rfc9834v1.txt   rfc9834.txt 
Internet Engineering Task Force (IETF) M. Boucadair, Ed. Internet Engineering Task Force (IETF) M. Boucadair, Ed.
Request for Comments: 9834 Orange Request for Comments: 9834 Orange
Category: Standards Track R. Roberts, Ed. Category: Standards Track R. Roberts, Ed.
ISSN: 2070-1721 Juniper ISSN: 2070-1721 Juniper
O. Gonzalez de Dios O. Gonzalez de Dios
Telefonica Telefonica
S. Barguil Giraldo S. Barguil
Nokia Nokia
B. Wu B. Wu
Huawei Technologies Huawei Technologies
August 2025 August 2025
YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service
(ACaaS) (ACaaS)
Abstract Abstract
Delivery of network services assumes that appropriate setup is Delivery of network services assumes that appropriate setup is
provisioned over the links that connect customer termination points provisioned over the links that connect customer termination points
and a provider network. The required setup to allow successful data and a provider network. The required setup to allow successful data
exchange over these links is referred to as an attachment circuit exchange over these links is referred to as an attachment circuit
(AC), while the underlying link is referred to as a "bearer". (AC), while the underlying link is referred to as a "bearer".
This document specifies a YANG service data model for ACs. This This document specifies a YANG service data model for ACs. This
model can be used for the provisioning of ACs before or during model can be used for the provisioning of ACs before or during
service provisioning (e.g., Network Slice Service). service provisioning (e.g., RFC 9543 Network Slice Service).
The document also specifies a YANG service data model for managing The document also specifies a YANG service data model for managing
bearers over which ACs are established. bearers over which ACs are established.
Status of This Memo Status of This Memo
This is an Internet Standards Track document. This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has (IETF). It represents the consensus of the IETF community. It has
skipping to change at line 160 skipping to change at line 160
adjacent domains that need to connect via an AC will use such means adjacent domains that need to connect via an AC will use such means
to agree upon the resources that are required for the activation of to agree upon the resources that are required for the activation of
both sides of an AC (e.g., Layer 2 tags, IP address family, or IP both sides of an AC (e.g., Layer 2 tags, IP address family, or IP
subnets). subnets).
This document specifies a YANG service data model ("ietf-ac-svc") for This document specifies a YANG service data model ("ietf-ac-svc") for
managing attachment circuits that are exposed by a network to its managing attachment circuits that are exposed by a network to its
customers, such as an enterprise site, an SF, a hosting customers, such as an enterprise site, an SF, a hosting
infrastructure, or a peer network provider. The model can be used infrastructure, or a peer network provider. The model can be used
for the provisioning of ACs prior to or during advanced service for the provisioning of ACs prior to or during advanced service
provisioning (e.g., IETF Network Slice Service defined in "A provisioning (e.g., RFC 9543 Network Slice Service defined in "A
Framework for Network Slices in Networks Built from IETF Framework for Network Slices in Networks Built from IETF
Technologies" [RFC9543]). Technologies" [RFC9543]).
The "ietf-ac-svc" module (Section 6.2) includes a set of reusable The "ietf-ac-svc" module (Section 6.2) includes a set of reusable
groupings. Whether a service model that wants to describe the groupings. Whether a service model that wants to describe the
attachment circuits associated with the service reuses structures attachment circuits associated with the service reuses structures
defined in the "ietf-ac-svc" or simply includes an AC reference (that defined in the "ietf-ac-svc" or simply includes an AC reference (that
was communicated during AC service instantiation) is a design choice was communicated during AC service instantiation) is a design choice
of these service models. Relying upon the AC service model to manage of these service models. Relying upon the AC service model to manage
ACs over which services are delivered has the merit of decorrelating ACs over which services are delivered has the merit of decorrelating
skipping to change at line 239 skipping to change at line 239
* Request an attachment circuit for a known peer SAP (Appendix A.3). * Request an attachment circuit for a known peer SAP (Appendix A.3).
* Instantiate multiple attachment circuits over the same bearer * Instantiate multiple attachment circuits over the same bearer
(Appendix A.4). (Appendix A.4).
* Control the precedence over multiple attachment circuits * Control the precedence over multiple attachment circuits
(Appendix A.5). (Appendix A.5).
* Create multiple ACs bound to multiple CEs (Appendix A.6). * Create multiple ACs bound to multiple CEs (Appendix A.6).
* Bind a Slice Service to a set of pre-provisioned attachment * Bind an RFC 9543 Network Slice Service to a set of pre-provisioned
circuits (Appendix A.7). attachment circuits (Appendix A.7).
* Connect an enterprise network to a provider network using BGP * Connect an enterprise network to a provider network using BGP
(Appendix A.9). (Appendix A.9).
* Connect a Cloud Infrastructure to a service provider network * Connect a Cloud Infrastructure to a service provider network
(Appendix A.8). (Appendix A.8).
* Interconnect provider networks (e.g., [RFC8921] or [PEERING-API]). * Interconnect provider networks (e.g., [RFC8921] or [PEERING-API]).
Such ACs are identified with a 'role' set to 'ac-common:nni' or Such ACs are identified with a 'role' set to 'ac-common:nni' or
'ac-common:public-nni'. See Appendix A.10 to illustrate the use 'ac-common:public-nni'. See Appendix A.10 to illustrate the use
skipping to change at line 392 skipping to change at line 392
ACs (called child ACs) inherit the parent AC properties. ACs (called child ACs) inherit the parent AC properties.
Service orchestrator: Refers to a functional entity that interacts Service orchestrator: Refers to a functional entity that interacts
with the customer of a network service. with the customer of a network service.
A service orchestrator is typically responsible for the attachment A service orchestrator is typically responsible for the attachment
circuits, the PE selection, and requesting the activation of the circuits, the PE selection, and requesting the activation of the
requested service to a network controller. requested service to a network controller.
Service provider network: A network that is able to provide network Service provider network: A network that is able to provide network
services (e.g., Layer 2 VPN (L2VPN), Layer 3 VPN (L3VPN), or services (e.g., Layer 2 VPN (L2VPN), Layer 3 VPN (L3VPN), or RFC
Network Slice Services). 9543 Network Slice Services).
Service provider: An entity that offers network services (e.g., Service provider: An entity that offers network services (e.g.,
Layer 2 VPN, Layer 3 VPN, or Network Slice Services). Layer 2 VPN, Layer 3 VPN, or RFC 9543 Network Slice Services).
The names of data nodes are prefixed using the prefix associated with The names of data nodes are prefixed using the prefix associated with
the corresponding imported YANG module as shown in Table 1: the corresponding imported YANG module as shown in Table 1:
+============+==================+========================+ +============+==================+========================+
| Prefix | Module | Reference | | Prefix | Module | Reference |
+============+==================+========================+ +============+==================+========================+
| inet | ietf-inet-types | Section 4 of [RFC6991] | | inet | ietf-inet-types | Section 4 of [RFC6991] |
+------------+------------------+------------------------+ +------------+------------------+------------------------+
| key-chain | ietf-key-chain | [RFC8177] | | key-chain | ietf-key-chain | [RFC8177] |
skipping to change at line 3914 skipping to change at line 3914
list service-ref { list service-ref {
key "service-type service-id"; key "service-type service-id";
config false; config false;
description description
"Reports the set of services that are bound to the AC."; "Reports the set of services that are bound to the AC.";
leaf service-type { leaf service-type {
type identityref { type identityref {
base vpn-common:service-type; base vpn-common:service-type;
} }
description description
"Indicates the service type (e.g., L3VPN or Network Slice "Indicates the service type (e.g., L3VPN or RFC 9543
Service)."; Network Slice Service).";
reference reference
"RFC 9408: A YANG Network Data Model for Service "RFC 9408: A YANG Network Data Model for Service
Attachment Points (SAPs), Section 5"; Attachment Points (SAPs), Section 5";
} }
leaf service-id { leaf service-id {
type string; type string;
description description
"Indicates an identifier of a service instance "Indicates an identifier of a service instance
of a given type that uses the AC."; of a given type that uses the AC.";
} }
skipping to change at line 3943 skipping to change at line 3943
to identify the AC."; to identify the AC.";
} }
uses ac; uses ac;
} }
} }
} }
<CODE ENDS> <CODE ENDS>
7. Security Considerations 7. Security Considerations
This section is modeled after the template described in Section 3.7 Several data nodes ('bgp', 'ospf', 'isis', 'rip', and 'customer-key-
of [YANG-GUIDELINES]. chain') rely upon [RFC8177] for authentication purposes. As such,
the AC service module inherits the security considerations discussed
in Section 5 of [RFC8177]. Also, these data nodes support supplying
explicit keys as strings in ASCII format. The use of keys in
hexadecimal string format would afford greater key entropy with the
same number of key-string octets. However, such a format is not
included in this version of the AC service model because it is not
supported by the underlying device modules (e.g., [RFC8695]).
Section 5.2.5.5 specifies a set of encryption-related parameters that
can be applied to traffic for a given AC.
The remainder of this section is modeled after the template described
in Section 3.7.1 of [YANG-GUIDELINES].
The "ietf-bearer-svc" and "ietf-ac-svc" YANG modules define data The "ietf-bearer-svc" and "ietf-ac-svc" YANG modules define data
models that are designed to be accessed via YANG-based management models that are designed to be accessed via YANG-based management
protocols, such as NETCONF [RFC6241] and RESTCONF [RFC8040]. These protocols, such as NETCONF [RFC6241] and RESTCONF [RFC8040]. These
protocols have to use a secure transport layer (e.g., SSH [RFC4252], protocols have to use a secure transport layer (e.g., SSH [RFC4252],
TLS [RFC8446], and QUIC [RFC9000]) and have to use mutual TLS [RFC8446], and QUIC [RFC9000]) and have to use mutual
authentication. authentication.
Servers MUST verify that requesting clients are entitled to access Servers MUST verify that requesting clients are entitled to access
and manipulate a given bearer or AC. For example, a given customer and manipulate a given bearer or AC. For example, a given customer
skipping to change at line 4032 skipping to change at line 4045
'customer-name', 'l2-connection', and 'ip-connection': An attacker 'customer-name', 'l2-connection', and 'ip-connection': An attacker
can retrieve privacy-related information, which can be used to can retrieve privacy-related information, which can be used to
track a customer. Disclosing such information may be considered a track a customer. Disclosing such information may be considered a
violation of the customer-provider trust relationship. violation of the customer-provider trust relationship.
'keying-material': An attacker can retrieve the cryptographic keys 'keying-material': An attacker can retrieve the cryptographic keys
protecting the underlying connectivity services (routing, in protecting the underlying connectivity services (routing, in
particular). These keys could be used to inject spoofed routing particular). These keys could be used to inject spoofed routing
advertisements. advertisements.
Several data nodes ('bgp', 'ospf', 'isis', 'rip', and 'customer-key- There are no particularly sensitive RPC or action operations.
chain') rely upon [RFC8177] for authentication purposes. As such,
the AC service module inherits the security considerations discussed
in Section 5 of [RFC8177]. Also, these data nodes support supplying
explicit keys as strings in ASCII format. The use of keys in
hexadecimal string format would afford greater key entropy with the
same number of key-string octets. However, such a format is not
included in this version of the AC service model because it is not
supported by the underlying device modules (e.g., [RFC8695]).
Section 5.2.5.5 specifies a set of encryption-related parameters that
can be applied to traffic for a given AC.
8. IANA Considerations 8. IANA Considerations
IANA has registered the following URIs in the "ns" subregistry within IANA has registered the following URIs in the "ns" subregistry within
the "IETF XML Registry" [RFC3688]: the "IETF XML Registry" [RFC3688]:
URI: urn:ietf:params:xml:ns:yang:ietf-bearer-svc URI: urn:ietf:params:xml:ns:yang:ietf-bearer-svc
Registrant Contact: The IESG. Registrant Contact: The IESG.
XML: N/A; the requested URI is an XML namespace. XML: N/A; the requested URI is an XML namespace.
skipping to change at line 4201 skipping to change at line 4203
Q., and V. Lopez, "A YANG Network Data Model for Service Q., and V. Lopez, "A YANG Network Data Model for Service
Attachment Points (SAPs)", RFC 9408, DOI 10.17487/RFC9408, Attachment Points (SAPs)", RFC 9408, DOI 10.17487/RFC9408,
June 2023, <https://www.rfc-editor.org/info/rfc9408>. June 2023, <https://www.rfc-editor.org/info/rfc9408>.
[RFC9568] Lindem, A. and A. Dogra, "Virtual Router Redundancy [RFC9568] Lindem, A. and A. Dogra, "Virtual Router Redundancy
Protocol (VRRP) Version 3 for IPv4 and IPv6", RFC 9568, Protocol (VRRP) Version 3 for IPv4 and IPv6", RFC 9568,
DOI 10.17487/RFC9568, April 2024, DOI 10.17487/RFC9568, April 2024,
<https://www.rfc-editor.org/info/rfc9568>. <https://www.rfc-editor.org/info/rfc9568>.
[RFC9833] Boucadair, M., Ed., Roberts, R., Ed., Gonzalez de Dios, [RFC9833] Boucadair, M., Ed., Roberts, R., Ed., Gonzalez de Dios,
O., Barguil Giraldo, S., and B. Wu, "A Common YANG Data O., Barguil, S., and B. Wu, "A Common YANG Data Model for
Model for Attachment Circuits", RFC 9833, Attachment Circuits", RFC 9833, DOI 10.17487/RFC9833,
DOI 10.17487/RFC9833, August 2025, August 2025, <https://www.rfc-editor.org/info/rfc9833>.
<https://www.rfc-editor.org/info/rfc9833>.
9.2. Informative References 9.2. Informative References
[BGP4-YANG] [BGP4-YANG]
Jethanandani, M., Patel, K., Hares, S., and J. Haas, "YANG Jethanandani, M., Patel, K., Hares, S., and J. Haas, "YANG
Model for Border Gateway Protocol (BGP-4)", Work in Model for Border Gateway Protocol (BGP-4)", Work in
Progress, Internet-Draft, draft-ietf-idr-bgp-model-18, 21 Progress, Internet-Draft, draft-ietf-idr-bgp-model-18, 21
October 2024, <https://datatracker.ietf.org/doc/html/ October 2024, <https://datatracker.ietf.org/doc/html/
draft-ietf-idr-bgp-model-18>. draft-ietf-idr-bgp-model-18>.
skipping to change at line 4359 skipping to change at line 4360
DOI 10.17487/RFC9234, May 2022, DOI 10.17487/RFC9234, May 2022,
<https://www.rfc-editor.org/info/rfc9234>. <https://www.rfc-editor.org/info/rfc9234>.
[RFC9543] Farrel, A., Ed., Drake, J., Ed., Rokui, R., Homma, S., [RFC9543] Farrel, A., Ed., Drake, J., Ed., Rokui, R., Homma, S.,
Makhijani, K., Contreras, L., and J. Tantsura, "A Makhijani, K., Contreras, L., and J. Tantsura, "A
Framework for Network Slices in Networks Built from IETF Framework for Network Slices in Networks Built from IETF
Technologies", RFC 9543, DOI 10.17487/RFC9543, March 2024, Technologies", RFC 9543, DOI 10.17487/RFC9543, March 2024,
<https://www.rfc-editor.org/info/rfc9543>. <https://www.rfc-editor.org/info/rfc9543>.
[RFC9835] Boucadair, M., Ed., Roberts, R., Gonzalez de Dios, O., [RFC9835] Boucadair, M., Ed., Roberts, R., Gonzalez de Dios, O.,
Barguil Giraldo, S., and B. Wu, "A Network YANG Data Model Barguil, S., and B. Wu, "A Network YANG Data Model for
for Attachment Circuits", RFC 9835, DOI 10.17487/RFC9835, Attachment Circuits", RFC 9835, DOI 10.17487/RFC9835,
August 2025, <https://www.rfc-editor.org/info/rfc9835>. August 2025, <https://www.rfc-editor.org/info/rfc9835>.
[RFC9836] Boucadair, M., Ed., Roberts, R., Barguil Giraldo, S., and [RFC9836] Boucadair, M., Ed., Roberts, R., Barguil, S., and O.
O. Gonzalez de Dios, "A YANG Data Model for Augmenting VPN Gonzalez de Dios, "A YANG Data Model for Augmenting VPN
Service and Network Models with Attachment Circuits", Service and Network Models with Attachment Circuits",
RFC 9836, DOI 10.17487/RFC9836, August 2025, RFC 9836, DOI 10.17487/RFC9836, August 2025,
<https://datatracker.ietf.org/doc/html/draft-ietf-opsawg- <https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-
ac-lxsm-lxnm-glue-14>. ac-lxsm-lxnm-glue-14>.
[YANG-GUIDELINES] [YANG-GUIDELINES]
Bierman, A., Boucadair, M., Ed., and Q. Wu, "Guidelines Bierman, A., Boucadair, M., Ed., and Q. Wu, "Guidelines
for Authors and Reviewers of Documents Containing YANG for Authors and Reviewers of Documents Containing YANG
Data Models", Work in Progress, Internet-Draft, draft- Data Models", Work in Progress, Internet-Draft, draft-
ietf-netmod-rfc8407bis-28, 5 June 2025, ietf-netmod-rfc8407bis-28, 5 June 2025,
skipping to change at line 4498 skipping to change at line 4499
} }
}, },
"bearer-reference": "line-156" "bearer-reference": "line-156"
} }
} }
] ]
} }
} }
Figure 27: Example of a Message Body of a Response to Assign a Figure 27: Example of a Message Body of a Response to Assign a
Customer VLAN (CVLAN) ID Customer VLAN (C-VLAN) ID
A.3. Create an AC for a Known Peer SAP A.3. Create an AC for a Known Peer SAP
An example of a request to create a simple AC, when the peer SAP is An example of a request to create a simple AC, when the peer SAP is
known, is shown in Figure 28. In this example, the peer SAP known, is shown in Figure 28. In this example, the peer SAP
identifier points to an identifier of an SF. The (topological) identifier points to an identifier of an SF. The (topological)
location of that SF is assumed to be known to the network controller. location of that SF is assumed to be known to the network controller.
For example, this can be determined as part of an on-demand procedure For example, this can be determined as part of an on-demand procedure
to instantiate an SF in a cloud. That instantiated SF can be granted to instantiate an SF in a cloud. That instantiated SF can be granted
a connectivity service via the provider network. a connectivity service via the provider network.
skipping to change at line 5013 skipping to change at line 5014
} }
} }
Figure 38: Example of a Message Body of a Request to Create Figure 38: Example of a Message Body of a Request to Create
Multiple ACs Bound to Multiple CEs Multiple ACs Bound to Multiple CEs
A.7. Binding Attachment Circuits to an IETF Network Slice A.7. Binding Attachment Circuits to an IETF Network Slice
This example shows how the AC service model complements the model This example shows how the AC service model complements the model
defined in "A YANG Data Model for the RFC 9543 Network Slice Service" defined in "A YANG Data Model for the RFC 9543 Network Slice Service"
[NSSM] to connect a site to a Slice Service. [NSSM] to connect a site to an RFC 9543 Network Slice Service.
First, Figure 39 describes the end-to-end network topology as well as First, Figure 39 describes the end-to-end network topology as well as
the orchestration scopes: the orchestration scopes:
* The topology is made up of two sites ("site1" and "site2"), * The topology is made up of two sites ("site1" and "site2"),
interconnected via a Transport Network (e.g., IP/MPLS network). interconnected via a Transport Network (e.g., IP/MPLS network).
An SF is deployed within each site in a dedicated IP subnet. An SF is deployed within each site in a dedicated IP subnet.
* A 5G Service Management and Orchestration (SMO) is responsible for * A 5G Service Management and Orchestration (SMO) is responsible for
the deployment of SFs and the indirect management of a local the deployment of SFs and the indirect management of a local
skipping to change at line 5284 skipping to change at line 5285
] ]
} }
} }
] ]
} }
} }
Figure 42: Example of a Message Body of a Response Indicating the Figure 42: Example of a Message Body of a Response Indicating the
Creation of the ACs Creation of the ACs
Figure 43 shows the message body of the request to create a Slice Figure 43 shows the message body of the request to create an RFC 9543
Service bound to the ACs created using Figure 41. Only references to Netowrk Slice Service bound to the ACs created using Figure 41. Only
these ACs are included in the Slice Service request. references to these ACs are included in the RFC 9543 Network Slice
Service request.
{ {
"ietf-network-slice-service:network-slice-services": { "ietf-network-slice-service:network-slice-services": {
"slo-sle-templates": { "slo-sle-templates": {
"slo-sle-template": [ "slo-sle-template": [
{ {
"id": "low-latency-template", "id": "low-latency-template",
"description": "Lowest latency forwarding behavior" "description": "Lowest latency forwarding behavior"
} }
] ]
skipping to change at line 5325 skipping to change at line 5327
"ac2" "ac2"
] ]
} }
] ]
} }
} }
] ]
} }
} }
Figure 43: Message Body of a Request to Create a Slice Service Figure 43: Message Body of a Request to Create an RFC 9543
Referring to the ACs Network Slice Service Referring to the ACs
A.8. Connecting a Virtualized Environment Running in a Cloud Provider A.8. Connecting a Virtualized Environment Running in a Cloud Provider
This example (Figure 44) shows how the AC service model can be used This example (Figure 44) shows how the AC service model can be used
to connect a Cloud Infrastructure to a service provider network. to connect a Cloud Infrastructure to a service provider network.
This example makes the following assumptions: This example makes the following assumptions:
1. A customer (e.g., Mobile Network Team or partner) has a 1. A customer (e.g., Mobile Network Team or partner) has a
virtualized infrastructure running in a Cloud Provider. A virtualized infrastructure running in a Cloud Provider. A
simplistic deployment is represented here with a set of Virtual simplistic deployment is represented here with a set of Virtual
skipping to change at line 5417 skipping to change at line 5419
bearer-reference: 1234-56789 for PE1/Interface "If-A" bearer-reference: 1234-56789 for PE1/Interface "If-A"
Figure 45: Illustration of Pre-Provisioning Figure 45: Illustration of Pre-Provisioning
Next, API workflows can be initiated by: Next, API workflows can be initiated by:
* The Cloud Provider for the configuration per Step (3) above. * The Cloud Provider for the configuration per Step (3) above.
* The service provider network via the ACaaS model. This request * The service provider network via the ACaaS model. This request
can be used in conjunction with additional requests based on the can be used in conjunction with additional requests based on the
L3SM (VPN provisioning) or Network Slice Service model (5G hybrid L3SM (VPN provisioning) or RFC 9543 Network Slice Service model
cloud deployment). (5G hybrid cloud deployment).
Figure 46 shows the message body of the request to create the Figure 46 shows the message body of the request to create the
required ACs to connect the virtualized Cloud Provider (VM) using the required ACs to connect the virtualized Cloud Provider (VM) using the
ACaaS module. ACaaS module.
=============== NOTE: '\' line wrapping per RFC 8792 ================ =============== NOTE: '\' line wrapping per RFC 8792 ================
{ {
"ietf-ac-svc:attachment-circuits": { "ietf-ac-svc:attachment-circuits": {
"ac": [ "ac": [
skipping to change at line 6597 skipping to change at line 6599
| '----' | | | | '----' | | |
compute-08 '-----------------------' compute-08 '-----------------------'
Figure 64: Example of Compute Failure and Scale-Out Figure 64: Example of Compute Failure and Scale-Out
Finally, the addition or deletion of compute nodes in the deployment Finally, the addition or deletion of compute nodes in the deployment
("compute-11", "compute-12", etc.) involves merely changes on Child ("compute-11", "compute-12", etc.) involves merely changes on Child
ACs and possible routing on the parent AC. In any case, the parent ACs and possible routing on the parent AC. In any case, the parent
AC is a stable identifier, which can be consumed as a reference by AC is a stable identifier, which can be consumed as a reference by
end-to-end service models for VPN configuration such as AC Glue end-to-end service models for VPN configuration such as AC Glue
[RFC9836], Slice Service [NSSM], etc. This decoupling to a stable [RFC9836], RFC 9543 Network Slice Service [NSSM], etc. This
identifier provides great benefits in terms of scalability and decoupling to a stable identifier provides great benefits in terms of
flexibility since once the reference with the parent AC is scalability and flexibility since once the reference with the parent
implemented, no API call involving the VPN model is needed for any AC is implemented, no API call involving the VPN model is needed for
modification in the cloud. any modification in the cloud.
A.12. BFD and Static Addressing A.12. BFD and Static Addressing
Figure 65 shows a topology example of a set of CEs connected to a Figure 65 shows a topology example of a set of CEs connected to a
provider network via dedicated bearers. Each of these CEs maintains provider network via dedicated bearers. Each of these CEs maintains
two BFD sessions with the provider network. two BFD sessions with the provider network.
+----------------------------+ +----------------------------+
.-------. .1 | | .-------. .1 | |
| CE1 |------------|------+ | | CE1 |------------|------+ |
skipping to change at line 7641 skipping to change at line 7643
Email: mohamed.boucadair@orange.com Email: mohamed.boucadair@orange.com
Richard Roberts (editor) Richard Roberts (editor)
Juniper Juniper
Email: rroberts@juniper.net Email: rroberts@juniper.net
Oscar Gonzalez de Dios Oscar Gonzalez de Dios
Telefonica Telefonica
Email: oscar.gonzalezdedios@telefonica.com Email: oscar.gonzalezdedios@telefonica.com
Samier Barguil Giraldo Samier Barguil
Nokia Nokia
Email: samier.barguil_giraldo@nokia.com Email: samier.barguil_giraldo@nokia.com
Bo Wu Bo Wu
Huawei Technologies Huawei Technologies
Email: lana.wubo@huawei.com Email: lana.wubo@huawei.com
 End of changes. 19 change blocks. 
47 lines changed or deleted 49 lines changed or added

This html diff was produced by rfcdiff 1.48.