<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dhody-teas-ietf-network-slice-mapping-07" category="std" consensus="true" tocInclude="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Slice-Mapping">IETF Network Slice Service Mapping YANG Model</title>
    <seriesInfo name="Internet-Draft" value="draft-dhody-teas-ietf-network-slice-mapping-07"/>
    <author initials="D." surname="Dhody" fullname="Dhruv Dhody">
      <organization>Huawei</organization>
      <address>
        <postal>
          <country>IN</country>
        </postal>
        <email>dhruv.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>CN</country>
        </postal>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <date/>
    <area>Routing</area>
    <workgroup>TEAS Working Group</workgroup>
    <abstract>
      <?line 62?>

<t>This document provides a YANG data model to map IETF network slice service to Traffic Engineering (TE) models (e.g., the Virtual Network (VN) model or the TE Tunnel, etc). It also supports mapping to the VPN Network models and Network Resource Partition (NRP) models. These models are referred to as the IETF network slice service mapping model and are applicable generically for the seamless control and management of the IETF network slice service with underlying TE/VPN support.</t>
      <t>The models are principally used for monitoring and diagnostics of the management systems to show how the IETF network slice service requests are mapped onto underlying network resources and TE/VPN models.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Data models are a representation of objects that can be configured or monitored within a system.  Within the IETF, YANG <xref target="RFC7950"/> is the language of choice for documenting data models, and YANG models have been produced to allow the configuration or modeling of a variety of network devices, protocol instances, and network services.</t>
      <t>The YANG model discussed in this document augments the IETF Network Slice Service YANG model <xref target="RFC9543"/>, which is used to operate IETF Network Slices during the IETF Network Slice instantiation.  This provides a way to map IETF network slice service to Traffic Engineering (TE) models (e.g., the Virtual Network (VN) model or the TE Tunnel, etc). Alternatively, it also supports mapping to the VPN Network models and Network Resource Partition (NRP) models.</t>
      <t>The model supports:</t>
      <ul spacing="normal">
        <li>
          <t>A mapping of the IETF Network Slice with the Network Resource Partition (NRP). As per <xref target="RFC9543"/>, NRP is a collection of resources (bufferage, queuing, scheduling, etc.) in the underlay network.  The NRP YANG model is specified in <xref target="I-D.ietf-teas-nrp-yang"/>. The IETF Network Slice can be mapped to the NRP directly.</t>
        </li>
        <li>
          <t>A mapping of the IETF Network Slice with the VPN network models - LxNM. This mapping can be populated at the time of IETF network service realization. This mapping information is internal and used for monitoring and diagnostics purposes such as telemetry, auto-scaling, and closed-loop automation. Note that the LxNM may further map to other TE resources as specified in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>. Optionally, a mapping to the NRP can also be populated.</t>
        </li>
        <li>
          <t>A mapping of the IETF Network Slice with the underlying TE resources directly.  The TE resources could be in a form of VN, set of TE tunnels, TE abstract topology, etc.  This mapping can be populated by the network at the time of realization of the IETF network slice service.  It is also possible to configure the mapping provided one is aware of NRP/VN/tunnels.  This mapping mode is used only when there is an awareness of VN or TE by the consumer of the model.  Otherwise, this mapping information is internal and used for monitoring and diagnostics purposes such as telemetry, auto-scaling, and closed-loop automation.</t>
        </li>
        <li>
          <t>Possibility to request the creation of a new VN/Tunnel to be bound to
IETF network slice.</t>
        </li>
        <li>
          <t>Indication to share the VN/Tunnel sharing (with or without
modification) for the IETF network slice.</t>
        </li>
        <li>
          <t>Support for configuration of underlying TE properties (as opposed
to existing VN or tunnels).</t>
        </li>
      </ul>
      <t>Note: The RFC Editor will replace XXXX with the number assigned to the RFC once this draft becomes an RFC.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <section anchor="tree-diagrams">
        <name>Tree Diagrams</name>
        <t>A simplified graphical representation of the data model is used in this document.  The meaning of the symbols in these diagrams is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefixes-in-data-node-names">
        <name>Prefixes in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects are often used without a prefix, as long as it is clear from the context in which the YANG module each name is defined.  Otherwise, names are prefixed using the standard prefix associated with the corresponding YANG module, as shown in Table 1.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="center">YANG module</th>
              <th align="right">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">nw</td>
              <td align="center">ietf-network</td>
              <td align="right">
                <xref target="RFC8345"/></td>
            </tr>
            <tr>
              <td align="left">tsmt</td>
              <td align="center">ietf-te-service-mapping-types</td>
              <td align="right">
                <xref target="I-D.ietf-teas-te-service-mapping-yang"/></td>
            </tr>
            <tr>
              <td align="left">l3vpn-ntw</td>
              <td align="center">ietf-l3vpn-ntw</td>
              <td align="right">
                <xref target="RFC9182"/></td>
            </tr>
            <tr>
              <td align="left">l2vpn-ntw</td>
              <td align="center">ietf-l2vpn-ntw</td>
              <td align="right">
                <xref target="RFC9291"/></td>
            </tr>
            <tr>
              <td align="left">ietf-ns</td>
              <td align="center">ietf-network-slice</td>
              <td align="right">
                <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/></td>
            </tr>
            <tr>
              <td align="left">nrp</td>
              <td align="center">ietf-nrp</td>
              <td align="right">
                <xref target="I-D.ietf-teas-nrp-yang"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="references-in-the-model">
        <name>References in the Model</name>
        <t>The following additional documents are referenced in the model defined in this document -</t>
        <table>
          <thead>
            <tr>
              <th align="left">Document</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Framework for IETF Network Slices</td>
              <td align="center">
                <xref target="RFC9543"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="model-design">
      <name>Model Design</name>
      <t>The YANG model specified in this document augments the IETF network slice service YANG model <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
      <t>Currently, the following mapping are supported:</t>
      <ul spacing="normal">
        <li>
          <t>L3NM: The L3 network model (L3NM) describes a L3VPN Service in the Service Provider Network.  It contains information on the Service Provider network and might include allocated resources. It can be used by network controllers to manage and control the L3VPN Service configuration in the Service Provider network. This model maps an IETF network slice to a L3VPN ID.</t>
        </li>
        <li>
          <t>L2NM: The L2 network model (L2NM) describes a L2VPN Service in the Service Provider Network.  It contains information on the Service Provider network and might include allocated resources. It can be used by network controllers to manage and control the L2VPN Service configuration in the Service Provider network. This model maps an IETF network slice to a L2VPN ID.</t>
        </li>
        <li>
          <t>TE: The TE mapping is specified in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>. The mapping can be done to the following TE resources:
          </t>
          <ul spacing="normal">
            <li>
              <t>Virtual Networks (VN) <xref target="RFC8453"/></t>
            </li>
            <li>
              <t>TE-Tunnels</t>
            </li>
            <li>
              <t>TE-Topology</t>
            </li>
          </ul>
        </li>
        <li>
          <t>NRP: <xref target="RFC9543"/> defines IETF network slice services that provide connectivity coupled with network resources commitment between a number of endpoints over a shared network infrastructure and, for scalability concerns, defines NRP to host one or a group of network slice services according to characteristics including SLOs and SLEs. Along with mapping to VPN, this model maps an IETF network slice to an NRP ID.</t>
        </li>
      </ul>
      <t>Attachment Circuits (ACs) are defined in <xref target="RFC9835"/> as the logical constructs that connect customer edges (CEs) to provider edges (PEs) and carry customer traffic into a RFC 9543 Network Slice Service. The YANG model in <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> already includes a mapping to AC.</t>
      <section anchor="open-questions">
        <name>Open Questions</name>
        <t>The following open questions need to be addressed in a future revision:</t>
        <ul spacing="normal">
          <li>
            <t>Is there a need/use-case to map the IETF Network slice Connection Group and/or Connectivity Construct as well?</t>
          </li>
          <li>
            <t>Is there a need/use-case to map IETF Network slice Service Demarcation Points (SDPs)?</t>
          </li>
          <li>
            <t>Is there a need to indicate "map-type" (new, share) for NRP and VPNs?</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="tree-structure">
      <name>Tree Structure</name>
      <sourcecode type="Tree"><![CDATA[
module: ietf-network-slice-mapping

  augment /ietf-nss:network-slice-services/ietf-nss:slice-service:
    +--rw mapping!
       +--rw ns-mapping
          +--rw map-to?                               identityref
          +--rw (map)?
             +--:(nrp)
             |  +--rw nrp?
             |          -> /nw:networks/nrp:nrp-policies/nrp-policy/name
             +--:(l3vpn)
             |  +--rw l3vpn-id?                       leafref
             |  +--rw l3vpn-nrp?
             |          -> /nw:networks/nrp:nrp-policies/nrp-policy/name
             +--:(l2vpn)
             |  +--rw l2vpn-id?                       leafref
             |  +--rw l2vpn-nrp?
             |          -> /nw:networks/nrp:nrp-policies/nrp-policy/name
             +--:(te)
                +--rw type?                           identityref
                +--rw te-policy
                |  +--rw path-affinities-values
                |  |  +--rw path-affinities-value* [usage]
                |  |        ...
                |  +--rw path-affinity-names
                |  |  +--rw path-affinity-name* [usage]
                |  |        ...
                |  +--rw protection-type?          identityref
                |  +--rw availability-type?        identityref
                +--rw (te)?
                |  +--:(vn)
                |  |  +--rw vn*
                |  |          -> /vn:virtual-network/vn/id
                |  +--:(te-topo)
                |  |  +--rw te-topology-identifier
                |  |  |     ...
                |  |  +--rw abstract-node?
                |  |          -> /nw:networks/network/node/node-id
                |  +--:(te-tunnel)
                |     +--rw te-tunnel*                te:tunnel-ref
                |     +--rw sr-policy* [headend color-ref endpoint-ref]
                |             {sr-policy}?
                |           ...
                +--rw template-ref?                   leafref
                        {template}?

]]></sourcecode>
    </section>
    <section anchor="yang-model">
      <name>YANG Model</name>
      <sourcecode type="YANG"><![CDATA[
<CODE BEGINS> file "ietf-network-slice-mapping@2025-10-13.yang"
module ietf-network-slice-mapping {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping";
  prefix ietf-nsm;

  import ietf-network {
    prefix nw;
    reference
      "RFC 8345: A YANG Data Model for Network Topologies";
  }
  import ietf-network-slice-service {
    prefix ietf-nss;
    reference
      "I-D.ietf-teas-ietf-network-slice-nbi-yang: A YANG Data
       Model for the IETF Network Slice Service";
  }
  import ietf-te-service-mapping-types {
    prefix tsmt;
    reference
      "I-D.ietf-teas-te-service-mapping-yang: Traffic Engineering
       (TE) and Service Mapping YANG Data Model";
  }
  import ietf-l3vpn-ntw {
    prefix l3vpn-ntw;
    reference
      "RFC 9182: A YANG Network Data Model for Layer 3 VPNs";
  }
  import ietf-l2vpn-ntw {
    prefix l2vpn-ntw;
    reference
      "RFC 9291: A Layer 2 VPN Network YANG Model";
  }
  import ietf-nrp {
    prefix nrp;
    reference
      "I-D.ietf-teas-nrp-yang: A YANG Data Model for Network
       Resource Partitions (NRPs)";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:  <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>
     Editor: Dhruv Dhody <dhruv.ietf@gmail.com>
             Bo Wu <lana.wubo@huawei.com>";
  description
    "This module contains a YANG module to map the IETF Network
     Slice with Traffic Engineering (TE) or VPN Network models.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the
     RFC itself for full legal notices.";

  revision 2025-10-13 {
    description
      "initial version.";
    reference
      "RFC XXXX: IETF Network Slice Service Mapping YANG Model";
  }

  identity map-to {
    description
      "Base identity from which specific map-to are derived.";
  }

  identity map-to-nrp {
    base map-to;
    description
      "Map to Network Resource Partition (NRP)";
  }

  identity map-to-vpn {
    base map-to;
    description
      "Map to VPN";
  }

  identity map-to-l3vpn {
    base map-to-vpn;
    description
      "Map to L3VPN";
  }

  identity map-to-l2vpn {
    base map-to-vpn;
    description
      "Map to L2VPN";
  }

  identity map-to-l1vpn {
    base map-to-vpn;
    description
      "Map to L1VPN";
  }

  identity map-to-te {
    base map-to;
    description
      "Map to TE directly";
  }

  grouping ns-mapping {
    description
      "Mapping between IETF network slice and Network
       Resource Partition (NRP)/VPN/TE";
    container ns-mapping {
      description
        "The container for the mapping";
      leaf map-to {
        type identityref {
          base map-to;
        }
        description
          "Mapping to NRP/VPN/TE";
      }
      choice map {
        description
          "Mapping to NRP/VPN/TE";
        case nrp {
          leaf nrp {
            type leafref {
              path "/nw:networks/nrp:nrp-policies"
                 + "/nrp:nrp-policy/nrp:name";
            }
            description
              "A reference to NRP name";
            reference
              "I-D.ietf-teas-nrp-yang: A YANG Data Model for
               Network Resource Partitions (NRPs)";
          }
        }
        case l3vpn {
          leaf l3vpn-id {
            type leafref {
              path "/l3vpn-ntw:l3vpn-ntw"
                 + "/l3vpn-ntw:vpn-services"
                 + "/l3vpn-ntw:vpn-service"
                 + "/l3vpn-ntw:vpn-id";
            }
            description
              "A reference to VPN ID";
          }
          leaf l3vpn-nrp {
            type leafref {
              path "/nw:networks/nrp:nrp-policies"
                 + "/nrp:nrp-policy/nrp:name";
            }
            description
              "An optional reference to NRP name";
            reference
              "RFC9543: Framework
               for IETF Network Slices";
          }
          description
            "Mapping to L3NM";
          reference
            "RFC9182: A YANG Network Data Model for
             Layer 3 VPNs";
        }
        case l2vpn {
          leaf l2vpn-id {
            type leafref {
              path "/l2vpn-ntw:l2vpn-ntw"
                 + "/l2vpn-ntw:vpn-services"
                 + "/l2vpn-ntw:vpn-service"
                 + "/l2vpn-ntw:vpn-id";
            }
            description
              "A reference to VPN ID";
          }
          leaf l2vpn-nrp {
            type leafref {
              path "/nw:networks/nrp:nrp-policies"
                 + "/nrp:nrp-policy/nrp:name";
            }
            description
              "An optional reference to NRP";
            reference
              "RFC9543: Framework
               for IETF Network Slices";
          }
          description
            "Mapping to L2NM";
          reference
            "RFC 9291: A Layer 2 VPN Network YANG Model";
        }
        case te {
          uses tsmt:te-mapping;
          description
            "Mapping to TE directly";
          reference
            "I-D.ietf-teas-te-service-mapping-yang:
             Traffic Engineering (TE) and Service
             Mapping YANG Model";
        }
      }
    }
  }

  augment "/ietf-nss:network-slice-services/ietf-nss:slice-service" {
    description
      "IETF Network Slice augmented to include the mapping
       information to the network slice realization";
    container mapping {
      presence "Indicates Mapping information";
      description
        "Container to augment IETF network slice to
         include NRP / VPN / TE mappings";
      uses ns-mapping;
    }
  }
}

<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The "ietf-network-slice-mapping" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management
protocols (1) have to use a secure transport layer
(e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have
to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., "config true", which is the
default).  All writable data nodes are likely to be sensitive or
vulnerable in some network environments.  Write
operations (e.g., edit-config) and delete operations to these data
nodes without proper protection or authentication can have a negative
effect on network operations.  The following subtrees and data nodes
have particular sensitivities/vulnerabilities:</t>
      <ul spacing="normal">
        <li>
          <t>/ietf-nss:network-slice-services/ietf-nss:slice-service/mapping/ns-mapping/ - can configure Network Slice Service mapping.</t>
        </li>
      </ul>
      <t>There are no particularly sensitive readable data nodes.</t>
      <t>There are no particularly sensitive RPC or action operations.</t>
      <t>This YANG module uses groupings from other YANG modules that
define nodes that may be considered sensitive or vulnerable
in network environments. Refer to the Security Considerations
of <xref target="I-D.ietf-teas-te-service-mapping-yang"/> for information as to which nodes may
be considered sensitive or vulnerable in network environments.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following allocation for the URIs in the "ns" subregistry within the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   URI: urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace.
   --------------------------------------------------------------------
]]></artwork>
      <t>IANA is requested to make the following allocation for the YANG module in the "YANG Module Names" registry <xref target="RFC6020"/>:</t>
      <artwork><![CDATA[
   --------------------------------------------------------------------
   name:         ietf-network-slice-mapping
   namespace:    urn:ietf:params:xml:ns:yang:ietf-network-slice-mapping
   prefix:       ietf-nsm
   reference:    RFC XXXX
   --------------------------------------------------------------------
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-25"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="12" month="October" year="2025"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-nrp-yang">
          <front>
            <title>YANG Data Models for Network Resource Partitions (NRPs)</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   RFC 9543 describes a framework for Network Slices in networks built
   from IETF technologies.  In this framework, the network resource
   partition (NRP) is introduced as a collection of network resources
   allocated from the underlay network to carry a specific set of
   Network Slice Service traffic and meet specific Service Level
   Objective (SLO) and Service Level Expectation (SLE) characteristics.

   This document defines YANG data models for Network Resource
   Partitions (NRPs), applicable to devices and network controllers.
   The models can be used, in particular, for the realization of the
   RFC9543 Network Slice Services in IP/MPLS and Segment Routing (SR)
   networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-nrp-yang-04"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9835">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="R. Roberts" initials="R." surname="Roberts"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="B. Wu" initials="B." surname="Wu"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>This document specifies a network model for attachment circuits. The model can be used for the provisioning of attachment circuits prior or during service provisioning (e.g., VPN, Network Slice Service). A companion service model is specified in the YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf- opsawg-teas-attachment-circuit).</t>
              <t>The module augments the base network ('ietf-network') and the Service Attachment Point (SAP) models with the detailed information for the provisioning of attachment circuits in Provider Edges (PEs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9835"/>
          <seriesInfo name="DOI" value="10.17487/RFC9835"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ns-ip-mpls">
          <front>
            <title>Realizing Network Slices in IP/MPLS Networks</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Joel M. Halpern" initials="J. M." surname="Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Shaofu Peng" initials="S." surname="Peng">
              <organization>ZTE Corporation</organization>
            </author>
            <date day="2" month="March" year="2025"/>
            <abstract>
              <t>   Realizing network slices may require the Service Provider to have the
   ability to partition a physical network into multiple logical
   networks of varying sizes, structures, and functions so that each
   slice can be dedicated to specific services or customers.  Multiple
   network slices can be realized on the same network while ensuring
   slice elasticity in terms of network resource allocation.  This
   document describes a scalable solution to realize network slicing in
   IP/MPLS networks by supporting multiple services on top of a single
   physical network by relying on compliant domains and nodes to provide
   forwarding treatment (scheduling, drop policy, resource usage) on to
   packets that carry identifiers that indicate the slicing service that
   is to be applied to the packets.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ns-ip-mpls-05"/>
        </reference>
      </references>
    </references>
    <?line 501?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Jie Dong and Adrian Farrel for the initial discussion behind this document.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>To be added in future revisions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
