<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.19 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-network-slice-topology-yang-03" category="std">

  <front>
    <title abbrev="Network Slice Topology Data Model">IETF Network Slice Topology YANG Data Model</title>

    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="L.M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="S." surname="Belotti" fullname="Sergio Belotti">
      <organization>Nokia</organization>
      <address>
        <email>Sergio.belotti@nokia.com</email>
      </address>
    </author>
    <author initials="A." surname="Guo" fullname="Aihua Guo">
      <organization>Futurewei</organization>
      <address>
        <email>aihuaguo.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>

    <date year="2026" month="January" day="24"/>

    
    <workgroup>TEAS Working Group</workgroup>
    

    <abstract>


<t>An RFC 9543 network slice customer may utilize intent-based topologies to
   express resource reservation intentions within the provider's network.
   These customer-defined intent topologies allow customers to request
   shared resources for future connections that can be flexibly allocated
   and customized. Additionally, they provide an extensive level of control
   over underlay service paths within the network slice.</t>

<t>This document describes a YANG data model for expressing customer intent
   topologies which can be used to enhance the RFC 9543 Network Slice Services
   in specific use cases, such as Network wholesale scenarios, where both topology
   and connectivity intents need to be expressed.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Network service providers utilize topologies to convey controlled information
   about their networks, such as bandwidth availability and connectivity, 
   with customers, to facilitates customer service requests. Customers can also
   define intent-based topologies to streamline their internal operations. When
   requesting provider support for such custom topologies, they are considered
   as customer intent topologies.</t>

<t>In the context of network slicing, customer intent topologies enables customers
   to express resource reservation preferences. These topologies allow flexible
   configuration and activation of network slices on demand. By providing full
   control over resource allocation timing and methods, customer intent topologies
   ensure that resources are consistently available. Moreover, the resources
   reserved via customer intent topologies can be shared across network slices created
   at different times or between different connectivity constructs within the same slice.
   Compared to network slices with dedicated full-mesh connectivity constructs between
   endpoints, network slices utilizing customer intent topologies can reduce overall
   resource requirements, offering significant economic benefits to the customer.</t>

<t>Consider a hub-and-spoke network slice scenario where multiple customer spoke
   sites dynamically connect to a central hub site, sharing available bandwidth.
   By designing a customer intent topology with two virtual nodes - one representing
   all the spoke sites and the other representing the hub site - connected via
   a shared link, we proactively reserve resources for the shared connection.
   This ensures that bandwidth is readily available whenever the customer requires
   it. In contrast, achieving equivalent bandwidth assurance through individual
   dedicated connectivity constructs would necessitate creating separate links between each
   spoke and the hub, which would lead to substantial bandwidth inefficiency.</t>

<t>Customer intent topology complements connectivity-based network slicing by providing
   customers a mechanism to specify additional underlay service paths to gain
   extensive control over specific or all connectivity constructs within the network slice,
   as outlined in <xref target="RFC9543"/>.</t>

<t>A customer intent topology is defined within the customer's context. It can include pure customer information or may also refer to network
   resources identifiable within the provider's context. There is a minimum
   level of a-prior shared knowledge between the customer and the provider,
   and this is the same information needed to supported connectivity-based
   network slice services as described in <xref target="RFC9543"/>.
   The provider's responsibility lies in understanding the customer intent topology request and translating that into suitable realization within their domain.</t>

<t>This document introduces a YANG data model, based on <xref target="RFC7950"/>, for
   configuring customer intent topologies. The YANG model extends the existing
   data model from <xref target="RFC8345"/>, allowing customers to express desired
   service-level objectives (SLOs) and service-level expectations (SLEs)
   across different elements within the customer intent topology.</t>

<t>The defined data model serves as an interface between customers and providers,
   enabling configurations and state retrievals for network slicing as a service.
   Customers can use this model to request or negotiate the creation of network
   slice instances. Additionally, they can incrementally adjust requirements for
   individual topology elements within the slice - for instance, adding or removing
   nodes or links, updating link bandwidth - and retrieve operational states.
   Leveraging other IETF mechanisms and data models, telemetry information can
   also be convey to the customer.</t>

<t>The YANG model encompasses constructs that are independent of specific technologies,
   accommodating network slicing across diverse layers (including IP/MPLS, MPLS-TP,
   OTN, and WDM optical). As a result, this model serves as a foundational framework
   upon which technology-specific network slicing models - such as 
   <xref target="I-D.ietf-ccamp-yang-otn-slicing"/> - can be developed.</t>

<t>Section 3 of <xref target="I-D.ietf-teas-ns-controller-models"/> outlines that the use
   of customer intent topologies and resource reservation control is optional within network
   slicing. These features complement the data model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) <xref target="RFC8342"/>.</t>

<section anchor="use-case-applicability"><name>Use Case Applicability</name>

<t>In Traffic Engineering (TE)-enabled networks like Layer-0/1 transport (OTN, MW, DWDM), customer intent topology is useful for routing RFC 9543 network slices across varied paths with TE constraints. Thus, most of the use cases for which this model target are transport oriented. Nonetheless, it is also relevant to non-transport networks like IP/MPLS, where customers may use intent topologies to influence the realization of network slices. These intents help build the logical view of the desired RFC 9543 Network Slice service (and its constituent parts), aiding providers in fulfilling slice requests and defining the service instantiation.</t>

<section anchor="use-case-1-multi-tenancy-in-network-wholesaling"><name>Use Case 1 : Multi-tenancy in Network Wholesaling</name>

<t>A typical use case in which the customer intent topology is essential is the wholesale multi-tenant case. Here, customer C may acquire a network slice from provider P and resell sub-slices to other customers/tenants. The creation of these sub-slices within C's slice necessitates specifying a topology intent - reflecting the topology of C's purchased slice - as a key input parameter.</t>

</section>
<section anchor="use-case-2-scoped-connectivity-constructs-in-network-slicing"><name>Use Case 2 : Scoped Connectivity Constructs in Network Slicing</name>

<t>The current expression of slice requests leveraging on <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> allows the customer to request distinct connectivity constructs as part of the same Network Resource Partition (NRP). The topology provided by the customer could imply different NRPs, instead.</t>

<t>As another example, a slice request leveraging <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> without topology differentiation could result in all connectivity constructs being realized in the same manner on the same NRP, e.g. implementing all of them within the same VRF in a L3VPN. Using topological views can help providers infer differentiated realizations of some of the connectivity constructs, for instance, by implementing them on different VRFs. This approach can offer operational advantages, like limiting the necessary VRF reconfiguration to only those affected connectivity constructs when adding new nodes or SDPs.</t>

<t>Finally, by using customer intent topology it can be easier for the slice provider to infer different technologies for sets of connectivity constructs of every topology segment (e.g., IP/MPLS, optical, microwave, etc).</t>

</section>
</section>
<section anchor="terminologies-and-notations"><name>Terminologies and Notations</name>

<t>The following terminologies for describing network slices are defined in 
   <xref target="RFC9543"/> and are not redefined herein.</t>

<t><list style="symbols">
  <t>Network Slice (NS)</t>
  <t>Network Slice Customer</t>
  <t>Network Slice Service Provider</t>
  <t>Network Slice Controller (NSC)</t>
  <t>Network Resource Partition (NRP)</t>
</list></t>

<t>The following terms are defined and used in this document.</t>

<t><list style="symbols">
  <t>Customer Intent Topology:
  A topology defined by the customer and provided as input to the
  network slice service provider (specifically, the Network Slice
  Controller or NSC). It represents the customer's desired network
  topology.</t>
  <t>Abstract Topology:
  A topology exposed to the customer by the network slice service
  provider prior to the creation of network slices. The provider
  may optionally uses an abstract topology to expose useful information,
  such as available resources to the customer, which can facilitate
  the build-up of customer intent topologies by the customer.</t>
  <t>NRP Topology:
  A topology internal to the NSC to facilitate the mapping of
  network slices to underlying network resources.</t>
</list></t>

</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t>Tree diagrams used in this document follow the notation defined in
   <xref target="RFC8340"/>.</t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects
   are prefixed using the standard prefix associated with the
   corresponding YANG imported modules, as shown in <xref target="tab-prefixes"/>.</t>

<texttable title="Prefixes and Corresponding YANG Modules" anchor="tab-prefixes">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG Module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>nt</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>nw</c>
      <c>ietf-network-topology</c>
      <c><xref target="RFC8345"/></c>
      <c>tet</c>
      <c>ietf-te-topology</c>
      <c><xref target="RFC8795"/></c>
      <c>ns-path</c>
      <c>ietf-ns-underlay-path</c>
      <c>RFC XXXX</c>
      <c>ns-topo</c>
      <c>ietf-ns-topo</c>
      <c>RFC XXXX</c>
      <c>ietf-nss</c>
      <c>ietf-network-slice-service</c>
      <c>RFC YYYY</c>
</texttable>

<t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please replace YYYY with the RFC number assigned to <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
Please remove this note.</t>

</section>
</section>
<section anchor="modeling-considerations"><name>Modeling Considerations</name>

<t>A network slice topology is a customer intent topology 
   modeled as network topology defined in <xref target="RFC8345"/>, with augmentations. 
   A new network type "network-slice" is defined in this document.<br />
   When a network topology data instance contains the network-slice 
   network type, it represents an instance of a network slice 
   topology.</t>

<t>This data model augments the network topology model by incorporating 
   intent-based Service-Level Objectives (SLOs) and Service-Level
   Expectations (SLEs). These apply to various components within the
   customer intent topology, including nodes, links, and termination points (TPs).</t>

<section anchor="relationship-with-traffic-engineering-te-based-topology"><name>Relationship with Traffic Engineering (TE)-based Topology</name>

<t>The model defined in this document can be combined through multi-inheritance
   with other topology data models, such as Traffic Engineering (TE) topologies
   described in <xref target="RFC8795"/> or Optical Transport Network (OTN) topologies
   described in <xref target="I-D.ietf-ccamp-otn-topo-yang"/>. This flexibility allows
   the creation of technology-specific customer intent topologies tailored to
   specific network requirements.</t>

</section>
<section anchor="relationship-with-actn-virtual-network-vn"><name>Relationship with ACTN Virtual Network (VN)</name>

<t>The ACTN VN model, defined in <xref target="RFC9731"/>, provides a self-consistent set of methods for expressing connectivity intents (Type 1 VN),
   optional path constraints and topology intents (Type 2 VN), using TE metrics and TE objective functions defined in
   <xref target="RFC8795"/>. Type 2 VN path constraints rely on Type 1 VN for expressing connectivity intents. See <xref target="vn-intro"/> for more details.</t>

<t>On the other hand, RFC9543 network slice services provide connectivity intents equivalent to Type 1 VN, using SLO and SLE attributes in a technology-agnostic manner not tied to TE technologies. This
   distinction is detailed in <xref section="D" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>

<t>The proposed models in this draft aim to deliver a solution equivalent to Type 2 VN to provide optional path constraints and topology intent within the
   context of RFC 9543 network slicing. These models complement the existing solution outlined in
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, while ensuring consistent use of SLO and SLE attributes in a technology-agnostic manner to express customer intent.</t>

<t>In a nutshell:</t>

<t><list style="symbols">
  <t>the data models, defined in this draft, are intended to be used when there is a need to extend, with more control over network resources allocation by the customer, the connectivity service intent, expressed using the Network Slice Service data model, defined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>;</t>
  <t>the VN type 2 data models, defined in <xref target="RFC9731"/>, are intended to be used when there is a need to extend, with more control over network resources allocation by the customer, the connectivity service intent expressed using the VN type 1 data models, defined in <xref target="RFC9731"/>.</t>
</list></t>

<t><xref section="D" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> provides guidance to decide when to use the Network Slice Service data model, defined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, or the VN type 1 data models, defined in <xref target="RFC9731"/>, to express the connectivity intent.</t>

</section>
<section anchor="relationship-with-service-attachment-point-sap-topology"><name>Relationship with Service Attachment Point (SAP) Topology</name>

<t><xref target="RFC9408"/> introduces a YANG data model that represents an abstract
   view of the provider network topology. This model includes a list of
   Service Attachment Points (SAPs), where customer services can be
   connected. The SAP topology is made visible to customers by the provider
   before configuring network slice services. In contrast, the customer
   intent topology described in this document captures a customer's
   intentions, while the provider acts as the recipient of these intents.
   As a result, these two models serve distinct purposes.</t>

<t>In certain scenarios, customers can leverage the SAP topology to
   construct customer intent topologies to aid in the realization
   of their intended network configurations. For instance, within a node
   of a customer intent topology, the Link Termination Point (LTP)
   identifiers may explicitly reference their supporting Termination
   Points (TPs), which correspond to the SAPs exposed in the provider's
   SAP model. However, the specifics of this mechanism fall beyond the
   scope of this document.</t>

</section>
<section anchor="data-model-relationship"><name>Data Model Relationship</name>

<t>The data model presented in this document builds upon the generic network
   topology model defined in <xref target="RFC8345"/>. Other data models, including OTN
   Slicing (as defined in <xref target="I-D.ietf-ccamp-yang-otn-slicing"/>), can leverage
   this extended model.</t>

<t>The relationship of the related data models is illustrated in <xref target="fig-model-relationship"/>. 
   Within this diagram, the box outlined with dotted lines specifically represents
   the data model defined in this document.</t>

<figure title="Model Relationship" anchor="fig-model-relationship"><artwork><![CDATA[
     +----------+                 +----------+
     | Network  |                 | Network  |
     | Slice    |                 | Topology +
     | NBI YANG +------+          | Model    |
     | Model    |      |          | RFC 8345 |
     +----+-----+      |          +-----+----+
          |            |                |
          |augments    |augments        |augments
          |            |                |
     +----^-----+      |          ......^.....
     | OTN      |      +----------< Network  :
     | Slicing  | augments        : Slice    :
     | Model    >-----------------: Topology :
     |          |                 : Model    :
     +----------+                 :..........:
]]></artwork></figure>

</section>
</section>
<section anchor="model-applicability"><name>Model Applicability</name>

<t>Network slicing can be achieved through various technologies. The data
   model defined in this document serves as a means for configuring
   resource reservation-based network slices. In this approach, resources for
   network slices are reserved and represented using a customer intent topology.
   This topology can then be mapped to a network resource partition (NRP)
   and realized based on the scenarios outlined in <xref target="RFC9543"/>.</t>

<t>Network slices can be abstracted in various ways, depending on the specific
   requirements of the network slice customer. For instance, a customer might
   request a network slice with direct connectivity between pairs of Service
   Demarcation Points (SDPs). Within this network slice, each connectivity construct
   could be further supported by an end-to-end tunnel that follows a specific path
   defined in a customer intent topology, which the customer provides. The 
   resources associated with each link are immediately commissioned during
   the network slice configuration process.</t>

<t>Alternatively, a customer can request resources to be reserved for potential
   network slices through a customer intent topology. These reserved resources
   are not immediately commissioned at the time of the request. Instead, they
   serve as a pool of allocated resources that the customer can utilize to build
   network slices in the future. By adopting this approach, customers gain the
   flexibility to share resources across multiple endpoints and activate them
   on demand.</t>

<t>In the example shown in <xref target="fig-ns-topo-example"/>, two topology intents named as
   Network Slice Blue and Network Slice Red, are created
   by separate customers and delivered to the network slice service provider.
   The provider maps the two intents to corresponding network resource partitions (NRPs)
   internally. In realizing the network resource partitions, node virtualization
   is used to separate and allocate resources in physical devices.  Two virtual
   routers VR1 and VR2 are created over physical router R1, and two virtual
   routers VR3 and VR4 are created over physical router R2, respectively.  Each of the
   virtual routers,as a partition of the physical router, takes a portion 
   of the resources such as ports and memory in the physical router.<br />
   Depending on the requirements and the implementations, they may share 
   certain resources such as processors, ASICs, and switch fabric.</t>

<t>A network slice customer has the capability to configure customer intent topologies
   without needing any prior knowledge of the provider's network or resource
   availability. However, this approach could potentially create challenges for
   the provider in understanding and realizing the intended topology.</t>

<t>Alternatively, the provider can choose to describe the available resources and
   capabilities in the form of an abstract topology, which is then exposed to the
   customer before network slice requests. By doing so, the provider empowers the
   customer to build their customized intent topologies based on this pre-exposed
   information. This approach streamlines the process, minimizing unnecessary
   negotiations between the customer and the provider. The process and the data models
   for the provider to expose abstract topologies are outside the scope of this document.</t>

<t>The provider communicates the operational state of the customer intent topology, reflecting the allocated resources that result from negotiations between the customer and the provider. Subsequently, customers can process the requested customer intent topology and seamlessly integrate it into their own network topology. Importantly, this relationship between the customer and provider can be recursive. For instance, a customer who requests network slices can also serve as a provider, offering network slice services to its own customers further up the hierarchy.</t>

<t>As an example, Appendix B. shows the JSON encoded data instances of
   the customer topology intent for Network Slice Blue.</t>

<figure title="Network Slicing Topologies for Virtualization" anchor="fig-ns-topo-example"><artwork><![CDATA[
       Customer Topology (Merged)          Customer Topology (Merged)
       Network Slice Blue                  Network Slice Red
                            +---+         +---+      +---+
                       -----|R3 |---   ---|R1 |------|R2 |
                      /     +---+         +---+      +---+                  
      +---+      +---+        ^             ^          ^  \     +---+
   ---|R1 |------|R2 |        |             |          |   -----|R4 |---
      +---+      +---+        |             |          |        +---+
        ^          ^          v             v          v          ^
        |          |        +---+         +---+      +---+        |
        |          |   -----|VR5|---   ---|VR2|------|VR4|        |
        v          v  /     +---+         +---+      +---+        v         
      +---+      +---+                                    \     +---+
   ---|VR1|------|VR3|                                     -----|VR6|---
      +---+      +---+                                          +---+
       Customer Topology (Intended)        Customer Topology (Intended)
       Network Slice Blue                  Network Slice Red

                                 Customers
   ---------------------------------------------------------------------
                                 Provider

        Customized Topology (Network Resouce Partition)
        Provider Network with Virtual Devices

        Network Slice Blue: VR1, VR3, VR5         +---+             
                                        ----------|VR5|------
                                       /          +---+
                    +---+         +---+
              ------|VR1|---------|VR3|                              
                    +---+         +---+
              ------|VR2|---------|VR4|
                    +---+         +---+
                                       \          +---+
                                        ----------|VR6|------
        Network Slice Red: VR2, VR4, VR6          +---+

                                 Virtual Devices 
   ---------------------------------------------------------------------
                                 Physical Devices

        Native Topology
        Provider Network with Physical Devices
                                                  +---+
                                        ----------|R3 |------
                                       /          +---+
                    +---+         +---+
              ======|R1 |=========|R2 |                             
                    +---+         +---+
                                       \          +---+
                                        ----------|R4 |------
                                                  +---+
]]></artwork></figure>

</section>
<section anchor="yang-model-overview"><name>YANG Model Overview</name>

<t>The YANG data model in this draft consists of two modules for flexible use
   and augmentation:
   - The first YANG module defines a customer intent topology, with SLO and SLE
   associated with the topological constructs.
   - The second YANG module extends the YANG model defined in 
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> by adding underlay paths to
   the connectivity constructs.</t>

<t>Within the YANG model, the following constructs and attributes are defined:
   - Network Topology: This represents a set of shared and reserved resources,
   organized as a virtual topology connecting all endpoints. Customers can utilize
   this network topology to define detailed connectivity paths traversing the
   topology. Additionally, it enables resource sharing between different endpoints.</t>

<t><list style="symbols">
  <t>Service-Level Objectives (SLOs): These objectives are associated with
   various objects within the topology, including nodes, links, and termination
   points. SLOs provide guidelines for achieving specific performance or quality
   targets.</t>
</list></t>

</section>
<section anchor="model-tree-structure"><name>Model Tree Structure</name>

<section anchor="network-slice-topology-model-tree-structure"><name>Network Slice Topology Model Tree Structure</name>

<figure title="Tree diagram for network slice topology" anchor="fig-ietf-ns-topo-tree"><artwork><![CDATA[
module: ietf-ns-topo

  augment /nw:networks/nw:network/nw:network-types:
    +--rw network-slice!
  augment /nw:networks/nw:network:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nw:node/nt:termination-point:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
  augment /nw:networks/nw:network/nt:link:
    +--rw (slo-sle-policy)?
       +--:(standard)
       |  +--rw slo-sle-template?         slice-template-ref
       +--:(custom)
          +--rw service-slo-sle-policy
             +--rw description?   string
             +--rw slo-policy
             |  +--rw metric-bound* [metric-type]
             |  |  +--rw metric-type          identityref
             |  |  +--rw metric-unit          string
             |  |  +--rw value-description?   string
             |  |  +--rw percentile-value?    percentile
             |  |  +--rw bound?               uint64
             |  +--rw availability?   identityref
             |  +--rw mtu?            uint32
             +--rw sle-policy
                +--rw security*              identityref
                +--rw isolation*             identityref
                +--rw max-occupancy-level?   uint8
                +--rw path-constraints
                   +--rw service-functions
                   +--rw diversity
                      +--rw diversity-type?
                              te-types:te-path-disjointness
]]></artwork></figure>

</section>
<section anchor="network-slice-underlay-path-model-tree-structure"><name>Network Slice Underlay Path Model Tree Structure</name>

<figure title="Tree diagram for underlay path" anchor="fig-ietf-ns-underlay-path-tree"><artwork><![CDATA[
module: ietf-ns-underlay-path

  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:slo-sle-policy/ietf-nss:custom
            /ietf-nss:service-slo-sle-policy/ietf-nss:sle-policy
            /ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
  augment /ietf-nss:network-slice-services/ietf-nss:slice-service
            /ietf-nss:connection-groups/ietf-nss:connection-group
            /ietf-nss:connectivity-construct/ietf-nss:type
            /ietf-nss:a2a/ietf-nss:a2a-sdp/ietf-nss:slo-sle-policy
            /ietf-nss:custom/ietf-nss:service-slo-sle-policy
            /ietf-nss:sle-policy/ietf-nss:path-constraints:
    +--rw underlay-path
       +--rw network-ref?    -> /nw:networks/network/network-id
       +--rw path-element* [index]
          +--rw index            uint32
          +--rw is-strict-hop?   boolean
          +--rw (type)?
             +--:(node-hop)
             |  +--rw node-id?   nw:node-id
             +--:(link-hop)
             |  +--rw link-id?   nt:link-id
             +--:(tp-hop)
                +--rw tp-id?     nt:tp-id
]]></artwork></figure>

</section>
</section>
<section anchor="yang-modules"><name>YANG Modules</name>

<section anchor="yang-module-for-network-slice-topology"><name>YANG Module for Network Slice Topology</name>

<figure title="YANG model for network slice topology" anchor="fig-ietf-ns-topo-yang"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-topo@2025-07-03.yang"
   module ietf-ns-topo {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-topo";
     prefix "ns-topo";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-25:
          A YANG Data Model for the RFC 9543 Network Slice Service";
     }
 
     organization
       "IETF TEAS Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/teas/>
        WG List: <mailto:teas@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        customer intent topologies for RFC9543 network slices.

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2025-07-03 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Augmented data nodes
      */
     /* network type augments */
     augment "/nw:networks/nw:network/nw:network-types" {
       description
         "Defines the Network Slice topology type.";
       container network-slice {
         presence "Indicates a Network Slice topology";
         description
           "Its presence identifies the Network Slice type.";
       }
     }
     
     /* network topology augments */
     augment "/nw:networks/nw:network" {
       when "./nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for topology.";

       uses ietf-nss:service-slo-sle-policy;
     }

     /* network node augments */
     augment "/nw:networks/nw:network/nw:node" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for nodes.";

       uses ietf-nss:service-slo-sle-policy;
     }

     /* network node's termination point augments */
     augment "/nw:networks/nw:network/nw:node" +
             "/nt:termination-point" {
       when "../../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for termination points.";
     
     uses ietf-nss:service-slo-sle-policy;
     }
   
     /* network link augments */
     augment "/nw:networks/nw:network/nt:link" {
       when "../nw:network-types/ns-topo:network-slice" {
         description
           "Augmentation parameters apply only for networks
            of type Network Slice topology.";
       }
       description
         "SLO and SLE for links.";

       uses ietf-nss:service-slo-sle-policy;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="yang-module-for-network-slice-underlay-path"><name>YANG Module for Network Slice Underlay Path</name>

<figure title="YANG model for underlay path" anchor="fig-ietf-ns-underlay-path"><artwork><![CDATA[
   <CODE BEGINS> file "ietf-ns-underlay-path@2025-07-03.yang"
   module ietf-ns-underlay-path {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path";
     prefix "ns-path";

     import ietf-network {
       prefix "nw";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }
     import ietf-network-topology {
       prefix "nt";
       reference
        "RFC 8345: A YANG Data Model for Network Topologies";
     }

     import ietf-network-slice-service {
       prefix "ietf-nss";
       reference
         "draft-ietf-teas-ietf-network-slice-nbi-yang-25:
          A YANG Data Model for the RFC 9543 Network Slice Service";
     }
 
     organization
       "IETF TEAS Working Group";
     contact
       "WG Web: <http://tools.ietf.org/wg/teas/>
        WG List: <mailto:teas@ietf.org>

        Editor: Xufeng Liu
                <mailto:xufeng.liu.ietf@gmail.com>

        Editor: Italo Busi
                <mailto:italo.busi@huawei.com>

        Editor: Aihua Guo
                <mailto:aihuaguo.ietf@gmail.com>

        Editor: Sergio Belotti
                <mailto:sergio.belotti@nokia.com>

        Editor: Luis M. Contreras
                <mailto:luismiguel.contrerasmurillo@telefonica.com>";

     description
       "This module defines a base YANG data model for configuring
        the underlay path of connectivity intent over a customer
        intent topology for RFC9543 network slices.

        The model fully conforms to the Network Management Datastore
        Architecture (NMDA).

        Copyright (c) 2023 IETF Trust and the persons
        identified as authors of the code.  All rights reserved.

        Redistribution and use in source and binary forms, with
        or without modification, is permitted pursuant to, and
        subject to the license terms contained in, the Revised
        BSD License set forth in Section 4.c of the IETF Trust's
        Legal Provisions Relating to IETF Documents
        (https://trustee.ietf.org/license-info).

        This version of this YANG module is part of RFC XXXX; see
        the RFC itself for full legal notices.";


     revision 2025-07-03 {
       description "Initial revision";
       reference
         "RFC XXXX: IETF Network Slice Topology YANG Data Model";
     }

     /*
      * Groupings
      */   
     grouping underlay-path {
       description
         "Underlay explicit path within a customer intent
          topology.";
 
       container underlay-path {
         description
           "Defines an underlay explicit path within specific
            customer intent topology.";
 
         uses nw:network-ref;

         list path-element {
          key "index";
          description
            "List of path elements.";
          leaf index {
            type uint32;
            description
              "Index of the hop within the underlay path.";
          }
          leaf is-strict-hop {
            type boolean;
            description
              "Indicate whether the hop is strict or loose";
          }
          choice type {
            description
              "Type of the hop.";
            case node-hop {
              leaf node-id {
                type nw:node-id;
                description
                  "Node identifier.";
              }
            }
            case link-hop {
              leaf link-id {
                type nt:link-id;
                description
                  "Link identifier.";
              }
            }
            case tp-hop {
              leaf tp-id {
                type nt:tp-id;
                description
                  "Termination Point (TP) identifier.";
              }
            }
          }
         }
       }
     } 

     /*
      * Augmented data nodes
      */
     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connection group.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for connectivity construct.";

       uses underlay-path;
     }

     augment "/ietf-nss:network-slice-services" +
             "/ietf-nss:slice-service" +
             "/ietf-nss:connection-groups" +
             "/ietf-nss:connection-group" +
             "/ietf-nss:connectivity-construct" +
             "/ietf-nss:type" +
             "/ietf-nss:a2a" +
             "/ietf-nss:a2a-sdp" +
             "/ietf-nss:slo-sle-policy" + 
             "/ietf-nss:custom" + 
             "/ietf-nss:service-slo-sle-policy" + 
             "/ietf-nss:sle-policy" +
             "/ietf-nss:path-constraints" {
       description
         "Underlay path for a2a connectivity constructs.";
 
       uses underlay-path;
     }
   }
   <CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="manageability-considerations"><name>Manageability Considerations</name>

<t>To ensure the security and controllability of physical resource
   isolation, slice-based independent operation and management are
   required to achieve management isolation.
   Each network slice typically requires dedicated accounts,
   permissions, and resources for independent access and O&amp;M. This
   mechanism is to guarantee the information isolation among slice
   tenants and to avoid resource conflicts. The access to slice
   management functions will only be permitted after successful security
   checks.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>.  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) <xref target="RFC6242"/>.  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   <xref target="RFC8446"/>.</t>

<t>The NETCONF access control model <xref target="RFC8341"/> provides the means to
   restrict access for particular NETCONF or RESTCONF users to a
   preconfigured subset of all available NETCONF or RESTCONF protocol
   operations and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., config true, which is the
   default).  These data nodes may be considered sensitive or vulnerable
   in some network environments.  Write operations (e.g., edit-config)
   to these data nodes without proper protection can have a negative
   effect on network operations.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

<t>Some of the readable data nodes in this YANG module may be considered
   sensitive or vulnerable in some network environments.  It is thus
   important to control read access (e.g., via get, get-config, or
   notification) to these data nodes.  Considerations in Section 8 of
   <xref target="RFC8795"/> are also applicable to their subtrees in the module defined
   in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>It is proposed to IANA to assign new URIs from the "IETF XML
   Registry" <xref target="RFC3688"/> as follows:</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path
   Registrant Contact: The IESG
   XML: N/A; the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
   registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   name: ietf-ns-topo
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-topo
   prefix: ns-topo
   reference: RFC XXXX
]]></artwork></figure>

<figure><artwork><![CDATA[
   name: ietf-ns-underlay-path
   namespace: urn:ietf:params:xml:ns:yang:ietf-ns-underlay-path
   prefix: ns-path
   reference: RFC XXXX
]]></artwork></figure>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank Danielle Ceccarelli, Bo Wu,
   Mohamed Boucadair, Vishnu Beeram, Dhruv Dhody, Oscar G. De Dios,
   Adrian Farrel, and many others for their valuable comments and
   suggestions.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7950'/>
  <seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>

<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='N. Bahadur' initials='N.' surname='Bahadur'/>
    <author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8345'/>
  <seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>


<reference anchor='I-D.ietf-ccamp-yang-otn-slicing' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-yang-otn-slicing-10'>
   <front>
      <title>Framework and Data Model for OTN Network Slicing</title>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Yunbin Xu' initials='Y.' surname='Xu'>
         <organization>CAICT</organization>
      </author>
      <author fullname='Yang Zhao' initials='Y.' surname='Zhao'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <date day='5' month='January' year='2026'/>
      <abstract>
	 <t>   The requirement of slicing network resources with desired quality of
   service is emerging at every network technology, including the
   Optical Transport Networks (OTN).  As a part of the transport
   network, OTN can provide hard pipes with guaranteed data isolation
   and deterministic low latency, which are highly demanded in the
   Service Level Agreement (SLA).

   This document describes a framework for OTN network slicing and
   defines YANG data models with OTN technology-specific augments
   deployed at both the north and south bound of the OTN network slice
   controller.  Additional YANG data model augmentations will be defined
   in a future version of this draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-yang-otn-slicing-10'/>
   
</reference>


<reference anchor='I-D.ietf-teas-ietf-network-slice-nbi-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slice-nbi-yang-25'>
   <front>
      <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='9' month='May' year='2025'/>
      <abstract>
	 <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-25'/>
   
</reference>

<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'/>
    <author fullname='P. Shafer' initials='P.' surname='Shafer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <author fullname='R. Wilton' initials='R.' surname='Wilton'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8342'/>
  <seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>

<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='215'/>
  <seriesInfo name='RFC' value='8340'/>
  <seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>

<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
  <front>
    <title>Common YANG Data Types</title>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <date month='July' year='2013'/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6991'/>
  <seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>

<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='H. Shah' initials='H.' surname='Shah'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <date month='August' year='2020'/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8795'/>
  <seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>


<reference anchor='I-D.ietf-ccamp-otn-topo-yang' target='https://datatracker.ietf.org/doc/html/draft-ietf-ccamp-otn-topo-yang-20'>
   <front>
      <title>A YANG Data Model for Optical Transport Network Topology</title>
      <author fullname='Haomian Zheng' initials='H.' surname='Zheng'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Italo Busi' initials='I.' surname='Busi'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <author fullname='Sergio Belotti' initials='S.' surname='Belotti'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Oscar Gonzalez de Dios' initials='O. G.' surname='de Dios'>
         <organization>Telefonica</organization>
      </author>
      <date day='7' month='November' year='2024'/>
      <abstract>
	 <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-ccamp-otn-topo-yang-20'/>
   
</reference>

<reference anchor='RFC9731' target='https://www.rfc-editor.org/info/rfc9731'>
  <front>
    <title>A YANG Data Model for Virtual Network (VN) Operations</title>
    <author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'/>
    <author fullname='D. Dhody' initials='D.' role='editor' surname='Dhody'/>
    <author fullname='D. Ceccarelli' initials='D.' surname='Ceccarelli'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='B. Yoon' initials='B.' surname='Yoon'/>
    <date month='March' year='2025'/>
    <abstract>
      <t>A Virtual Network (VN) is a network provided by a service provider to a customer for the customer to use in any way it wants as though it were a physical network. This document provides a YANG data model generally applicable to any mode of VN operations. This includes VN operations as per the Abstraction and Control of TE Networks (ACTN) framework (RFC 8453).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9731'/>
  <seriesInfo name='DOI' value='10.17487/RFC9731'/>
</reference>

<reference anchor='RFC9408' target='https://www.rfc-editor.org/info/rfc9408'>
  <front>
    <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
    <author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <author fullname='S. Barguil' initials='S.' surname='Barguil'/>
    <author fullname='Q. Wu' initials='Q.' surname='Wu'/>
    <author fullname='V. Lopez' initials='V.' surname='Lopez'/>
    <date month='June' year='2023'/>
    <abstract>
      <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
      <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9408'/>
  <seriesInfo name='DOI' value='10.17487/RFC9408'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>

<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname='M. Wasserman' initials='M.' surname='Wasserman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6242'/>
  <seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>

<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
  <front>
    <title>The IETF XML Registry</title>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <date month='January' year='2004'/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='81'/>
  <seriesInfo name='RFC' value='3688'/>
  <seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>

<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='October' year='2010'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6020'/>
  <seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>

<reference anchor='RFC7951' target='https://www.rfc-editor.org/info/rfc7951'>
  <front>
    <title>JSON Encoding of Data Modeled with YANG</title>
    <author fullname='L. Lhotka' initials='L.' surname='Lhotka'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7951'/>
  <seriesInfo name='DOI' value='10.17487/RFC7951'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC9543' target='https://www.rfc-editor.org/info/rfc9543'>
  <front>
    <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
    <author fullname='A. Farrel' initials='A.' role='editor' surname='Farrel'/>
    <author fullname='J. Drake' initials='J.' role='editor' surname='Drake'/>
    <author fullname='R. Rokui' initials='R.' surname='Rokui'/>
    <author fullname='S. Homma' initials='S.' surname='Homma'/>
    <author fullname='K. Makhijani' initials='K.' surname='Makhijani'/>
    <author fullname='L. Contreras' initials='L.' surname='Contreras'/>
    <author fullname='J. Tantsura' initials='J.' surname='Tantsura'/>
    <date month='March' year='2024'/>
    <abstract>
      <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
      <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
      <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9543'/>
  <seriesInfo name='DOI' value='10.17487/RFC9543'/>
</reference>


<reference anchor='I-D.ietf-teas-ns-controller-models' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-ns-controller-models-06'>
   <front>
      <title>IETF Network Slice Controller and its Associated Data Models</title>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Nvidia</organization>
      </author>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         </author>
      <date day='20' month='October' year='2025'/>
      <abstract>
	 <t>   This document describes an approach for structuring the IETF Network
   Slice Controller as well as how to use different data models being
   defined for IETF Network Slice Service provision (and how they are
   related).  It is not the purpose of this document to standardize or
   constrain the implementation the IETF Network Slice Controller.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ns-controller-models-06'/>
   
</reference>

<reference anchor='RFC8453' target='https://www.rfc-editor.org/info/rfc8453'>
  <front>
    <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
    <author fullname='D. Ceccarelli' initials='D.' role='editor' surname='Ceccarelli'/>
    <author fullname='Y. Lee' initials='Y.' role='editor' surname='Lee'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
      <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
      <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8453'/>
  <seriesInfo name='DOI' value='10.17487/RFC8453'/>
</reference>




    </references>


<section anchor="vn-intro"><name>Relationship with ACTN Virtual Network (VN)</name>

<t><xref target="RFC8453"/> and <xref target="RFC9731"/> introduce the concept of a Virtual
   Network (VN), which can be presented to customers. These VNs are constructed from
   abstractions of the underlying networks, specifically those that are 
   traffic-engineering (TE) capable. While VNs share similarities with RFC 9543 network slicing,
   they operate under the assumption of TE-capable networks.</t>

<t>Two distinct types of VNs are defined:</t>

<t><list style="symbols">
  <t>Type 1 VN: Modeled as a single abstract node with edge-to-edge connectivity 
between customer endpoints.</t>
  <t>Type 2 VN: Modeled as a single abstract node with an underlay topology, allowing
configuration of intended underlay paths for connections within the single abstract
node.</t>
</list></t>

<t>The topologies for VNs, including both the single-node abstract topology and the
   underlay topology, can either be mutually agreed upon between the Customer Network
   Controller (CNC) and the Multi-Domain Service Coordinator (MDSC) prior to VN creation,
   or they can be created as part of VN instantiation by the customer.</t>

<t>In the context of network slicing, <xref target="RFC9543"/> defines
   a network slice service as a collection of connectivity constructs between pairs of
   Service Demarcation Points (SDPs). This concept closely resembles the Type 1 VN,
   which is implemented as a single abstract node.</t>

<t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> further elaborates on network slices
   by incorporating references to a customer intent topology based on <xref target="RFC8345"/>. 
   This approach aligns with the ACTN Type 2 VN, although without specifying the 
   explicit use of such a topology.</t>

<t>Consequently, the data model defined in this document serves as a complementary
   option to the data model outlined in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.
   It empowers customers to define a customized intent topology specifically tailored
   for their network slices.</t>

<t>Reusing the Type 2 VN for defining customer intent topologies alongside the RFC9543 network slice service model would result in duplicated information for connectivity intents (SDPs and connectivity-constructs vs. LTPs and connectivity matrices), and additionally, would bind the network slice solution to TE technologies (as discussed in <xref section="D" sectionFormat="of" target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> for VN Type 1).</t>

</section>
<section anchor="data-tree-for-the-example-in-section-3"><name>Data Tree for the Example in Section 3</name>

<section anchor="native-topology"><name>Native Topology</name>

<t>This section contains an example of an instance data tree in the JSON
   encoding <xref target="RFC7951"/>.  The example instantiates "ietf-network" for the
   topology of Network Slice Blue depicted in <xref target="fig-ns-topo-example"/>.</t>

<figure><artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network:networks": {
    "network": [
      {
        "network-id": "example-customized-blue-topology",
        "network-types": {
          "ietf-ns-topo:network-slice": {
          }
        },
        "node": [
          {
            "node-id": "VR1",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "1-0-1"
              },
              {
                "tp-id": "1-3-1"
              }
            ]
          },
          {
            "node-id": "VR3",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "3-1-1"
              },
              {
                "tp-id": "3-5-1"
              }
            ]
          },
          {
            "node-id": "VR5",
            "ietf-ns-topo:service-slo-sle-policy": {
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            },
            "ietf-network-topology:termination-point": [
              {
                "tp-id": "5-3-1"
              },
              {
                "tp-id": "5-0-1"
              }
            ]
          }
        ],
        "ietf-network-topology:link": [
          {
            "link-id": "VR1,1-0-1,,",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 60
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": ",,VR1,1-0-1",
            "destination": {
              "dest-node": "VR1",
              "dest-tp": "1-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR1,1-3-1,VR3,3-1-1",
            "source": {
              "source-node": "VR1",
              "source-tp": "1-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-1-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-1-1,VR1,1-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-1-1"
            },
            "destination": {
              "dest-node": "R1",
              "dest-tp": "1-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 30
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR3,3-5-1,VR5,5-3-1",
            "source": {
              "source-node": "VR3",
              "source-tp": "3-5-1"
            },
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-3-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-3-1,VR3,3-5-1",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-3-1"
            },
            "destination": {
              "dest-node": "VR3",
              "dest-tp": "3-5-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 35
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          },
          {
            "link-id": "VR5,5-0-1,,",
            "source": {
              "source-node": "VR5",
              "source-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              }
      }
          },
          {
            "link-id": ",,VR5,5-0-1",
            "destination": {
              "dest-node": "VR5",
              "dest-tp": "5-0-1"
            },
            "ietf-ns-topo:service-slo-sle-policy": {
              "slo-policy": {
                "metric-bounds": {
                  "metric-bound": [
                    {
                      "metric-type": "ietf-network-slice-service:se\
rvice-slo-two-way-delay",
                      "metric-unit": "ms",
                      "bound": 25
                    }
                  ]
                }
              }, 
              "sle-policy": {
                "isolation": [
                  {
                    "ietf-network-slice-service:service-traffic-iso\
lation"
                  }
                ]
              } 
            }
          }
        ],
        "ietf-ns-topo:service-slo-sle-policy": {
          "sle-policy": {
            "isolation": [
              {
                "ietf-network-slice-service:service-traffic-isolati\
on"
              }
            ]
          } 
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="R." surname="Rokui" fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <email>rrokui@ciena.com</email>
      </address>
    </contact>
    <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
      <organization>Microsoft</organization>
      <address>
        <email>jefftant.ietf@gmail.com</email>
      </address>
    </contact>
    <contact initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </contact>
    <contact initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

