<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-boucadair-teas-ietf-slicing-overview-08" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IETF Network Slicing">An Overview of Network Slicing Efforts in The IETF</title>
    <seriesInfo name="Internet-Draft" value="draft-boucadair-teas-ietf-slicing-overview-08"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="13"/>
    <workgroup>Traffic Engineering Architecture and Signaling</workgroup>
    <keyword>slice specifications</keyword>
    <keyword>slice coordination</keyword>
    <abstract>
      <?line 31?>

<t>This document lists a set of slicing-related specifications that are being development within the IETF. This document is meant to provide an overview of slicing activities in the IETF to hopefully ease coordination and ensure that specifications that are developed in many WGs are consistent.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Traffic Engineering Architecture and Signaling Working Group mailing list (teas@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/ietf-slice-overview"/>.</t>
    </note>
  </front>
  <middle>
    <?line 35?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Various slicing efforts are being conduced within various IETF WGs (e.g., teas, idr, spring, ccamp, mpls, opsawg, 6man, and ippm) and areas (e.g., rtg, int, tsv, and ops). All these efforts are referring to the IETF framework that is developed by the teas WG (<xref target="slice-fr"/>), however there is a lack of a global visibility about these efforts and their interdependency.</t>
      <t>Also, there is a lack of cross-WG communications in some cases when a slicing-related specification is candidate for adoption or adopted by a WG. This lack of global view at the IETF level and lack of early cross-WG communications may induce some inconsistency. For example, some proposals argue in favor of specifying extensions to convey specific identifiers in packets. However, distinct identifiers are being proposed: slice identifier, NRP Selector, NRP identifier, VTN identifier, VTN resource identifier, etc. The need and relationship between these identifiers are worth to be discussed independent of the channels that are used to convey these identifiers.</t>
      <t>This document provides an overview of slicing activities in the IETF to hopefully ease coordination and ensure that specifications that are developed in many WGs are consistent, e.g.:</t>
      <ul spacing="normal">
        <li>
          <t>Position the various concepts: network slice, network resource partition, virtual transport network, etc.</t>
        </li>
        <li>
          <t>Clarify the need of the various identifiers introduced so far and soften redundant/duplicate uses.</t>
        </li>
        <li>
          <t>Harmonize the definition of relevant identifiers (length, encoding, usage, etc.) rather than having the specification of the same identifier repeated in many places. For example, current specifications  use distinct encoding length of the same attribute (variable, 16-bit, 32-bit).</t>
        </li>
        <li>
          <t>Clarify the relationship and co-existence of identifiers if more than one is needed.</t>
        </li>
      </ul>
    </section>
    <section anchor="slice-fr">
      <name>Reference Framework and Architecture</name>
      <t><xref target="RFC9543"/> is the authoritative IETF framework for Network Slices. It provides definitions for a slice-related core terms and specifies a framework for the provision
of Network Slice Services over networks that are deployed using technologies that are owned by the IETF (IP, MPLS, etc.). The document refers to such slices as IETF Network Slice or "the term "RFC 9543 Network Slice".</t>
      <t><xref target="RFC9543"/> provides a clear distinction between:</t>
      <ul spacing="normal">
        <li>
          <t>the "RFC 9543 Network Slice Service" which is the service delivered to the customer and which is agnostic to the technologies and mechanisms
 used by the service provider, and</t>
        </li>
        <li>
          <t>the "RFC 9543 Network Slice" which is the realization of the service in the service provider's network achieved by partitioning network resources and by applying a set of mechanisms within the network.</t>
        </li>
      </ul>
      <t>The RFC 9543 Network Slice Service is specified in terms of:</t>
      <ul spacing="normal">
        <li>
          <t>a set of Service Demarcation Point (SDP),</t>
        </li>
        <li>
          <t>a set of one or more connectivity constructs between subsets of these SDPs, and</t>
        </li>
        <li>
          <t>a set of service objectives for each SDP sending to each connectivity construct.</t>
        </li>
      </ul>
      <t>The service objectives can be expressed as Service Level Objectives (SLOs) or Service Level Expectations (SLEs).</t>
      <t>In some deploymenets, the underlying network can be customized to select a subset of resources that are suitable for the delivery of an RFC 9543 Network Slice Service. Such a customization can be achieved by creating a set of Network Resource Partitions (NRPs).</t>
      <t>In other deployments, RFC 9543 Network Slices can be hosted directly on the underlay network (i.e., without requiring any NRP).</t>
      <t>RFC 9543 Network Slices can be realized using existing tools (<xref target="no-extension"/>). The extensions listed in <xref target="cp-ext"/> or <xref target="dp-ext"/> are not required in such a case.</t>
      <t><xref target="RFC9543"/> does not provide any recommendation about the technological means to realize an RFC 9543 Network Slice Service. These considerations are deployment specific.</t>
    </section>
    <section anchor="models-for-realizing-network-slices">
      <name>Models for Realizing Network Slices</name>
      <section anchor="no-extension">
        <name>Using Current IP/MPLS Technologies</name>
        <t><xref target="RFC9889"/> describes a model for the realization of RFC 9543 Network Slices for 5G networks. This realization model reuses many building blocks that are commonly used in service provider networks, specifically:</t>
        <ul spacing="normal">
          <li>
            <t>L2VPN/L3VPN service instances for logical separation,</t>
          </li>
          <li>
            <t>Fine-grained resource control at the PE,</t>
          </li>
          <li>
            <t>Coarse resource control at the transit, and</t>
          </li>
          <li>
            <t>Capacity planning/management for efficient usage of provider network resources.</t>
          </li>
        </ul>
      </section>
      <section anchor="flow-agg">
        <name>Using Network Resource Partitions (NRPs) and Slice-Flow Aggregates</name>
        <t><xref target="I-D.ietf-teas-ns-ip-mpls"/> proposes a model that is inspired from the Diffserv model for the realization of Network Slices over IP/MPLS networks. Specifically, this model introduces the concept of Slice-Flow Aggregate which is defined as a collection of packets that are mapped to an NRP and are given the same forwarding treatment in a shared network. An aggregate can group flows from of one or more RFC 9543 Network Slice Services.</t>
        <t><xref target="I-D.ietf-teas-ns-ip-mpls"/> also introduces the notion of NRP Policy that is used to trigger the creation of NRPs that will support a given Slice-Flow Aggregate. In some deployment schemes, packets that belong to a Slice-Flow Aggregate are forwarded by intermediate node along the appropriate NRP by processing an NRP Selector that is carried by these packets.</t>
      </section>
      <section anchor="optical-transport-networks-otn-slicing">
        <name>Optical Transport Networks (OTN) Slicing</name>
        <t><xref target="I-D.ietf-ccamp-yang-otn-slicing"/> defines Optical Transport Networks (OTN) slice as an OTN virtual network topology connecting a number of OTN endpoints using a set of shared or dedicated OTN network resources to satisfy specific SLOs. OTN slices are considered as a technology-specific realization of an RFC 9543 Network Slice in the OTN domain.</t>
      </section>
      <section anchor="vpn">
        <name>VPN+</name>
        <t><xref target="RFC9732"/> describes a framework for providing enhanced VPN services based upon VPN and Traffic Engineering (TE) technologies. Enhanced VPN (VPN+) can be used for the realization of Network Slices. This document introduces the concept of Virtual Transport Network (VTN), which is a virtual underlay network consisting of a subset of network resources allocated from the physical underlay network, and is associated with a customized network topology.</t>
      </section>
      <section anchor="instantiation-in-service-providers-networks">
        <name>Instantiation in Service Providers Networks</name>
        <t><xref target="I-D.ietf-teas-ns-models-applicability"/> focuses on the instantiation of the RFC 9543 Network Slice Services in service provider networks using existing data models. In particular, this document describes the relationship between service models for managing the RFC 9543 Network Slice Services and network models (e.g., the Layer-3 Network Model (L3NPM, <xref target="RFC9182"/>), the Layer-2 Network Model (L2NM <xref target="RFC9291"/>)) used for the realization of the slices.</t>
      </section>
      <section anchor="structuring-network-slice-controllers">
        <name>Structuring Network Slice Controllers</name>
        <t><xref target="I-D.ietf-teas-ns-controller-models"/> proposes an approach for structuring the RFC 9543 Network Slice Controller as well as how to use different data models being defined for RFC 9543 Network Slice Service provision.</t>
      </section>
      <section anchor="sr-based-hierarchical-network-slices">
        <name>SR-based Hierarchical Network Slices</name>
        <t><xref target="I-D.gong-spring-hierarchical-slice-solution"/> proposes a hierarchical approach for realizing RFC 9543 Network Slices in Segment Routing domain. The approach involves two levels:</t>
        <ul spacing="normal">
          <li>
            <t>Level 1 Network Slices are realized using Flex-Algo.</t>
          </li>
          <li>
            <t>Level 2 forwarding paths are restricted in the Level 1 topology by using SR Policy and NRP-ID in the data plane.</t>
          </li>
        </ul>
      </section>
      <section anchor="realization-of-composite-network-slices">
        <name>Realization of Composite Network Slices</name>
        <t><xref target="I-D.li-teas-composite-network-slices"/> investigates a set of scenarios for realizing composite RFC 9543 Network Slices (that basically involve other slices).  The document defines a new identifier, called Inter-domain NRP ID.</t>
      </section>
      <section anchor="aaa-for-hierarchical-network-slices">
        <name>AAA for Hierarchical Network Slices</name>
        <t><xref target="I-D.zhang-rtgwg-aaa-hierarchical-network-slices"/> describes an authentication, authorization, and accounting process for hierarchical Network Slices. The document
suggest adding NRP-ID to accounting meesages, but lacks a discussion whether any protocol extension is needed.</t>
      </section>
    </section>
    <section anchor="applicability-and-mapping-scenarios">
      <name>Applicability and Mapping Scenarios</name>
      <section anchor="gpp-5g-end-to-end-network-slices">
        <name>3GPP 5G End-to-End Network Slices</name>
        <t><xref target="I-D.ietf-teas-5g-network-slice-application"/> focuses on the application of RFC 9543 Network Slices in the context of the 3GPP 5G slices.</t>
      </section>
      <section anchor="enforcement-of-5g-end-to-end-network-slice-qos">
        <name>Enforcement of 5G End-to-End Network Slice QoS</name>
        <t><xref target="I-D.cbs-teas-5qi-to-dscp-mapping"/> documents an example of possible mapping of 5QI values
to DSCP markings with a focus on 5G Network Slices. The document groups different 5QI types in classes based
on their SLOs.</t>
      </section>
      <section anchor="encoding-3gpp-slices-for-interactive-media-services">
        <name>Encoding 3GPP Slices for Interactive Media Services</name>
        <t><xref target="I-D.jiang-tsvwg-slice-media-service"/> explores how IETF schemes (DSCP and UDP options) can be used to expose some QoS-related metadata for specific flows to 5GS. The document focuses on the Extended Reality &amp; multi-modality communication (XRM) service.</t>
      </section>
      <section anchor="abstraction-and-control-of-traffic-engineered-networks-actn">
        <name>Abstraction and Control of Traffic Engineered Networks (ACTN)</name>
        <t><xref target="I-D.ietf-teas-applicability-actn-slicing"/> describes the applicability of ACTN to Network Slicing.</t>
      </section>
      <section anchor="mobility-aware-transport-network-slicing">
        <name>Mobility-Aware Transport Network Slicing</name>
        <t><xref target="I-D.ietf-dmm-tn-aware-mobility"/> discusses a mapping of 5G slices to RFC 9543 Network Slices when the transport network is separated from the networks in which the 5G network functions are deployed (e.g., 5G functions distributed across data centers). This document zooms into the use of UDP source port number in GTP-U outer header and LAN to map between a 5G slice and corresponding RFC 9543 Network Slice segments that is listed in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
        <t>The document specifies an ACaaS extension <xref target="RFC9834"/> to support a layer 3 GTP-U (or UDP encapsulated GTP) bearer as an attachment circuit.</t>
      </section>
      <section anchor="detnet">
        <name>DetNet</name>
        <t><xref target="I-D.sw-detnet-network-slice-mapping-yang"/> describes the applicability of DetNet to RFC 9543 Network Slice, particularly to provide deterministic services. The document describes how to use DetNet flow aggregation as the Slice-Flow Aggregates over an underlying NRP following the approach in <xref target="flow-agg"/>.</t>
      </section>
    </section>
    <section anchor="orchestration-and-data-models">
      <name>Orchestration and Data Models</name>
      <t><xref target="model-overview"/> provides an example of the various data models that can be invoked in the context of Network Slicing.</t>
      <figure anchor="model-overview">
        <name>Overview of Data Models used for Network Slicing</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="544" viewBox="0 0 544 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,560 L 40,592" fill="none" stroke="black"/>
              <path d="M 80,560 L 80,592" fill="none" stroke="black"/>
              <path d="M 128,448 L 128,464" fill="none" stroke="black"/>
              <path d="M 136,336 L 136,352" fill="none" stroke="black"/>
              <path d="M 152,544 L 152,608" fill="none" stroke="black"/>
              <path d="M 168,368 L 168,432" fill="none" stroke="black"/>
              <path d="M 168,480 L 168,496" fill="none" stroke="black"/>
              <path d="M 208,288 L 208,320" fill="none" stroke="black"/>
              <path d="M 208,448 L 208,464" fill="none" stroke="black"/>
              <path d="M 240,128 L 240,144" fill="none" stroke="black"/>
              <path d="M 240,224 L 240,240" fill="none" stroke="black"/>
              <path d="M 240,376 L 240,496" fill="none" stroke="black"/>
              <path d="M 264,336 L 264,352" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,112" fill="none" stroke="black"/>
              <path d="M 304,160 L 304,208" fill="none" stroke="black"/>
              <path d="M 304,256 L 304,288" fill="none" stroke="black"/>
              <path d="M 328,336 L 328,352" fill="none" stroke="black"/>
              <path d="M 368,128 L 368,144" fill="none" stroke="black"/>
              <path d="M 368,224 L 368,240" fill="none" stroke="black"/>
              <path d="M 400,288 L 400,320" fill="none" stroke="black"/>
              <path d="M 400,368 L 400,496" fill="none" stroke="black"/>
              <path d="M 416,544 L 416,608" fill="none" stroke="black"/>
              <path d="M 456,336 L 456,352" fill="none" stroke="black"/>
              <path d="M 488,560 L 488,592" fill="none" stroke="black"/>
              <path d="M 528,560 L 528,592" fill="none" stroke="black"/>
              <path d="M 256,32 L 352,32" fill="none" stroke="black"/>
              <path d="M 256,64 L 352,64" fill="none" stroke="black"/>
              <path d="M 256,112 L 352,112" fill="none" stroke="black"/>
              <path d="M 256,160 L 352,160" fill="none" stroke="black"/>
              <path d="M 256,208 L 352,208" fill="none" stroke="black"/>
              <path d="M 256,256 L 352,256" fill="none" stroke="black"/>
              <path d="M 208,288 L 400,288" fill="none" stroke="black"/>
              <path d="M 152,320 L 248,320" fill="none" stroke="black"/>
              <path d="M 344,320 L 440,320" fill="none" stroke="black"/>
              <path d="M 152,368 L 248,368" fill="none" stroke="black"/>
              <path d="M 344,368 L 440,368" fill="none" stroke="black"/>
              <path d="M 144,432 L 192,432" fill="none" stroke="black"/>
              <path d="M 144,480 L 192,480" fill="none" stroke="black"/>
              <path d="M 152,544 L 416,544" fill="none" stroke="black"/>
              <path d="M 40,560 L 80,560" fill="none" stroke="black"/>
              <path d="M 488,560 L 528,560" fill="none" stroke="black"/>
              <path d="M 80,576 L 152,576" fill="none" stroke="black"/>
              <path d="M 416,576 L 488,576" fill="none" stroke="black"/>
              <path d="M 40,592 L 80,592" fill="none" stroke="black"/>
              <path d="M 488,592 L 528,592" fill="none" stroke="black"/>
              <path d="M 152,608 L 416,608" fill="none" stroke="black"/>
              <path d="M 256,32 C 247.16936,32 240,39.16936 240,48" fill="none" stroke="black"/>
              <path d="M 352,32 C 360.83064,32 368,39.16936 368,48" fill="none" stroke="black"/>
              <path d="M 256,64 C 247.16936,64 240,56.83064 240,48" fill="none" stroke="black"/>
              <path d="M 352,64 C 360.83064,64 368,56.83064 368,48" fill="none" stroke="black"/>
              <path d="M 256,112 C 247.16936,112 240,119.16936 240,128" fill="none" stroke="black"/>
              <path d="M 352,112 C 360.83064,112 368,119.16936 368,128" fill="none" stroke="black"/>
              <path d="M 256,160 C 247.16936,160 240,152.83064 240,144" fill="none" stroke="black"/>
              <path d="M 352,160 C 360.83064,160 368,152.83064 368,144" fill="none" stroke="black"/>
              <path d="M 256,208 C 247.16936,208 240,215.16936 240,224" fill="none" stroke="black"/>
              <path d="M 352,208 C 360.83064,208 368,215.16936 368,224" fill="none" stroke="black"/>
              <path d="M 256,256 C 247.16936,256 240,248.83064 240,240" fill="none" stroke="black"/>
              <path d="M 352,256 C 360.83064,256 368,248.83064 368,240" fill="none" stroke="black"/>
              <path d="M 152,320 C 143.16936,320 136,327.16936 136,336" fill="none" stroke="black"/>
              <path d="M 248,320 C 256.83064,320 264,327.16936 264,336" fill="none" stroke="black"/>
              <path d="M 344,320 C 335.16936,320 328,327.16936 328,336" fill="none" stroke="black"/>
              <path d="M 440,320 C 448.83064,320 456,327.16936 456,336" fill="none" stroke="black"/>
              <path d="M 152,368 C 143.16936,368 136,360.83064 136,352" fill="none" stroke="black"/>
              <path d="M 248,368 C 256.83064,368 264,360.83064 264,352" fill="none" stroke="black"/>
              <path d="M 344,368 C 335.16936,368 328,360.83064 328,352" fill="none" stroke="black"/>
              <path d="M 440,368 C 448.83064,368 456,360.83064 456,352" fill="none" stroke="black"/>
              <path d="M 144,432 C 135.16936,432 128,439.16936 128,448" fill="none" stroke="black"/>
              <path d="M 192,432 C 200.83064,432 208,439.16936 208,448" fill="none" stroke="black"/>
              <path d="M 144,480 C 135.16936,480 128,472.83064 128,464" fill="none" stroke="black"/>
              <path d="M 192,480 C 200.83064,480 208,472.83064 208,464" fill="none" stroke="black"/>
              <g class="text">
                <text x="300" y="52">Customer</text>
                <text x="140" y="84">Customer</text>
                <text x="208" y="84">Service</text>
                <text x="264" y="84">Model</text>
                <text x="128" y="100">e.g.,</text>
                <text x="196" y="100">slice-svc,</text>
                <text x="272" y="100">ac-svc,</text>
                <text x="328" y="100">and</text>
                <text x="388" y="100">bearer-svc</text>
                <text x="304" y="132">Service</text>
                <text x="304" y="148">Orchestration</text>
                <text x="144" y="180">Network</text>
                <text x="200" y="180">Model</text>
                <text x="24" y="196">e.g.,</text>
                <text x="92" y="196">l2vpn-ntw,</text>
                <text x="180" y="196">l3vpn-ntw,</text>
                <text x="244" y="196">sap,</text>
                <text x="280" y="196">and</text>
                <text x="340" y="196">ac-ntw</text>
                <text x="296" y="228">Network</text>
                <text x="304" y="244">Orchestration</text>
                <text x="88" y="276">Network</text>
                <text x="176" y="276">Configuration</text>
                <text x="256" y="276">Model</text>
                <text x="196" y="340">Domain</text>
                <text x="396" y="340">Domain</text>
                <text x="200" y="356">Orchestration</text>
                <text x="392" y="356">Orchestration</text>
                <text x="68" y="388">Device</text>
                <text x="96" y="404">Configuration</text>
                <text x="64" y="420">Model</text>
                <text x="164" y="452">Config</text>
                <text x="168" y="468">Manager</text>
                <text x="280" y="516">NETCONF/CLI..................</text>
                <text x="168" y="532">|</text>
                <text x="240" y="532">|</text>
                <text x="400" y="532">|</text>
                <text x="116" y="564">Bearer</text>
                <text x="452" y="564">Bearer</text>
                <text x="60" y="580">CE#1</text>
                <text x="280" y="580">Network</text>
                <text x="508" y="580">CE#2</text>
                <text x="116" y="596">AC</text>
                <text x="452" y="596">AC</text>
                <text x="60" y="628">Site</text>
                <text x="88" y="628">A</text>
                <text x="508" y="628">Site</text>
                <text x="536" y="628">B</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                                .-------------.
                               |   Customer    |
                                '------+------'
               Customer Service Model  |
               e.g., slice-svc, ac-svc,| and bearer-svc
                                .------+------.
                               |    Service    |
                               | Orchestration |
                                '------+------'
                Network Model          |
  e.g., l2vpn-ntw, l3vpn-ntw, sap, and | ac-ntw
                                .------+------.
                               |   Network     |
                               | Orchestration |
                                '------+------'
         Network Configuration Model   |
                           .-----------+-----------.
                           |                       |
                   .-------+-----.         .-------+-----.
                  |    Domain     |       |     Domain    |
                  | Orchestration |       | Orchestration |
                   '--+----------'         '-------+-----'
       Device         |        |                   |
       Configuration  |        |                   |
       Model          |        |                   |
                  .---+---.    |                   |
                 | Config  |   |                   |
                 | Manager |   |                   |
                  '---+---'    |                   |
                      |        |                   |
                      NETCONF/CLI..................
                      |        |                   |
                    +--------------------------------+
      +----+ Bearer |                                | Bearer +----+
      |CE#1+--------+            Network             +--------+CE#2|
      +----+   AC   |                                |   AC   +----+
                    +--------------------------------+
       Site A                                                  Site B
]]></artwork>
        </artset>
      </figure>
      <section anchor="common-models">
        <name>Common Models</name>
        <t><xref target="RFC9181"/> specifies a set of reusable types and groupings to manage VPN services. Note that VPNs are used for the realization of Network Slices.</t>
        <t><xref target="RFC9833"/> specifies a set of reusable types and groupings to manage Attachment Circuits (ACs).</t>
      </section>
      <section anchor="service-models">
        <name>Service Models</name>
        <section anchor="attachment-circuit-as-a-service-acaas-data-model">
          <name>Attachment Circuit as a Service (ACaaS) Data Model</name>
          <t><xref target="RFC9834"/> specifies YANG data models for managing 'Attachment Circuits'-as-a-Service (ACaaS) and also bearers. These ACs and bearers are used to identify where to deliver a slice service.</t>
        </section>
        <section anchor="network-slice-service-data-model">
          <name>Network Slice Service Data Model</name>
          <t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> defines a YANG data model for manaing RFC 9543 Network Slice Services.</t>
        </section>
      </section>
      <section anchor="network-models">
        <name>Network Models</name>
        <section anchor="sap">
          <name>Service Attachment Points (SAPs)</name>
          <t><xref target="RFC9408"/> defines a YANG data model for representing an abstract
   view of the provider network topology that contains the points from
   which its services can be attached (e.g., basic connectivity, VPN,
   network slices).  Also, the model can be used to retrieve the points
   where the services are actually being delivered to customers
   (including peer networks).</t>
          <t>A SAP network topology can be used for one or multiple service types ('service-type'). Setting this data node to 'network-slice' allows a controller to expose where RFC 9543 Network Slices services are being delivered. It can also be used to check where RFC 9543 Network Slice Services can be delivered.</t>
        </section>
        <section anchor="ac-augmented-saps">
          <name>AC-augmented SAPs</name>
          <t><xref target="RFC9835"/> augments the SAP model with more details for managing ACs at the network level.</t>
        </section>
        <section anchor="network-slice-topology">
          <name>Network Slice Topology</name>
          <t><xref target="I-D.ietf-teas-transport-network-slice-yang"/> specifies a YANG model for RFC 9543 Network Slice Topology with on exposing a customized topology that contains a topology intent with required SLO/SLEs to express the customer’s intent for resource reservation.</t>
          <t>The need for such a model is yet to be justified as the current scope is redundant with, e.g., what can be already achieved using <xref target="RFC9731"/>. The authors should motivate why <xref target="RFC9731"/> is not sufficient.</t>
        </section>
        <section anchor="network-resource-partitions-nrps">
          <name>Network Resource Partitions (NRPs)</name>
          <t><xref target="I-D.ietf-teas-nrp-yang"/> specifies a YANG data model for managing NRPs.</t>
        </section>
        <section anchor="network-slice-mapping">
          <name>Network Slice Mapping</name>
          <t><xref target="I-D.dhody-teas-ietf-network-slice-mapping"/> specifies an RFC 9543 Network Slice Service mapping YANG model. The model supports the following mappings:</t>
          <ul spacing="normal">
            <li>
              <t>L3NM <xref target="RFC9182"/></t>
            </li>
            <li>
              <t>L2NM <xref target="RFC9291"/></t>
            </li>
            <li>
              <t>TE <xref target="I-D.ietf-teas-te-service-mapping-yang"/></t>
            </li>
            <li>
              <t>NRP</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="cp-ext">
      <name>Control Plane Extensions</name>
      <section anchor="bgp-classful-transport-planes">
        <name>BGP Classful Transport Planes</name>
        <t><xref target="RFC9832"/> specifies mechanisms for classifying underlay routes into a set of classes, called Transport Classes, and mapping service-specific routes to a specific Transport Class. For example, <xref target="RFC9832"/> can be used to create a customized topology for Network Slices. These topologies (Transport Classes) will be typically created to satisfy certain TE characteristics. A new Transport Class Route Target Extended Community is defined for this purpose. A Transport Class is identified by a 4-octet identifier: Transport Class ID.</t>
      </section>
      <section anchor="bgp-color-aware-routing-car">
        <name>BGP Color-Aware Routing (CAR)</name>
        <t><xref target="RFC9871"/> specifies a new BGP SAFI called BGP Color-Aware Routing (BGP CAR). Colors are defined to characterize an objective (e.g., low latency). To satisfy Network Slice requirements, CAR may be used to establish paths that address specific objectives. These paths will be associated with a Color.</t>
        <t>The proposal leverages the BGP Color Extended Community defined in <xref target="RFC9012"/> and builds upon the Color concept defined in <xref target="RFC9256"/>. In addition, a new Extended Community, called Local-Color-Mapping (LCM) Extended Community, is defined to address cases where the granularity of the exposed colors differs when crossing domains.</t>
      </section>
      <section anchor="network-resource-partitions-nrps-1">
        <name>Network Resource Partitions (NRPs)</name>
        <section anchor="bgp-flowspec">
          <name>BGP Flowspec</name>
          <t><xref target="I-D.ietf-idr-flowspec-network-slice-ts"/> specifies a BGP Flowspec extension for NRP traffic steering.</t>
        </section>
        <section anchor="bgp-ls-nrp-filters-in-sr">
          <name>BGP-LS NRP Filters in SR</name>
          <t><xref target="I-D.drake-teas-bgp-ls-filter-nrp"/> specifies new BGP-LS attributes, called BGP-LS Filters, for NRPs in SR networks. A BGP-LS Filter provides a description of a subset of the links and nodes in an underlay network. Ingress PE selects a path to an egress PE from the topology defined by the BGP-LS Filters it has imported for a given VPN.</t>
          <t><xref target="I-D.chen-idr-bgp-ls-transport-slice"/> adds new BGP-LS attribute TLVs to encode information such as NRP-ID.</t>
        </section>
        <section anchor="bgp-nrp-extensions">
          <name>BGP NRP Extensions</name>
          <t><xref target="I-D.dong-idr-bgp-nrp-policy"/> specifies extensions to BGP to advertise NRPs to the network nodes involved in the NRP.</t>
        </section>
        <section anchor="bgp-ls-nrp-extensions">
          <name>BGP-LS NRP Extensions</name>
          <t><xref target="I-D.dong-idr-bgp-ls-scalable-nrp"/> specifies extensions to BGP Link-State (BGP-LS) to advertise NRPs to network controllers.</t>
        </section>
        <section anchor="sr-policies-extensions">
          <name>SR Policies Extensions</name>
          <section anchor="bgp">
            <name>BGP</name>
            <t><xref target="I-D.ietf-idr-sr-policy-nrp"/> and <xref target="I-D.liu-idr-bgp-network-slicing"/> define extensions to BGP in order to advertise NRP ID in an SR Policy. The NRP ID is encoded in 4 octets.</t>
          </section>
          <section anchor="bgp-ls">
            <name>BGP-LS</name>
            <t><xref target="I-D.ietf-idr-bgp-ls-sr-policy-nrp"/> specifies SR Policy extensions for NRP in BGP-LS. The NRP ID is encoded in 4 octets.</t>
          </section>
        </section>
        <section anchor="pcep-extensions">
          <name>PCEP Extensions</name>
          <t><xref target="I-D.ietf-pce-pcep-nrp"/> specifie Path Computation Element Communication Protocol (PCEP) extensions for NRP. The NRP ID is encoded in 4 octets.</t>
        </section>
      </section>
      <section anchor="virtual-transport-networks-vtns">
        <name>Virtual Transport Networks (VTNs)</name>
        <section anchor="is-is-mt">
          <name>IS-IS MT</name>
          <t><xref target="I-D.ietf-lsr-isis-sr-vtn-mt"/> specifies how to use IS-IS Multi-Topology (MT) for SR-based VTNs.</t>
        </section>
        <section anchor="bgp-ls-1">
          <name>BGP-LS</name>
          <t><xref target="I-D.ietf-idr-bgpls-sr-vtn-mt"/> describes a mechanism to distribute the information of SR-based VTNs to the  network controller using BGP-LS with Multi-Topology.</t>
        </section>
      </section>
    </section>
    <section anchor="dp-ext">
      <name>Data Plane Extensions</name>
      <section anchor="slice-identifier-in-the-mpls-entropy-label">
        <name>Slice Identifier in the MPLS Entropy Label</name>
        <t><xref target="I-D.decraene-mpls-slid-encoded-entropy-label-id"/> proposes an approach to encode slice identifiers in a portion of the MPLS Entropy Label (EL). The number of bits to be used for encoding the slice identifier in the EL is policy-based. Transit LSRs uses the slice identifier in the EL to apply per-slice policies.</t>
      </section>
      <section anchor="slice-identifier-in-ipv6-flow-label">
        <name>Slice Identifier in IPv6 Flow Label</name>
        <t><xref target="I-D.filsfils-spring-srv6-stateless-slice-id"/> proposes to encode slice identifers in a portion of the IPv6 Flow Label. Slice identifiers are used by intermediate IPv6 routers to process the packet according to
a network slice policy.</t>
      </section>
      <section anchor="slice-identifier-in-the-source-address-of-encapsulated-srh">
        <name>Slice Identifier in the Source Address of Encapsulated SRH</name>
        <t>When an ingress SR router encapsulates a packet in an IPv6 packet with an SRH, <xref target="I-D.cheng-spring-srv6-encoding-network-sliceid"/> suggests to use the least significant bits of the outer IPv6 source address to encode a slide identifier. SLID Presence Indicator (SPI) is used to indicate the presence of a slice identifier. The number of bits used to encode slice identifiers is local to an SR domain.</t>
      </section>
      <section anchor="vtn-resource-id-in-an-ipv6-extension-header">
        <name>VTN Resource ID in an IPv6 Extension Header</name>
        <t><xref target="I-D.ietf-6man-enhanced-vpn-vtn-id"/> describes a mechanism to carry an identifier, called VTN resource ID, in the IPv6 Hop-by-Hop extension header. The document claims that "VTN resource ID" is equivalent to NRP-ID, but does motivate why another yet ID is thus needed rather than using "NRP-ID".</t>
        <t>The length of the VTN ID depends on the context type. When CT=0, the VTN ID is a 4-octet ID.</t>
      </section>
      <section anchor="network-resource-partitions-nrps-2">
        <name>Network Resource Partitions (NRPs)</name>
        <section anchor="resource-aware-segments">
          <name>Resource-aware Segments</name>
          <t>An NRP can be represented in SR networks using a set of NRP-specific resource-aware segments <xref target="I-D.ietf-spring-resource-aware-segments"/>
            <xref target="I-D.ietf-spring-sr-for-enhanced-vpn"/>.</t>
        </section>
        <section anchor="nrp-id-in-srv6">
          <name>NRP ID in SRv6</name>
          <t><xref target="I-D.liu-spring-nrp-id-in-srv6-segment"/> specifies an approach to encode the NRP ID in the SRH. This ID is used by intermediate IPv6 routers to identify the NRP to be used for forwarding. The encoding of the NRP ID in an IPv6 address is variable; an instruction is thus needed to help identifyint the NRP-ID position (e.g., low 16 bits).</t>
        </section>
        <section anchor="nrp-selector-in-mpls-network-actions">
          <name>NRP Selector in MPLS Network Actions</name>
          <t>As mentioned in <xref target="flow-agg"/>, packets that are associated with a Slice-Flow Aggregate may carry an NRP Selector (NRPS). This selector is intended to be conveyed in the packet's network layer header to identify the flow aggregate to which a packet belongs. <xref target="I-D.li-mpls-mna-nrp-selector"/> investigates a set of options to use MPLS Network Actions (MNA) to carry the NRPS:</t>
          <ul spacing="normal">
            <li>
              <t>13-bit NRP Selector (NRPS13) Action</t>
            </li>
            <li>
              <t>20-bit NRP Selector (NRPS20) Action</t>
            </li>
            <li>
              <t>20-bit Entropy and NRP Selector (ENRPS20) Action</t>
            </li>
          </ul>
        </section>
        <section anchor="srv6-resource-programming">
          <name>SRv6 Resource Programming</name>
          <t><xref target="I-D.gong-spring-srv6-nrp-flavor"/> defines a new SRv6 Endpoint behavior <xref target="RFC8986"/> to associate a SID with a set of NRPs.</t>
        </section>
      </section>
    </section>
    <section anchor="oam">
      <name>OAM</name>
      <section anchor="lsp-pingtraceroute-extensions">
        <name>LSP Ping/Traceroute Extensions</name>
        <t><xref target="I-D.liu-mpls-lsp-ping-nrp"/> specifies extenstions to the LSP Ping/Traceroute to convey NRP-ID in SR domains.</t>
        <t>The NRP-ID is a encoded as a 4-octet field.</t>
      </section>
      <section anchor="precision-availability-metrics-pam">
        <name>Precision Availability Metrics (PAM)</name>
        <t><xref target="RFC9544"/> introduces a new set of metrics, called Precision Availability Metrics (PAM). These metrics are used to assess whether a service (e.g., Network Slice Service) is provided in compliance with its specified SLOs.</t>
        <t><xref target="I-D.clemm-opsawg-pam-ipfix"/> specifies a set of new IP Flow Information Export (IPFIX) Information Elements to export precision availability data associated with Flows. These Information Elements are specifically designed to indicate compliance of a Flow with an SLO.</t>
      </section>
      <section anchor="ipfix-information-elements-for-nrp">
        <name>IPFIX Information Elements for NRP</name>
        <t><xref target="I-D.liu-opsawg-ipfix-network-slice"/> explores how to use IPFIX to export NRP IDs. However, there is currently no one single stable/authoritative specification of NRP-ID. This identifier is being proposed as data plane and control plane extensions. These proposals do not share the same ID format.</t>
        <t>The initial version of <xref target="I-D.liu-opsawg-ipfix-network-slice"/> does explain which plan is used, in which layer the ID was exported, etc. Defining an IPFIX IE is useful for network observability, however there is no stable specification yet of the ID to be exported.</t>
      </section>
      <section anchor="pam-based-path-computation">
        <name>PAM-based Path Computation</name>
        <t><xref target="I-D.contreras-pce-pam"/> specifies a new PCEP object (PRECISION METRIC) for
path calculation with performance requirements expressed as SLOs. The new
PCEP object uses the attributes defined in <xref target="RFC9544"/>.</t>
      </section>
    </section>
    <section anchor="misc">
      <name>Misc</name>
      <section anchor="scalability-considerations-for-nrp">
        <name>Scalability Considerations for NRP</name>
        <t><xref target="I-D.ietf-teas-nrp-scalability"/> discusses a set of scenarios for the deployment of NRP with a focus on scalability implications. The document reasons about the increase of requested RFC 9543 Network Slice Services that would require NRPs. Such an increase of slices is speculative at this stage.</t>
      </section>
      <section anchor="deployment-considerations">
        <name>Deployment Considerations</name>
        <t><xref target="I-D.ma-teas-ietf-network-slice-deployment"/> reports a set of "deployments" from various network operators and identifies some considerations for operating Network Slices (e.g., scalability and automation). Most of these reported cases rely upon SRv6. The document does not provide enough details whether these "deployments" are for testing purposes or reflect setups to carry customers' traffic.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of the mechanisms listed in the document are discussed in the relevant documents that specify these mechanisms.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not make any request to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9543">
        <front>
          <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
          <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
          <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
          <author fullname="R. Rokui" initials="R." surname="Rokui"/>
          <author fullname="S. Homma" initials="S." surname="Homma"/>
          <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
          <author fullname="L. Contreras" initials="L." surname="Contreras"/>
          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
            <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
            <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9543"/>
        <seriesInfo name="DOI" value="10.17487/RFC9543"/>
      </reference>
      <reference anchor="RFC9889">
        <front>
          <title>A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
          <author fullname="K. Szarkowicz" initials="K." role="editor" surname="Szarkowicz"/>
          <author fullname="R. Roberts" initials="R." role="editor" surname="Roberts"/>
          <author fullname="J. Lucek" initials="J." surname="Lucek"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="LM. Contreras" initials="LM." surname="Contreras"/>
          <date month="November" year="2025"/>
          <abstract>
            <t>Network slicing is a feature that was introduced by the 3rd Generation Partnership Project (3GPP) in Mobile Networks. Realization of 5G slicing implies requirements for all mobile domains, including the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN).</t>
            <t>This document describes a network slice realization model for IP/MPLS networks with a focus on the Transport Network fulfilling the service objectives for 5G slicing connectivity. The realization model reuses many building blocks commonly used in service provider networks at the current time.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9889"/>
        <seriesInfo name="DOI" value="10.17487/RFC9889"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ns-ip-mpls">
        <front>
          <title>Realizing Network Slices in IP/MPLS Networks</title>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems Inc.</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by by requiring compliant domains and nodes to
   provide forwarding treatment (scheduling, drop policy, resource
   usage) based on slice identifiers.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-06"/>
      </reference>
      <reference anchor="I-D.ietf-ccamp-yang-otn-slicing">
        <front>
          <title>Framework and Data Model for OTN Network Slicing</title>
          <author fullname="Aihua Guo" initials="A." surname="Guo">
            <organization>Futurewei Technologies</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Sergio Belotti" initials="S." surname="Belotti">
            <organization>Nokia</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Yunbin Xu" initials="Y." surname="Xu">
            <organization>CAICT</organization>
          </author>
          <author fullname="Yang Zhao" initials="Y." surname="Zhao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
            <organization>Alef Edge</organization>
          </author>
          <date day="5" month="January" year="2026"/>
          <abstract>
            <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and
   defines YANG data models with OTN technology-specific augments
   deployed at both the north and south bound of the OTN network slice
   controller.  Additional YANG data model augmentations will be defined
   in a future version of this draft.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-yang-otn-slicing-10"/>
      </reference>
      <reference anchor="RFC9732">
        <front>
          <title>A Framework for NRP-Based Enhanced Virtual Private Networks</title>
          <author fullname="J. Dong" initials="J." surname="Dong"/>
          <author fullname="S. Bryant" initials="S." surname="Bryant"/>
          <author fullname="Z. Li" initials="Z." surname="Li"/>
          <author fullname="T. Miyasaka" initials="T." surname="Miyasaka"/>
          <author fullname="Y. Lee" initials="Y." surname="Lee"/>
          <date month="March" year="2025"/>
          <abstract>
            <t>This document describes a framework for Enhanced Virtual Private Networks (VPNs) based on Network Resource Partitions (NRPs) in order to support the needs of applications with specific traffic performance requirements (e.g., low latency, bounded jitter). NRP-based enhanced VPNs leverage the VPN and Traffic Engineering (TE) technologies and add characteristics that specific services require beyond those provided by conventional VPNs. Typically, an NRP-based enhanced VPN will be used to underpin network slicing, but it could also be of use in its own right providing enhanced connectivity services between customer sites. This document also provides an overview of relevant technologies in different network layers and identifies some areas for potential new work.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9732"/>
        <seriesInfo name="DOI" value="10.17487/RFC9732"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ns-models-applicability">
        <front>
          <title>Applicability of IETF-Defined Service and Network Data Models for Network Slice Service Management</title>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Victor Lopez" initials="V." surname="Lopez">
            <organization>Nokia</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <date day="24" month="June" year="2025"/>
          <abstract>
            <t>   This document exemplifies how the various data models that are
   produced in the IETF can be combined in the context of Network Slice
   Services delivery.

   Specifically, this document describes the relationship between the
   Network Slice Service models for requesting Network Slice Services
   and both Service (e.g., the L3VPN Service Model, the L2VPN Service
   Model) and Network (e.g., the L3VPN Network Model, the L2VPN Network
   Model) models used during their realizations.  In addition, this
   document describes the communication between a Network Slice
   Controller (NSC) and the network controllers for the realization of
   Network Slices.

   The Network Slice Service YANG model provides a customer-oriented
   view of the intended Network slice Service.  Thus, once an NSC
   receives a request for a Slice Service request, the NSC has to map it
   to accomplish the specific objectives expected by the network
   controllers.  Existing YANG network models are analyzed against
   Network Slice requirements, and the gaps in existing models are
   identified.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-models-applicability-01"/>
      </reference>
      <reference anchor="RFC9182">
        <front>
          <title>A YANG Network Data Model for Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <author fullname="A. Aguado" initials="A." surname="Aguado"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
            <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9182"/>
        <seriesInfo name="DOI" value="10.17487/RFC9182"/>
      </reference>
      <reference anchor="RFC9291">
        <front>
          <title>A YANG Network Data Model for Layer 2 VPNs</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <date month="September" year="2022"/>
          <abstract>
            <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
            <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9291"/>
        <seriesInfo name="DOI" value="10.17487/RFC9291"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ns-controller-models">
        <front>
          <title>IETF Network Slice Controller and its Associated Data Models</title>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Nvidia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
         </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   This document describes an approach for structuring the IETF Network
   Slice Controller as well as how to use different data models being
   defined for IETF Network Slice Service provision (and how they are
   related).  It is not the purpose of this document to standardize or
   constrain the implementation the IETF Network Slice Controller.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-controller-models-06"/>
      </reference>
      <reference anchor="I-D.gong-spring-hierarchical-slice-solution">
        <front>
          <title>Segment Routing based Solution for Hierarchical IETF Network Slices</title>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Mengxiao Chen" initials="M." surname="Chen">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Yanrong Liang" initials="Y." surname="Liang">
            <organization>Ruijie Networks Co., Ltd.</organization>
          </author>
          <date day="21" month="December" year="2025"/>
          <abstract>
            <t>   This document describes a Segment Routing based solution for two-
   level hierarchical IETF network slices. Level-1 network slice is
   realized by associating Flex-Algo with dedicated sub-interfaces, and
   level-2 network slice is realized by using SR Policy with additional
   NRP-ID on data plane.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-gong-spring-hierarchical-slice-solution-03"/>
      </reference>
      <reference anchor="I-D.li-teas-composite-network-slices">
        <front>
          <title>Realization of Composite IETF Network Slices</title>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Pang" initials="R." surname="Pang">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   A network slice offers connectivity services to a network slice
   customer with specific Service Level Objectives (SLOs) and Service
   Level Expectations (SLEs) over a common underlay network.  RFC 9543
   describes a framework for network slices built in networks that use
   IETF technologies.  As part of that framework, the Network Resource
   Partition (NRP) is introduced as a collection of network resources
   that are allocated from the underlay network to carry a specific set
   of network slice service traffic and meet specific SLOs and SLEs.  In
   some network scenarios, network slices using IETF technologies may
   span multiple network domains, and they may be composed
   hierarchically, which means a network slice itself may be further
   sliced.  In the context of 5G, a 5G end-to-end network slice consists
   of three different types of network technology segments: Radio Access
   Network (RAN), Transport Network (TN) and Core Network (CN).  The
   transport segments of the 5G end-to-end network slice can be provided
   using network slices described in RFC 9543.

   This document first describes the possible use cases of composite
   network slices built in networks that use IETF network technologies,
   then it provides considerations about the realization of composite
   network slices.  For the multi-domain network slices, an Inter-Domain
   Network Resource Partition Identifier (Inter-domain NRP ID) may be
   introduced.  For hierarchical network slices, the structure of the
   NRP ID is discussed.  And for the interaction between IETF network
   slices with 5G network slices, the identifiers of the 5G network
   slices may be introduced into IETF networks.  These network slice-
   related identifiers may be used in the data plane, control plane and
   management plane of the network for the instantiation and management
   of composite network slices.  This document also describes the
   management considerations of composite network slices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-teas-composite-network-slices-05"/>
      </reference>
      <reference anchor="I-D.zhang-rtgwg-aaa-hierarchical-network-slices">
        <front>
          <title>AAA for Hierarchical Network Slices</title>
          <author fullname="Xiaoqiu Zhang" initials="X." surname="Zhang">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Yuanxiang Qiu" initials="Y." surname="Qiu">
            <organization>New H3C Technologies</organization>
          </author>
          <date day="7" month="January" year="2024"/>
          <abstract>
            <t>   This document describes an enhanced AAA mechanism for hierarchical
   network slice service when users access to the network and use the
   network slice resources of different SLA levels.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-zhang-rtgwg-aaa-hierarchical-network-slices-00"/>
      </reference>
      <reference anchor="I-D.ietf-teas-5g-network-slice-application">
        <front>
          <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
          <author fullname="Xuesong Geng" initials="X." surname="Geng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ivan Bykov" initials="I." surname="Bykov">
            <organization>Ribbon Communications</organization>
          </author>
          <date day="7" month="July" year="2025"/>
          <abstract>
            <t>   Network Slicing is one of the core features of 5G defined in 3GPP,
   which provides different network service as independent logical
   networks.  To provide 5G network slices services, an end-to-end
   network slice has to span three network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of the IETF network slice
   framework in providing 5G end-to-end network slices, including
   network slice mapping in the management, control and data planes.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-network-slice-application-05"/>
      </reference>
      <reference anchor="I-D.cbs-teas-5qi-to-dscp-mapping">
        <front>
          <title>5QI to DiffServ DSCP Mapping Example for Enforcement of 5G End-to-End Network Slice QoS</title>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Ivan Bykov" initials="I." surname="Bykov">
            <organization>Ribbon Communications</organization>
          </author>
          <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
            <organization>Juniper Networks</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   5G End-to-End Network Slice QoS is an essential aspect of network
   slicing, as described in both IETF drafts and the 3GPP
   specifications.  Network slicing allows for the creation of multiple
   logical networks on top of a shared physical infrastructure, tailored
   to support specific use cases or services.  The primary goal of QoS
   in network slicing is to ensure that the specific performance
   requirements of each slice are met, including latency, reliability,
   and throughput.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cbs-teas-5qi-to-dscp-mapping-05"/>
      </reference>
      <reference anchor="I-D.jiang-tsvwg-slice-media-service">
        <front>
          <title>Encoding 3GPP Slices for Interactive Media Services</title>
          <author fullname="Tianji Jiang" initials="T." surname="Jiang">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Dan Wang" initials="D." surname="Wang">
            <organization>China Mobile</organization>
          </author>
          <date day="23" month="October" year="2023"/>
          <abstract>
            <t>   Extended Reality &amp; multi-modality communication, or XRM, is a type of
   advanced service that has been studied and standardized in the 3GPP
   SA2 working group.  It targets at achieving high data rate, ultra-low
   latency, and high reliability.  The streams of an XRM service might
   be comprised of data from multiple modalities, namely, video, audio,
   ambient-sensor and haptic detection, etc.  XRM service faces
   challenges on various aspects, e.g. accurate multi-modality data
   synchronization, QoS differentiation, large volume of packets, and
   etc.  While a new 3GPP network slice type, HDLLC, has been recently
   introduced to handle the QoS requirements of XRM streams, the
   ubiquitously-existential encryption of packet header and/or payload
   post additional challenges to the transport of encoded video packets
   via 5GS.  We have then discussed two potential IETF schemes, e.g.,
   IP-DSCP based or UDP-option extension, that could be applied to
   'expose' XRM QoS 'metadata' to 5GS.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-jiang-tsvwg-slice-media-service-01"/>
      </reference>
      <reference anchor="I-D.ietf-teas-applicability-actn-slicing">
        <front>
          <title>Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to IETF Network Slicing</title>
          <author fullname="Daniel King" initials="D." surname="King">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Independent</organization>
          </author>
          <author fullname="Haomian Zheng" initials="H." surname="Zheng">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <date day="28" month="August" year="2024"/>
          <abstract>
            <t>   Network abstraction is a technique that can be applied to a network
   domain to obtain a view of potential connectivity across the network
   by utilizing a set of policies to select network resources.

   Network slicing is an approach to network operations that builds on
   the concept of network abstraction to provide programmability,
   flexibility, and modularity.  It may use techniques such as Software
   Defined Networking (SDN) and Network Function Virtualization (NFV) to
   create multiple logical or virtual networks, each tailored for a set
   of services that share the same set of requirements.

   Abstraction and Control of Traffic Engineered Networks (ACTN) is
   described in RFC 8453.  It defines an SDN-based architecture that
   relies on the concept of network and service abstraction to detach
   network and service control from the underlying data plane.

   This document outlines the applicability of ACTN to network slicing
   in a Traffic Engineered (TE) network that utilizes IETF technologies.
   It also identifies the features of network slicing not currently
   within the scope of ACTN and indicates where ACTN might be extended.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-applicability-actn-slicing-10"/>
      </reference>
      <reference anchor="I-D.ietf-dmm-tn-aware-mobility">
        <front>
          <title>Mobility-aware Transport Network Slicing for 5G</title>
          <author fullname="Uma Chunduri" initials="U." surname="Chunduri">
            <organization>Intel Corporation</organization>
          </author>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sridhar Bhaskaran" initials="S." surname="Bhaskaran">
            <organization>Starten Systems</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Nvidia</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <date day="4" month="December" year="2025"/>
          <abstract>
            <t>   Network slicing in 5G enables logical networks for communication
   services of multiple 5G customers to be multiplexed over the same
   infrastructure.  While 5G slicing covers logical separation of
   various aspects of 5G infrastructure and services, user's data plane
   packets over the Radio Access Network (RAN) and Core Network (5GC)
   use IP in many segments of an end-to-end 5G slice.  When end-to-end
   slices in a 5G System use network resources, they are mapped to
   corresponding Transport Network (TN) slice(s) which in turn provide
   the bandwidth, latency, isolation, and other criteria required for
   the realization of a 5G slice.

   This document describes mapping of 5G slices to TN slices using UDP
   source port number of the GTP-U bearer when the TN slice provider is
   separated by an "attachment circuit" from the networks in which the
   5G network functions are deployed, for example, 5G functions that are
   distributed across data centers.  The slice mapping defined here is
   supported transparently when a 5G user device moves across 5G
   attachment points and session anchors.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-dmm-tn-aware-mobility-24"/>
      </reference>
      <reference anchor="RFC9834">
        <front>
          <title>YANG Data Models for Bearers and Attachment Circuits as a Service (ACaaS)</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="R. Roberts" initials="R." role="editor" surname="Roberts"/>
          <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="B. Wu" initials="B." surname="Wu"/>
          <date month="September" year="2025"/>
          <abstract>
            <t>Delivery of network services assumes that appropriate setup is
provisioned over the links that connect customer termination points
and a provider network. The required setup to allow successful data
exchange over these links is referred to as an attachment circuit
(AC), while the underlying link is referred to as a "bearer".</t>
            <t>This document specifies a YANG service data model for ACs. This model
can be used for the provisioning of ACs before or during service
provisioning (e.g., RFC 9543 Network Slice Service).</t>
            <t>The document also specifies a YANG service data model for managing
bearers over which ACs are established.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9834"/>
        <seriesInfo name="DOI" value="10.17487/RFC9834"/>
      </reference>
      <reference anchor="I-D.sw-detnet-network-slice-mapping-yang">
        <front>
          <title>YANG Data Model for DetNet Mapping with Network Slice</title>
          <author fullname="Xueyan Song" initials="X." surname="Song">
            <organization>ZTE Corp.</organization>
          </author>
          <author fullname="Haisheng Wu" initials="H." surname="Wu">
            <organization>ZTE Corp.</organization>
          </author>
          <date day="8" month="March" year="2023"/>
          <abstract>
            <t>   The convergence of IETF Network Slicing with DetNet achieves adequate
   network resource allocation and reservation to each node along the
   way of DetNet flows for latency-sensitive services.  This document
   introduces the applicability of DetNet to network slice , DetNet
   mapping with Network Slice requirements and YANG data models
   extensions in the context of IP/ MPLS network.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-sw-detnet-network-slice-mapping-yang-02"/>
      </reference>
      <reference anchor="RFC9181">
        <front>
          <title>A Common YANG Data Model for Layer 2 and Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>This document defines a common YANG module that is meant to be reused by various VPN-related modules such as Layer 3 VPN and Layer 2 VPN network models.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9181"/>
        <seriesInfo name="DOI" value="10.17487/RFC9181"/>
      </reference>
      <reference anchor="RFC9833">
        <front>
          <title>A Common YANG Data Model for Attachment Circuits</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="R. Roberts" initials="R." role="editor" surname="Roberts"/>
          <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="B. Wu" initials="B." surname="Wu"/>
          <date month="September" year="2025"/>
          <abstract>
            <t>The document specifies a common attachment circuits (ACs) YANG data
model, which is designed to be reusable by other models. This design
is meant to ensure consistent AC structures among models that
manipulate ACs. For example, this common model can be reused by
service models to expose ACs as a service, service models that
require binding a service to a set of ACs, network and device models
to provision ACs, etc.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9833"/>
        <seriesInfo name="DOI" value="10.17487/RFC9833"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
        <front>
          <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems, Inc</organization>
          </author>
          <author fullname="John Mullooly" initials="J." surname="Mullooly">
            <organization>Cisco Systems, Inc</organization>
          </author>
          <date day="9" month="May" year="2025"/>
          <abstract>
            <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-25"/>
      </reference>
      <reference anchor="RFC9408">
        <front>
          <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="V. Lopez" initials="V." surname="Lopez"/>
          <date month="June" year="2023"/>
          <abstract>
            <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
            <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9408"/>
        <seriesInfo name="DOI" value="10.17487/RFC9408"/>
      </reference>
      <reference anchor="RFC9835">
        <front>
          <title>A Network YANG Data Model for Attachment Circuits</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="R. Roberts" initials="R." surname="Roberts"/>
          <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="B. Wu" initials="B." surname="Wu"/>
          <date month="September" year="2025"/>
          <abstract>
            <t>This document specifies a network model for attachment circuits. The model can be used for the provisioning of attachment circuits prior or during service provisioning (e.g., VPN, Network Slice Service). A companion service model is specified in the YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf- opsawg-teas-attachment-circuit).</t>
            <t>The module augments the base network ('ietf-network') and the Service Attachment Point (SAP) models with the detailed information for the provisioning of attachment circuits in Provider Edges (PEs).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9835"/>
        <seriesInfo name="DOI" value="10.17487/RFC9835"/>
      </reference>
      <reference anchor="I-D.ietf-teas-transport-network-slice-yang">
        <front>
          <title>IETF Network Slice Topology YANG Data Model</title>
          <author fullname="Xufeng Liu" initials="X." surname="Liu">
            <organization>Alef Edge</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Sergio Belotti" initials="S." surname="Belotti">
            <organization>Nokia</organization>
          </author>
          <author fullname="Aihua Guo" initials="A." surname="Guo">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Italo Busi" initials="I." surname="Busi">
            <organization>Huawei</organization>
          </author>
          <date day="17" month="March" year="2025"/>
          <abstract>
            <t>   An RFC 9543 network slice customer may utilize intent-based
   topologies to express resource reservation intentions within the
   provider's network.  These customer-defined intent topologies allow
   customers to request shared resources for future connections that can
   be flexibly allocated and customized.  Additionally, they provide an
   extensive level of control over underlay service paths within the
   network slice.

   This document describes a YANG data model for expressing customer
   intent topologies which can be used to enhance the RFC 9543 Network
   Slice Services in specific use cases, such as Network wholesale
   scenarios, where both topology and connectivity intents need to be
   expressed.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-transport-network-slice-yang-00"/>
      </reference>
      <reference anchor="RFC9731">
        <front>
          <title>A YANG Data Model for Virtual Network (VN) Operations</title>
          <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
          <author fullname="D. Dhody" initials="D." role="editor" surname="Dhody"/>
          <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
          <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
          <author fullname="B. Yoon" initials="B." surname="Yoon"/>
          <date month="March" year="2025"/>
          <abstract>
            <t>A Virtual Network (VN) is a network provided by a service provider to a customer for the customer to use in any way it wants as though it were a physical network. This document provides a YANG data model generally applicable to any mode of VN operations. This includes VN operations as per the Abstraction and Control of TE Networks (ACTN) framework (RFC 8453).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9731"/>
        <seriesInfo name="DOI" value="10.17487/RFC9731"/>
      </reference>
      <reference anchor="I-D.ietf-teas-nrp-yang">
        <front>
          <title>YANG Data Models for Network Resource Partitions (NRPs)</title>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="21" month="July" year="2025"/>
          <abstract>
            <t>   RFC 9543 describes a framework for Network Slices in networks built
   from IETF technologies.  In this framework, the network resource
   partition (NRP) is introduced as a collection of network resources
   allocated from the underlay network to carry a specific set of
   Network Slice Service traffic and meet specific Service Level
   Objective (SLO) and Service Level Expectation (SLE) characteristics.

   This document defines YANG data models for Network Resource
   Partitions (NRPs), applicable to devices and network controllers.
   The models can be used, in particular, for the realization of the
   RFC9543 Network Slice Services in IP/MPLS and Segment Routing (SR)
   networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-nrp-yang-04"/>
      </reference>
      <reference anchor="I-D.dhody-teas-ietf-network-slice-mapping">
        <front>
          <title>IETF Network Slice Service Mapping YANG Model</title>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="12" month="October" year="2025"/>
          <abstract>
            <t>   This document provides a YANG data model to map IETF network slice
   service to Traffic Engineering (TE) models (e.g., the Virtual Network
   (VN) model or the TE Tunnel, etc).  It also supports mapping to the
   VPN Network models and Network Resource Partition (NRP) models.
   These models are referred to as the IETF network slice service
   mapping model and are applicable generically for the seamless control
   and management of the IETF network slice service with underlying TE/
   VPN support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the IETF network slice service
   requests are mapped onto underlying network resources and TE/VPN
   models.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dhody-teas-ietf-network-slice-mapping-07"/>
      </reference>
      <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
        <front>
          <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung Electronics</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei</organization>
          </author>
          <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
            <organization>Huawei</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Nvidia</organization>
          </author>
          <date day="12" month="October" year="2025"/>
          <abstract>
            <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-18"/>
      </reference>
      <reference anchor="RFC9832">
        <front>
          <title>BGP Classful Transport Planes</title>
          <author fullname="K. Vairavakkalai" initials="K." role="editor" surname="Vairavakkalai"/>
          <author fullname="N. Venkataraman" initials="N." role="editor" surname="Venkataraman"/>
          <date month="September" year="2025"/>
          <abstract>
            <t>This document specifies a mechanism referred to as "Intent-Driven Service Mapping". The mechanism uses BGP to express Intent-based association of overlay routes with underlay routes having specific Traffic Engineering (TE) characteristics satisfying a certain Service Level Agreement (SLA). This is achieved by defining new constructs to group underlay routes with sufficiently similar TE characteristics into identifiable classes (called "Transport Classes" or "TCs"), that overlay routes use as an ordered set to resolve reachability (Resolution Schemes) towards service endpoints. These constructs can be used, for example, to realize the "IETF Network Slice" defined in the TEAS Network Slices framework (RFC 9543).</t>
            <t>Additionally, this document specifies protocol procedures for BGP that enable dissemination of service mapping information in a network that may span multiple cooperating administrative domains. These domains may be administered either by the same provider or by closely coordinating providers. A new BGP address family that leverages the procedures described in RFC 4364 ("BGP/MPLS IP Virtual Private Networks (VPNs)") and follows the NLRI encoding described in RFC 8277 ("Using BGP to Bind MPLS Labels to Address Prefixes") is defined to enable each advertised underlay route to be identified by its class. This new address family is called "BGP Classful Transport" (or "BGP CT").</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9832"/>
        <seriesInfo name="DOI" value="10.17487/RFC9832"/>
      </reference>
      <reference anchor="RFC9871">
        <front>
          <title>BGP Color-Aware Routing (CAR)</title>
          <author fullname="D. Rao" initials="D." role="editor" surname="Rao"/>
          <author fullname="S. Agrawal" initials="S." role="editor" surname="Agrawal"/>
          <date month="November" year="2025"/>
          <abstract>
            <t>This document describes a BGP-based routing solution to establish end-to-end intent-aware paths across a multi-domain transport network. The transport network can span multiple service provider and customer network domains. The BGP intent-aware paths can be used to steer traffic flows for service routes that need a specific intent. This solution is called BGP Color-Aware Routing (BGP CAR).</t>
            <t>This document describes the routing framework and BGP extensions to enable intent-aware routing using the BGP CAR solution. The solution defines two new BGP SAFIs (BGP CAR SAFI and BGP VPN CAR SAFI) for IPv4 and IPv6. It also defines an extensible Network Layer Reachability Information (NLRI) model for both SAFIs that allows multiple NLRI types to be defined for different use cases. Each type of NLRI contains key and TLV-based non-key fields for efficient encoding of different per-prefix information. This specification defines two NLRI types: Color-Aware Route NLRI and IP Prefix NLRI. It defines non-key TLV types for the MPLS label stack, SR-MPLS label index, and Segment Routing over IPv6 (SRv6) Segment Identifiers (SIDs). This solution also defines a new Local Color Mapping (LCM) Extended Community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9871"/>
        <seriesInfo name="DOI" value="10.17487/RFC9871"/>
      </reference>
      <reference anchor="RFC9012">
        <front>
          <title>The BGP Tunnel Encapsulation Attribute</title>
          <author fullname="K. Patel" initials="K." surname="Patel"/>
          <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
          <author fullname="S. Sangli" initials="S." surname="Sangli"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <date month="April" year="2021"/>
          <abstract>
            <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
            <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9012"/>
        <seriesInfo name="DOI" value="10.17487/RFC9012"/>
      </reference>
      <reference anchor="RFC9256">
        <front>
          <title>Segment Routing Policy Architecture</title>
          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
          <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
          <author fullname="D. Voyer" initials="D." surname="Voyer"/>
          <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
          <author fullname="P. Mattes" initials="P." surname="Mattes"/>
          <date month="July" year="2022"/>
          <abstract>
            <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
            <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9256"/>
        <seriesInfo name="DOI" value="10.17487/RFC9256"/>
      </reference>
      <reference anchor="I-D.ietf-idr-flowspec-network-slice-ts">
        <front>
          <title>BGP Flowspec for IETF Network Slice Traffic Steering</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Subin Wang" initials="S." surname="Wang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jiang Wenying" initials="J." surname="Wenying">
            <organization>China Mobile</organization>
          </author>
          <date day="8" month="May" year="2025"/>
          <abstract>
            <t>   BGP Flow Specification (Flowspec) provides a mechanism to distribute
   traffic Flow Specifications and the forwarding actions to be
   performed to the specific traffic flows.  A set of Flowspec
   components are defined to specify the matching criteria that can be
   applied to the packet, and a set of BGP extended communities are
   defined to encode the actions a routing system can take on a packet
   which matches the flow specification.

   An IETF Network Slice enables connectivity between a set of Service
   Demarcation Points (SDPs) with specific Service Level Objectives
   (SLOs) and Service Level Expectations (SLEs) over a common underlay
   network.  To meet the connectivity and performance requirements of
   network slice services, network slice service traffic may need to be
   mapped to a corresponding Network Resource Partition (NRP).  The edge
   nodes of the NRP needs to identify the traffic flows of specific
   connectivity constructs of network slices, and steer the matched
   traffic into the corresponding NRP, or a specific path within the
   corresponding NRP.

   BGP Flowspec can be used to distribute the matching criteria and the
   forwarding actions to be performed on network slice service traffic.
   The existing Flowspec components can be reused for the matching of
   network slice services flows at the edge of an NRP.  New components
   and traffic action may need to be defined for steering network slice
   service flows into the corresponding NRP.  This document defines the
   extensions to BGP Flowspec for IETF network slice traffic steering
   (NS-TS).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-network-slice-ts-04"/>
      </reference>
      <reference anchor="I-D.drake-teas-bgp-ls-filter-nrp">
        <front>
          <title>Using BGP-LS Filters to Instanted Network Resource Partitions</title>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Luay Jalil" initials="L." surname="Jalil">
            <organization>Verizon</organization>
          </author>
          <author fullname="Avinash Reddy Lingala" initials="A. R." surname="Lingala">
            <organization>AT&amp;T</organization>
          </author>
          <date day="16" month="December" year="2022"/>
          <abstract>
            <t>   Future networks that support advanced services, such as those enabled
   by 5G mobile networks, envision a set of overlay networks each with
   different performance and scaling properties.  These overlays are
   known as network slices and are realized over a common underlay
   network.  In the context of IETF technologies, they are known as IETF
   network slices.

   In order to support IETF network slicing, as well as to offer
   enhanced VPN services in general, it is necessary to define a
   mechanism by which specific resources (buffers, queues, scheduling
   policies, etc.) of specific network topology components (links and/or
   nodes) of an underlay network can be used by a specific network
   slice, VPN, or set of VPNs.  These collections of resources are known
   as Network Resource Partitions (NRPs).

   This document sets out such a mechanism for use of BGP-LS to
   construct and operate NRPs in Segment Routing networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-drake-teas-bgp-ls-filter-nrp-00"/>
      </reference>
      <reference anchor="I-D.chen-idr-bgp-ls-transport-slice">
        <front>
          <title>BGP-LS Extensions for SR Network Resource Partition SIDs</title>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <date day="24" month="January" year="2024"/>
          <abstract>
            <t>   This document specifies extensions to the BGP Link-state address-
   family in order to advertise the information of Network Resource
   Partition SIDs.  An external component (e.g., a controller) then can
   collect Network Resource Partition SIDs in the "northbound"
   direction.  The draft is applicable to both SR-MPLS and SRv6
   dataplanes.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-chen-idr-bgp-ls-transport-slice-06"/>
      </reference>
      <reference anchor="I-D.dong-idr-bgp-nrp-policy">
        <front>
          <title>Advertising Network Resource Partition (NRP) Policy in BGP</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="KaZhang" initials="" surname="KaZhang">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   A Network Resource Partition (NRP) is a subset of the network
   resources and the associated policies on each of a connected set of
   links in the underlay network.  An NRP could be used as the underlay
   to support one or a group of enhanced VPN services or RFC 9543
   network slice services.  For the instantiation of an NRP, NRP-
   specific information and policy need to be advertised to the network
   nodes involved in the NRP, so that the NRP-specific state can be
   created and NRP-specific behavior can be enabled.  The mechanism for
   instantiating NRPs on the involved network elements is called NRP
   Policy.

   This document specifies the BGP extensions for advertising NRP Policy
   information to the set of network nodes involved in the NRP.  The NRP
   Policy is advertised using a separate BGP Subsequent Address Family
   Identifier (SAFI) of the BGP Link-State (BGP-LS) Address Family,
   which allows to reuse the TLVs defined in BGP-LS without impacting
   the base BGP and BGP-LS functionality.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dong-idr-bgp-nrp-policy-01"/>
      </reference>
      <reference anchor="I-D.dong-idr-bgp-ls-scalable-nrp">
        <front>
          <title>BGP Link State Extensions for Scalable Network Resource Partition</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Zehua Hu" initials="Z." surname="Hu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Jun Ge" initials="J." surname="Ge">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="KaZhang" initials="" surname="KaZhang">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="21" month="October" year="2024"/>
          <abstract>
            <t>   Enhanced VPNs aim to deliver VPN services with enhanced
   characteristics, such as guaranteed resources, latency, jitter, etc.,
   so as to support customers requirements on connectivity services with
   these enhanced characteristics.  Enhanced VPN requires integration
   between the overlay VPN connectivity and the characteristics provided
   by the underlay network.  A Network Resource Partition (NRP) is a
   subset of the network resources and associated policies on each of a
   connected set of links in the underlay network.  An NRP could be used
   as the underlay to support one or a group of enhanced VPN services.
   The NRP-specific resource information and status needs to be
   collected from network nodes and reported to the network controller
   for NRP-specific management and path computation.

   This document specifies the BGP Link-State (BGP-LS) mechanisms with
   necessary extensions to advertise the information of NRPs to network
   controller in a scalable way.  The NRP information is advertised
   using a separate type of BGP-LS NLRI, which allows flexible update of
   NRP information without impacting the based link state information.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dong-idr-bgp-ls-scalable-nrp-02"/>
      </reference>
      <reference anchor="I-D.ietf-idr-sr-policy-nrp">
        <front>
          <title>BGP SR Policy Extensions for Network Resource Partition</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhibo Hu" initials="Z." surname="Hu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Ran Pang" initials="R." surname="Pang">
            <organization>China Unicom</organization>
          </author>
          <date day="13" month="October" year="2025"/>
          <abstract>
            <t>   Segment Routing (SR) Policy is a set of candidate paths, each
   consisting of one or more segment lists and the associated
   information.  The header of a packet steered in an SR Policy is
   augmented with an ordered list of segments associated with that SR
   Policy.  A Network Resource Partition (NRP) is a subset of network
   resources allocated in the underlay network which can be used to
   support one or a group of RFC 9543 network slice services.

   In networks where there are multiple NRPs, an SR Policy may be
   associated with a particular NRP.  The association between SR Policy
   and NRP needs to be specified, so that for service traffic which is
   steered into the SR Policy, the header of the packets can be
   augmented with the information associated with the NRP.  An SR Policy
   candidate path can be distributed using BGP SR Policy.  This document
   defines the extensions to BGP SR policy to specify the NRP which the
   SR Policy candidate path is associated with.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-sr-policy-nrp-04"/>
      </reference>
      <reference anchor="I-D.liu-idr-bgp-network-slicing">
        <front>
          <title>BGP Extensions to Support Packet Network Slicing in SR Policy</title>
          <author fullname="Yao Liu" initials="Y." surname="Liu">
            <organization>ZTE</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE</organization>
          </author>
          <date day="31" month="March" year="2023"/>
          <abstract>
            <t>   This document defines extensions to BGP in order to advertise Network
   Resource Partition (NRP) in SR policy.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-idr-bgp-network-slicing-02"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgp-ls-sr-policy-nrp">
        <front>
          <title>SR Policies Extensions for Network Resource Partition in BGP-LS</title>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei</organization>
          </author>
          <author fullname="Detao Zhao" initials="D." surname="Zhao">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China mobile</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Ran Pang" initials="R." surname="Pang">
            <organization>China Unicom</organization>
          </author>
          <date day="3" month="September" year="2025"/>
          <abstract>
            <t>   A Network Resource Partition (NRP) is a subset of the network
   resources and associated policies on each of a connected set of links
   in the underlay network.  An NRP ID is an important network resource
   attribute associated with the Segment Routing (SR) policy and needs
   to be reported to the external components.  This document defines a
   new TLV which enables the headend to report the NRP which the SR
   Policy Candidate Path (CP) is associated with using Border Gateway
   Protocol Link-State (BGP-LS).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-ls-sr-policy-nrp-02"/>
      </reference>
      <reference anchor="I-D.ietf-pce-pcep-nrp">
        <front>
          <title>Path Computation Element Communication Protocol (PCEP) Extensions for Network Resource Partition (NRP)</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Sheng Fang" initials="S." surname="Fang">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Quan Xiong" initials="Q." surname="Xiong">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Liuyan Han" initials="L." surname="Han">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Minxue Wang" initials="M." surname="Wang">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems</organization>
          </author>
          <date day="6" month="November" year="2025"/>
          <abstract>
            <t>   This document specifies the extensions to Path Computation Element
   Communication Protocol (PCEP) to carry Network Resource Partition
   (NRP) related information in the PCEP messages.  The extensions in
   this document can be used to indicate the NRP-specific constraints
   and information needed in path computation, path status report and
   path initialization.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-pce-pcep-nrp-00"/>
      </reference>
      <reference anchor="I-D.ietf-lsr-isis-sr-vtn-mt">
        <front>
          <title>Applicability of IS-IS Multi-Topology (MT) for Segment Routing based Network Resource Partition (NRP)</title>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Chenhao Ma" initials="C." surname="Ma">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="13" month="October" year="2025"/>
          <abstract>
            <t>   Enhanced VPNs aim to deliver VPN services with enhanced
   characteristics, such as guaranteed resources, latency, jitter, etc.,
   so as to support customers requirements for connectivity services
   with these enhanced characteristics.  Enhanced VPN requires
   integration between the overlay VPN connectivity and the
   characteristics provided by the underlay network.  A Network Resource
   Partition (NRP) is a subset of the network resources and associated
   policies on each of a connected set of links in the underlay network.
   An NRP could be used as the underlay to support one or a group of
   enhanced VPN services.

   In some network scenarios, each NRP can be associated with a unique
   logical network topology.  This document describes a mechanism to
   build the SR-based NRPs using IS-IS Multi-Topology together with
   other well-defined IS-IS extensions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-isis-sr-vtn-mt-11"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgpls-sr-vtn-mt">
        <front>
          <title>Applicability of Border Gateway Protocol - Link State (BGP-LS) with Multi-Topology (MT) for Segment Routing based Network Resource Partitions (NRPs)</title>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Cong Li" initials="C." surname="Li">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="16" month="October" year="2025"/>
          <abstract>
            <t>   When Segment Routing (SR) is used for building Network Resource
   Partitions (NRPs), each NRP can be allocated with a group of Segment
   Identifiers (SIDs) to identify the topology and resource attributes
   of network segments in the NRP.  This document describes how BGP-Link
   State (BGP-LS) with Multi-Topology (MT) can be used to distribute the
   information of SR-based NRPs to a network controller in a specific
   context where each NRP is associated with a separate logical topology
   identified by a Multi-Topology ID (MT-ID).  This document sets out
   the targeted scenarios for the approach suggested, and presents the
   scalability limitations that arise.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgpls-sr-vtn-mt-14"/>
      </reference>
      <reference anchor="I-D.decraene-mpls-slid-encoded-entropy-label-id">
        <front>
          <title>Using Entropy Label for Network Slice Identification in MPLS networks.</title>
          <author fullname="Bruno Decraene" initials="B." surname="Decraene">
            <organization>Orange</organization>
          </author>
          <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
            <organization>Nokia</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Luay Jalil" initials="L." surname="Jalil">
            <organization>Verizon</organization>
          </author>
          <date day="12" month="December" year="2022"/>
          <abstract>
            <t>   This document updates [RFC6790] to extend the use of the TTL field of
   the Entropy Label in order to provide a flexible set of flags called
   the Entropy Label Control field.

   This document also defines a solution to encode a slice identifier in
   MPLS in order to distinguish packets that belong to different slices,
   to allow enforcing per network slice policies (.e.g, Qos).

   The slice identification is independent of the topology.  It allows
   for QoS/DiffServ policy on a per slice basis in addition to the per
   packet QoS/DiffServ policy provided by the MPLS Traffic Class field.

   In order to minimize the size of the MPLS stack and to ease
   incremental deployment the slice identifier is encoded as part of the
   Entropy Label.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-decraene-mpls-slid-encoded-entropy-label-id-05"/>
      </reference>
      <reference anchor="I-D.filsfils-spring-srv6-stateless-slice-id">
        <front>
          <title>Stateless and Scalable Network Slice Identification for SRv6</title>
          <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Francois Clad" initials="F." surname="Clad">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Pablo Camarillo" initials="P." surname="Camarillo">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Syed Kamran Raza" initials="S. K." surname="Raza">
            <organization>Cisco Systems, Inc.</organization>
          </author>
          <author fullname="Daniel Voyer" initials="D." surname="Voyer">
            <organization>Bell Canada</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <date day="22" month="July" year="2024"/>
          <abstract>
            <t>   This document defines a stateless and scalable solution to achieve
   network slicing with SRv6.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-filsfils-spring-srv6-stateless-slice-id-10"/>
      </reference>
      <reference anchor="I-D.cheng-spring-srv6-encoding-network-sliceid">
        <front>
          <title>Encoding Network Slice Identification for SRv6</title>
          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Peiyong Ma" initials="P." surname="Ma">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Fenghua Ren" initials="F." surname="Ren">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Shay Zadok" initials="S." surname="Zadok">
            <organization>Broadcom</organization>
          </author>
          <author fullname="Mingyu Wu" initials="M." surname="Wu">
            <organization>CentecNetworks</organization>
          </author>
          <author fullname="xuewei wang" initials="X." surname="wang">
            <organization>Ruijie Networks Co., Ltd.</organization>
          </author>
          <date day="13" month="January" year="2026"/>
          <abstract>
            <t>   A Network Resource Partition (NRP) is a subset of the network
   resources and associated policies on each of a connected set of links
   in the underlay network.  An NRP could be used as the underlay to
   support one or a group of enhanced VPN services.  For packet
   forwarding in a specific NRP, some fields in the data packet are used
   to identify the NRP the packet belongs to, so that NRP-specific
   processing can be performed on each node along a path in the NRP.

   This document describes a novel method to encode NRP-ID in the outer
   IPv6 header of an SRv6 domain, which could be used to identify the
   NRP-specific processing to be performed on the packets by each
   network node along a network path in the NRP.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cheng-spring-srv6-encoding-network-sliceid-12"/>
      </reference>
      <reference anchor="I-D.ietf-6man-enhanced-vpn-vtn-id">
        <front>
          <title>Carrying Network Resource (NR) related Information in IPv6 Extension Header</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Chongfeng Xie" initials="C." surname="Xie">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Chenhao Ma" initials="C." surname="Ma">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
            <organization>Verizon Inc.</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   Virtual Private Networks (VPNs) provide different customers with
   logically separated connectivity over a common network
   infrastructure.  With the introduction of 5G and also in some
   existing network scenarios, some customers may require network
   connectivity services with advanced features comparing to
   conventional VPN services.  Such kind of network service is called
   enhanced VPNs.  Enhanced VPNs can be used, for example, to deliver
   network slice services.

   A Network Resource Partition (NRP) is a subset of the network
   resources and associated policies on each of a connected set of links
   in the underlay network.  An NRP may be used as the underlay to
   support one or a group of enhanced VPN services.  For packet
   forwarding within a specific NRP, some fields in the data packet
   (which is called NRP Selector) need to be used to identify the NRP to
   which the packet belongs.  In doing so, NRP-specific processing can
   be performed on each node along the forwarding path in the NRP.

   This document specifies a new IPv6 Hop-by-Hop option to carry Network
   Resource related information (e.g., identifier) in data packets.  The
   NR Option can be used to carry NRP Selector ID and related
   information, while it is designed to make the NR option generalized
   for other network resource semantics and functions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-6man-enhanced-vpn-vtn-id-13"/>
      </reference>
      <reference anchor="I-D.ietf-spring-resource-aware-segments">
        <front>
          <title>Introducing Resource Awareness to SR Segments</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Takuya Miyasaka" initials="T." surname="Miyasaka">
            <organization>KDDI Corporation</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Fengwei Qin" initials="F." surname="Qin">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Zhenqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>
          <date day="20" month="November" year="2025"/>
          <abstract>
            <t>   This document describes a mechanism to allocate network resources to
   one or a set of Segment Routing Identifiers (SIDs).  Such SIDs are
   referred to as resource-aware SIDs.  The resource-aware SIDs retain
   their original forwarding semantics, with the additional semantics to
   identify the set of network resources available for the packet
   processing and forwarding action.  The proposed mechanism is
   applicable to both segment routing with MPLS data plane (SR-MPLS) and
   segment routing with IPv6 data plane (SRv6).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-spring-resource-aware-segments-16"/>
      </reference>
      <reference anchor="I-D.ietf-spring-sr-for-enhanced-vpn">
        <front>
          <title>Segment Routing based Network Resource Partition (NRP) for Enhanced VPN</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Takuya Miyasaka" initials="T." surname="Miyasaka">
            <organization>KDDI Corporation</organization>
          </author>
          <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Fengwei Qin" initials="F." surname="Qin">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Zhenqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>
          <date day="15" month="December" year="2025"/>
          <abstract>
            <t>   Enhanced VPNs aim to deliver VPN services with enhanced
   characteristics, such as guaranteed resources, latency, jitter, etc.,
   so as to support customers requirements on connectivity services with
   these enhanced characteristics.  Enhanced VPN requires integration
   between the overlay VPN connectivity and the characteristics provided
   by the underlay network.  A Network Resource Partition (NRP) is a
   subset of the network resources and associated policies on each of a
   connected set of links in the underlay network.  An NRP could be used
   as the underlay to support one or a group of enhanced VPN services.

   Segment Routing (SR) leverages the source routing paradigm.  A node
   steers a packet through an ordered list of instructions, called
   "segments".  A segment is referred to by its Segment Identifier
   (SID).  SIDs can represent topological or service based instructions.
   SIDs can further be associated with a set of network resources used
   for executing the instruction.  Such SIDs are called resource-aware
   SIDs.  A group of resource-aware SIDs may be used to build SR based
   NRPs, which provide customized network topology and resource
   attributes required by one or a group of enhanced VPN services.

   This document describes an approach to build SR based NRPs using
   resource-aware SIDs.  The SR based NRP can be used to deliver
   enhanced VPN services in SR networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-for-enhanced-vpn-10"/>
      </reference>
      <reference anchor="I-D.liu-spring-nrp-id-in-srv6-segment">
        <front>
          <title>NRP ID in SRv6 segment</title>
          <author fullname="Yisong Liu" initials="Y." surname="Liu">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Hao Li" initials="H." surname="Li">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <date day="6" month="June" year="2025"/>
          <abstract>
            <t>   This document proposes a method to carry the NRP-ID with the packet
   in the SRv6 segment.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-spring-nrp-id-in-srv6-segment-06"/>
      </reference>
      <reference anchor="I-D.li-mpls-mna-nrp-selector">
        <front>
          <title>MPLS Network Actions for Network Resource Partition Selector</title>
          <author fullname="Tony Li" initials="T." surname="Li">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
         </author>
          <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Tarek Saad" initials="T." surname="Saad">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Israel Meilik" initials="I." surname="Meilik">
            <organization>Broadcom</organization>
          </author>
          <date day="21" month="January" year="2025"/>
          <abstract>
            <t>   An IETF Network Slice service provides connectivity coupled with a
   set of network resource commitments and is expressed in terms of one
   or more connectivity constructs.  A Network Resource Partition (NRP)
   is a collection of resources identified in the underlay network to
   support IETF Network Slice services.  A Slice-Flow Aggregate refers
   to the set of traffic streams from one or more connectivity
   constructs belonging to one or more IETF Network Slices that are
   mapped to a specific NRP and provided the same forwarding treatment.
   The packets associated with a Slice-Flow Aggregate may carry a
   marking in the packet's network layer header to identify this
   association and this marking is referred to as NRP Selector.  The NRP
   Selector is used to map the packet to the associated NRP and provide
   the corresponding forwarding treatment to the packet.

   MPLS Network Actions (MNA) technologies are used to indicate actions
   for Label Switched Paths (LSPs) and/or MPLS packets and to transfer
   data needed for these actions.  This document discusses options for
   using MPLS Network Actions (MNAs) to carry the NRP Selector in MPLS
   packets.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-li-mpls-mna-nrp-selector-02"/>
      </reference>
      <reference anchor="I-D.gong-spring-srv6-nrp-flavor">
        <front>
          <title>SRv6 Resource Programming with NRP flavor</title>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <date day="21" month="December" year="2025"/>
          <abstract>
            <t>   This document introduces a new flavor type for SRv6 called "Flavor
   NRP". It associates the SRv6 End.X SID with a set of network
   resource partitions (referred to as NRP resources). By using the
   End.X SID with the NRP flavor type, SRv6 policies can provide
   programmability for network resources.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-gong-spring-srv6-nrp-flavor-03"/>
      </reference>
      <reference anchor="RFC8986">
        <front>
          <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
          <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
          <author fullname="J. Leddy" initials="J." surname="Leddy"/>
          <author fullname="D. Voyer" initials="D." surname="Voyer"/>
          <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
          <author fullname="Z. Li" initials="Z." surname="Li"/>
          <date month="February" year="2021"/>
          <abstract>
            <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
            <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
            <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8986"/>
        <seriesInfo name="DOI" value="10.17487/RFC8986"/>
      </reference>
      <reference anchor="I-D.liu-mpls-lsp-ping-nrp">
        <front>
          <title>LSP Ping/Traceroute for SR-MPLS NRP SIDs</title>
          <author fullname="Yao Liu" initials="Y." surname="Liu">
            <organization>ZTE</organization>
          </author>
          <author fullname="Shaofu Peng" initials="S." surname="Peng">
            <organization>ZTE</organization>
          </author>
          <date day="12" month="March" year="2023"/>
          <abstract>
            <t>   [RFC8287] defines the extensions to MPLS LSP ping and traceroute for
   Segment Routing IGP-Prefix and IGP-Adjacency SIDs with an MPLS data
   plane.  To correctly identify and validate an SR NRP SID, the
   validating device also requires NRP-ID to be supplied in the FEC
   Stack sub-TLV.  This document introduces new Target FEC Stack sub-
   TLVs to perform MPLS LSP ping and traceroute for NRP SIDs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-mpls-lsp-ping-nrp-01"/>
      </reference>
      <reference anchor="RFC9544">
        <front>
          <title>Precision Availability Metrics (PAMs) for Services Governed by Service Level Objectives (SLOs)</title>
          <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
          <author fullname="J. Halpern" initials="J." surname="Halpern"/>
          <author fullname="X. Min" initials="X." surname="Min"/>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="J. François" initials="J." surname="François"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document defines a set of metrics for networking services with
performance requirements expressed as Service Level Objectives
(SLOs). These metrics, referred to as "Precision Availability Metrics
(PAMs)", are useful for defining and monitoring SLOs. For example,
PAMs can be used by providers and/or customers of an RFC 9543 Network
Slice Service to assess whether the service is provided in compliance
with its defined SLOs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9544"/>
        <seriesInfo name="DOI" value="10.17487/RFC9544"/>
      </reference>
      <reference anchor="I-D.clemm-opsawg-pam-ipfix">
        <front>
          <title>Export of Flow Precision Availability Metrics Using IPFIX</title>
          <author fullname="Alexander Clemm" initials="A." surname="Clemm">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
            <organization>Ericsson</organization>
          </author>
          <date day="7" month="July" year="2023"/>
          <abstract>
            <t>   This document defines a set of IP Flow Information Export (IPFIX)
   Information Elements to export precision availability data associated
   with Flows, specifically Flows that are associated with stringent
   Service Level Objectives (SLOs) such as latency or packet delay
   variation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-clemm-opsawg-pam-ipfix-00"/>
      </reference>
      <reference anchor="I-D.liu-opsawg-ipfix-network-slice">
        <front>
          <title>Export of Network Resource Partition (NRP) Information in IP Flow Information Export (IPFIX)</title>
          <author fullname="Yao Liu" initials="Y." surname="Liu">
            <organization>ZTE</organization>
          </author>
          <date day="28" month="June" year="2023"/>
          <abstract>
            <t>   This document introduces new IP Flow Information Export (IPFIX)
   Information Elements to identify the Network Resource Partition (NRP)
   that the network slice traffic is related with.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-liu-opsawg-ipfix-network-slice-00"/>
      </reference>
      <reference anchor="I-D.contreras-pce-pam">
        <front>
          <title>Path Computation Based on Precision Availability Metrics</title>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Fernando Agraz" initials="F." surname="Agraz">
            <organization>Universitat Politecnica de Catalunya</organization>
          </author>
          <author fullname="Salvatore Spadaro" initials="S." surname="Spadaro">
            <organization>Universitat Politecnica de Catalunya</organization>
          </author>
          <author fullname="Quan Xiong" initials="Q." surname="Xiong">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   The Path Computation Element (PCE) is able of determining paths
   according to constraints expressed in the form of metrics.  The value
   of the metric can be signaled as a bound or maximum, meaning that
   path metric must be less than or equal such value.  While this can be
   sufficient for certain services, some others can require the
   utilization of Precision Availability Metrics (PAM).  This document
   defines a new object, namely the PRECISION METRIC object, to be used
   for path calculation or selection for networking services with
   performance requirements expressed as Service Level Objectives (SLO)
   using PAM.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-contreras-pce-pam-06"/>
      </reference>
      <reference anchor="I-D.ietf-teas-nrp-scalability">
        <front>
          <title>Scalability Considerations for Network Resource Partition</title>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zhenbin Li" initials="Z." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Liyan Gong" initials="L." surname="Gong">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Guangming Yang" initials="G." surname="Yang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
            <organization>Verizon Inc.</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   A network slice offers connectivity services to a network slice
   customer with specific Service Level Objectives (SLOs) and Service
   Level Expectations (SLEs) over a common underlay network.

   RFC 9543 describes a framework for network slices built using
   networks that use IETF technologies.  As part of that framework, the
   Network Resource Partition (NRP) is introduced as a set of network
   resources that are allocated from the underlay network to carry a
   specific set of network slice service traffic and meet specific SLOs
   and SLEs.

   As the demand for network slices increases, scalability becomes an
   important factor.  Although the scalability of network slices can be
   improved by mapping a group of network slices to a single NRP, that
   design may not be suitable or possible for all deployments, thus
   there are concerns about the scalability of NRPs themselves.

   This document discusses some considerations for NRP scalability in
   the control and data planes.  It also investigates a set of
   optimization mechanisms.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-nrp-scalability-08"/>
      </reference>
      <reference anchor="I-D.ma-teas-ietf-network-slice-deployment">
        <front>
          <title>IETF Network Slice Deployment Status and Considerations</title>
          <author fullname="Yusong Ma" initials="Y." surname="Ma">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Rui Luo" initials="R." surname="Luo">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Alex Chan" initials="A." surname="Chan">
            <organization>China Mobile Hong Kong</organization>
          </author>
          <author fullname="Ben Suen" initials="B." surname="Suen">
            <organization>China Mobile Hong Kong</organization>
          </author>
          <author fullname="Jie Dong" initials="J." surname="Dong">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Yang Liu" initials="Y." surname="Liu">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Houcine Allahoum" initials="H." surname="Allahoum">
            <organization>Algeria Telecom</organization>
          </author>
          <date day="4" month="July" year="2025"/>
          <abstract>
            <t>   Network Slicing is considered as an important approach to provide
   different services and customers with the required network
   connectivity, network resources and performance characteristics over
   a shared network.  Operators have started the deployment of network
   slices in their networks for different purposes.  This document
   introduces several deployment cases of IETF network slices in
   operator networks.  Some considerations collected from these IETF
   network slice deployments are also provided.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ma-teas-ietf-network-slice-deployment-04"/>
      </reference>
    </references>
    <?line 399?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Kaliraj Vairavakkalai for the comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
