicing</title>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Yunbin Xu' initials='Y.' surname='Xu'>
         <organization>CAICT</organization>
      </author>
      <author fullname='Yang Zhao' initials='Y.' surname='Zhao'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <date day='24' month='January' year='2024'/>
      <abstract>
	 <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and
   defines YANG data models with OTN technology-specific augments
   deployed at both the north and south bound of the OTN network slice
   controller.  Additional YANG data model augmentations will be defined
   in a future version of this draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-yang-otn-slicing-06'/>
   
</reference>


<reference anchor='I-D.contreras-teas-slice-controller-models' target='https://datatracker.ietf.org/doc/html/draft-contreras-teas-slice-controller-models-05'>
   <front>
      <title>IETF Network Slice Controller and its associated data models</title>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>IBM Corporation</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   This document describes a potential division in major functional
   components of an IETF Network Slice Controller (NSC) as well as
   references the data models required for supporting the requests of
   IETF network slice services and their realization.

   This document describes a potential way of structuring the IETF
   Network Slice Controller as well as how to use different data models
   being defined for IETF Network Slice Service provision (and how they
   are related).  It is not the purpose of this document to standardize
   or constrain the implementation the IETF Network Slice Controller.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-contreras-teas-slice-controller-models-05'/>
   
</reference>


<reference anchor='I-D.ietf-teas-ietf-network-slice-nbi-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice-nbi-yang-13'>
   <front>
      <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='9' month='May' year='2024'/>
      <abstract>
	 <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-13'/>
   
</reference>


<reference anchor='I-D.draft-ietf-teas-ietf-network-slice-nbi-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice-nbi-yang-13'>
   <front>
      <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='9' month='May' year='2024'/>
      <abstract>
	 <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-13'/>
   
</reference>


<reference anchor='I-D.ietf-ccamp-otn-topo-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-otn-topo-yang-19'>
   <front>
      <title>A YANG Data Model for Optical Transport Network Topology</title>
      <author fullname='Haomian Zheng' initials='H.' surname='Zheng'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Italo Busi' initials='I.' surname='Busi'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>IBM Corporation</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Oscar Gonzalez de Dios' initials='O. G.' surname='de Dios'>
         <organization>Telefonica</organization>
      </author>
      <date day='25' month='June' year='2024'/>
      <abstract>
	 <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.


	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-otn-topo-yang-19'/>
   
</reference>


<reference anchor='I-D.ietf-teas-actn-vn-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-actn-vn-yang-29'>
   <front>
      <title>A YANG Data Model for Virtual Network (VN) Operations</title>
      <author fullname='Young Lee' initials='Y.' surname='Lee'>
         <organization>Samsung Electronics</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Daniele Ceccarelli' initials='D.' surname='Ceccarelli'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Igor Bryskin' initials='I.' surname='Bryskin'>
         <organization>Individual</organization>
      </author>
      <author fullname='Bin Yeong Yoon' initials='B. Y.' surname='Yoon'>
         <organization>ETRI</organization>
      </author>
      <date day='22' month='June' year='2024'/>
      <abstract>
	 <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-actn-vn-yang-29'/>
   
</reference>




    </references>


<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank Danielle Ceccarelli, Bo Wu,
   Mohamed Boucadair, and Vishnu Beeram for providing valuable
   insights.</t>

</section>
<section anchor="data-tree-for-the-example-in-section-3"><name>Data Tree for the Example in Section 3</name>

<section anchor="native-topology"><name>Native Topology</name>

<t>This section contains an example of an instance data tree in the JSON
   encoding <xref target="RFC7951"/>.  The example instantiates "ietf-network" for the
   topology of Network Slice Blue depicted in <xref target="fig-ns-topo-example"/>.</t>

<figure><artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "example-customized-blue-topology",
        "network-types": {
          "ietf-ns-topo:network-slice": {
          }
        },
        "node": [
          {
            "node-id": "VR1",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "1-0-1"
              },
              {
                "tp-id": "1-3-1"
              }
            ]
          },
          {
            "node-id": "VR3",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "3-1-1"
              },
              {
                "tp-id": "3-5-1"
              }
            ]
          },
          {
            "node-id": "VR5",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "5-3-1"
              },
              {
                "tp-id": "5-0-1"
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "VR1,1-0-1,,",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 60
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": ",,VR1,1-0-1",
            "destination": {
              "dest-node": "VR1",
              "dest-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR1,1-3-1,VR3,3-1-1",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-1-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-1-1,VR1,1-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-1-1"
            },
            "destination": {
              "dest-node": "R1",
              "dest-tp": "1-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-5-1,VR5,5-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-5-1"
            },
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-3-1,VR3,3-5-1",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-5-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-0-1,,",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              }
                        }
          },
          {
            "link-id": ",,VR5,5-0-1",
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          }
        ],
        "ietf-ns-topo:service-slo-sle-policy": {
          "sle-policy": {
            "isolation": [
              {
                "ietf-network-slice-service:service-traffic-isolati\
on"
              }
            ]
          } 
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

