<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" docName="draft-boucadair-connectivity-provisioning-protocol-22" indexInclude="true" ipr="trust200902" number="8921" prepTime="2020-10-21T15:52:48" scripts="Common,Latin" sortRefs="true" submissionType="independent" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-boucadair-connectivity-provisioning-protocol-22" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8921" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="CPNP">Dynamic Service Negotiation: The Connectivity Provisioning Negotiation Protocol (CPNP)</title>
    <seriesInfo name="RFC" value="8921" stream="independent"/>
    <author fullname="Mohamed Boucadair" initials="M." role="editor" surname="Boucadair">
      <organization showOnFrontPage="true">Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
      <organization showOnFrontPage="true">Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>christian.jacquenet@orange.com</email>
      </address>
    </author>
    <author fullname="Dacheng Zhang" initials="D." surname="Zhang">
      <organization showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <email>dacheng.zhang@huawei.com</email>
      </address>
    </author>
    <author fullname="Panos Georgatsos" initials="P." surname="Georgatsos">
      <organization abbrev="CERTH" showOnFrontPage="true">Centre for Research and Innovation Hellas</organization>
      <address>
        <postal>
          <street>78, Filikis Etairias str.</street>
          <city>Volos</city>
          <region>Hellas</region>
          <code>38334</code>
          <country>Greece</country>
        </postal>
        <phone>+302421306070</phone>
        <email>pgeorgat@gmail.com</email>
      </address>
    </author>
    <date month="10" year="2020"/>
    <keyword>SDN</keyword>
    <keyword>Order Request Handling</keyword>
    <keyword>Automation</keyword>
    <keyword>Dynamic Provisioning</keyword>
    <keyword>CDN</keyword>
    <keyword>Interconnection</keyword>
    <keyword>Service Delivery</keyword>
    <keyword>Service Activation</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document defines the Connectivity Provisioning Negotiation
      Protocol (CPNP), which is designed to facilitate the dynamic negotiation
      of service parameters.</t>
      <t indent="0" pn="section-abstract-2">CPNP is a generic protocol that can be used for various negotiation
      purposes that include (but are not necessarily limited to) connectivity
      provisioning services, storage facilities, Content Delivery Networks,
      etc.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This is a contribution to the RFC Series, independently of any
            other RFC stream.  The RFC Editor has chosen to publish this
            document at its discretion and makes no statement about its value
            for implementation or deployment.  Documents approved for
            publication by the RFC Editor are not candidates for any level of
            Internet Standard; see Section 2 of RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8921" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-functional-elements">CPNP Functional Elements</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-processing-models">Order Processing Models</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-sample-use-cases">Sample Use Cases</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-deployment-models">CPNP Deployment Models</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-negotiation-model">CPNP Negotiation Model</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protocol-overview">Protocol Overview</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-client-server-communication">Client/Server Communication</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-policy-configuration-on-the">Policy Configuration on the CPNP Server</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.3">
                <t indent="0" pn="section-toc.1-1.8.2.3.1"><xref derivedContent="8.3" format="counter" sectionFormat="of" target="section-8.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-session-entries">CPNP Session Entries</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.4">
                <t indent="0" pn="section-toc.1-1.8.2.4.1"><xref derivedContent="8.4" format="counter" sectionFormat="of" target="section-8.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-transactions">CPNP Transactions</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.5">
                <t indent="0" pn="section-toc.1-1.8.2.5.1"><xref derivedContent="8.5" format="counter" sectionFormat="of" target="section-8.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-timers">CPNP Timers</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.6">
                <t indent="0" pn="section-toc.1-1.8.2.6.1"><xref derivedContent="8.6" format="counter" sectionFormat="of" target="section-8.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-operations">CPNP Operations</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.7">
                <t indent="0" pn="section-toc.1-1.8.2.7.1"><xref derivedContent="8.7" format="counter" sectionFormat="of" target="section-8.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-connectivity-provisioning-d">Connectivity Provisioning Documents</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.8">
                <t indent="0" pn="section-toc.1-1.8.2.8.1"><xref derivedContent="8.8" format="counter" sectionFormat="of" target="section-8.8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-child-pqos">Child PQOs</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.9">
                <t indent="0" pn="section-toc.1-1.8.2.9.1"><xref derivedContent="8.9" format="counter" sectionFormat="of" target="section-8.9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-multi-segment-service">Multi-Segment Service</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.10">
                <t indent="0" pn="section-toc.1-1.8.2.10.1"><xref derivedContent="8.10" format="counter" sectionFormat="of" target="section-8.10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-negotiating-with-multiple-c">Negotiating with Multiple CPNP Servers</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.11">
                <t indent="0" pn="section-toc.1-1.8.2.11.1"><xref derivedContent="8.11" format="counter" sectionFormat="of" target="section-8.11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-state-management">State Management</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2.11.2">
                  <li pn="section-toc.1-1.8.2.11.2.1">
                    <t indent="0" pn="section-toc.1-1.8.2.11.2.1.1"><xref derivedContent="8.11.1" format="counter" sectionFormat="of" target="section-8.11.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-on-the-client-side">On the Client Side</xref></t>
                  </li>
                  <li pn="section-toc.1-1.8.2.11.2.2">
                    <t indent="0" pn="section-toc.1-1.8.2.11.2.2.1"><xref derivedContent="8.11.2" format="counter" sectionFormat="of" target="section-8.11.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-on-the-server-side">On the Server Side</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-objects">CPNP Objects</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-attributes">Attributes</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2.1.2">
                  <li pn="section-toc.1-1.9.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.1.1"><xref derivedContent="9.1.1" format="counter" sectionFormat="of" target="section-9.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-customer_order_identifier">CUSTOMER_ORDER_IDENTIFIER</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.2.1"><xref derivedContent="9.1.2" format="counter" sectionFormat="of" target="section-9.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-provider_order_identifier">PROVIDER_ORDER_IDENTIFIER</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.3">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.3.1"><xref derivedContent="9.1.3" format="counter" sectionFormat="of" target="section-9.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-transaction_id">TRANSACTION_ID</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.4">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.4.1"><xref derivedContent="9.1.4" format="counter" sectionFormat="of" target="section-9.1.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-sequence_number">SEQUENCE_NUMBER</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.5">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.5.1"><xref derivedContent="9.1.5" format="counter" sectionFormat="of" target="section-9.1.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-nonce">NONCE</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.6">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.6.1"><xref derivedContent="9.1.6" format="counter" sectionFormat="of" target="section-9.1.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-expected_response_time">EXPECTED_RESPONSE_TIME</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.7">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.7.1"><xref derivedContent="9.1.7" format="counter" sectionFormat="of" target="section-9.1.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-expected_offer_time">EXPECTED_OFFER_TIME</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.8">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.8.1"><xref derivedContent="9.1.8" format="counter" sectionFormat="of" target="section-9.1.8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-validity_offer_time">VALIDITY_OFFER_TIME</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.9">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.9.1"><xref derivedContent="9.1.9" format="counter" sectionFormat="of" target="section-9.1.9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-service_description">SERVICE_DESCRIPTION</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.1.2.10">
                    <t indent="0" pn="section-toc.1-1.9.2.1.2.10.1"><xref derivedContent="9.1.10" format="counter" sectionFormat="of" target="section-9.1.10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-information-elements">CPNP Information Elements</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operation-messages">Operation Messages</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2.2.2">
                  <li pn="section-toc.1-1.9.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.1.1"><xref derivedContent="9.2.1" format="counter" sectionFormat="of" target="section-9.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-quotation">QUOTATION</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.2.1"><xref derivedContent="9.2.2" format="counter" sectionFormat="of" target="section-9.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-processing">PROCESSING</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.3.1"><xref derivedContent="9.2.3" format="counter" sectionFormat="of" target="section-9.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-offer">OFFER</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.4">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.4.1"><xref derivedContent="9.2.4" format="counter" sectionFormat="of" target="section-9.2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-accept">ACCEPT</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.5">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.5.1"><xref derivedContent="9.2.5" format="counter" sectionFormat="of" target="section-9.2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-decline">DECLINE</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.6">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.6.1"><xref derivedContent="9.2.6" format="counter" sectionFormat="of" target="section-9.2.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ack">ACK</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.7">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.7.1"><xref derivedContent="9.2.7" format="counter" sectionFormat="of" target="section-9.2.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cancel">CANCEL</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.8">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.8.1"><xref derivedContent="9.2.8" format="counter" sectionFormat="of" target="section-9.2.8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-withdraw">WITHDRAW</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.9">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.9.1"><xref derivedContent="9.2.9" format="counter" sectionFormat="of" target="section-9.2.9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-update">UPDATE</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.10">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.10.1"><xref derivedContent="9.2.10" format="counter" sectionFormat="of" target="section-9.2.10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-fail">FAIL</xref></t>
                  </li>
                  <li pn="section-toc.1-1.9.2.2.2.11">
                    <t indent="0" pn="section-toc.1-1.9.2.2.2.11.1"><xref derivedContent="9.2.11" format="counter" sectionFormat="of" target="section-9.2.11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-activate">ACTIVATE</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-message-validation">CPNP Message Validation</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.10.2">
              <li pn="section-toc.1-1.10.2.1">
                <t indent="0" pn="section-toc.1-1.10.2.1.1"><xref derivedContent="10.1" format="counter" sectionFormat="of" target="section-10.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-on-the-client-side-2">On the Client Side</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.2">
                <t indent="0" pn="section-toc.1-1.10.2.2.1"><xref derivedContent="10.2" format="counter" sectionFormat="of" target="section-10.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-on-the-server-side-2">On the Server Side</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="11" format="counter" sectionFormat="of" target="section-11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-theory-of-operation">Theory of Operation</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.11.2">
              <li pn="section-toc.1-1.11.2.1">
                <t indent="0" pn="section-toc.1-1.11.2.1.1"><xref derivedContent="11.1" format="counter" sectionFormat="of" target="section-11.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-client-behavior">Client Behavior</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.11.2.1.2">
                  <li pn="section-toc.1-1.11.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.11.2.1.2.1.1"><xref derivedContent="11.1.1" format="counter" sectionFormat="of" target="section-11.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-negotiation-cycle">Order Negotiation Cycle</xref></t>
                  </li>
                  <li pn="section-toc.1-1.11.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.11.2.1.2.2.1"><xref derivedContent="11.1.2" format="counter" sectionFormat="of" target="section-11.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-withdrawal-cycle">Order Withdrawal Cycle</xref></t>
                  </li>
                  <li pn="section-toc.1-1.11.2.1.2.3">
                    <t indent="0" pn="section-toc.1-1.11.2.1.2.3.1"><xref derivedContent="11.1.3" format="counter" sectionFormat="of" target="section-11.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-update-cycle">Order Update Cycle</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.11.2.2">
                <t indent="0" pn="section-toc.1-1.11.2.2.1"><xref derivedContent="11.2" format="counter" sectionFormat="of" target="section-11.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-server-behavior">Server Behavior</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.11.2.2.2">
                  <li pn="section-toc.1-1.11.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.11.2.2.2.1.1"><xref derivedContent="11.2.1" format="counter" sectionFormat="of" target="section-11.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-processing">Order Processing</xref></t>
                  </li>
                  <li pn="section-toc.1-1.11.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.11.2.2.2.2.1"><xref derivedContent="11.2.2" format="counter" sectionFormat="of" target="section-11.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-withdrawal">Order Withdrawal</xref></t>
                  </li>
                  <li pn="section-toc.1-1.11.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.11.2.2.2.3.1"><xref derivedContent="11.2.3" format="counter" sectionFormat="of" target="section-11.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-update">Order Update</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.11.2.3">
                <t indent="0" pn="section-toc.1-1.11.2.3.1"><xref derivedContent="11.3" format="counter" sectionFormat="of" target="section-11.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-sequence-numbers">Sequence Numbers</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.4">
                <t indent="0" pn="section-toc.1-1.11.2.4.1"><xref derivedContent="11.4" format="counter" sectionFormat="of" target="section-11.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-message-retransmission">Message Retransmission</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="12" format="counter" sectionFormat="of" target="section-12"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-some-operational-guidelines">Some Operational Guidelines</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.12.2">
              <li pn="section-toc.1-1.12.2.1">
                <t indent="0" pn="section-toc.1-1.12.2.1.1"><xref derivedContent="12.1" format="counter" sectionFormat="of" target="section-12.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-cpnp-server-logging">CPNP Server Logging</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.2">
                <t indent="0" pn="section-toc.1-1.12.2.2.1"><xref derivedContent="12.2" format="counter" sectionFormat="of" target="section-12.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-business-guidelines-and-obj">Business Guidelines and Objectives</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="13" format="counter" sectionFormat="of" target="section-13"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="14" format="counter" sectionFormat="of" target="section-14"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.15">
            <t indent="0" pn="section-toc.1-1.15.1"><xref derivedContent="15" format="counter" sectionFormat="of" target="section-15"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.15.2">
              <li pn="section-toc.1-1.15.2.1">
                <t indent="0" pn="section-toc.1-1.15.2.1.1"><xref derivedContent="15.1" format="counter" sectionFormat="of" target="section-15.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.15.2.2">
                <t indent="0" pn="section-toc.1-1.15.2.2.1"><xref derivedContent="15.2" format="counter" sectionFormat="of" target="section-15.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.16">
            <t indent="0" pn="section-toc.1-1.16.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.17">
            <t indent="0" pn="section-toc.1-1.17.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">This document defines the Connectivity Provisioning Negotiation
      Protocol (CPNP) that is meant to dynamically exchange and negotiate
      connectivity provisioning parameters and other service-specific
      parameters between a Customer and a Provider. CPNP is a tool that
      introduces automation to the service negotiation and activation
      procedures, thus fostering the overall service provisioning process.
      CPNP can be seen as a component of the dynamic negotiation metadomain
      described in <xref target="RFC7149" sectionFormat="of" section="2.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7149#section-2.4" derivedContent="RFC7149"/>.</t>
      <t indent="0" pn="section-1-2">CPNP is a generic protocol that can be used for negotiation
      purposes other than connectivity provisioning. For example, CPNP can be used
      to request extra storage resources, to extend the footprint of a 
      Content Delivery Network (CDN), to enable additional features from a cloud
      Provider, etc. CPNP can be extended with new Information Elements (IEs).
      Sample negotiation use cases are described in 
<xref target="suc" format="default" sectionFormat="of" derivedContent="Section 5"/>. <xref target="opm" format="default" sectionFormat="of" derivedContent="Section 4"/> introduces several
      order processing models and defines those that are targeted by CPNP.
      The CPNP negotiation model is then detailed in <xref target="cnm" format="default" sectionFormat="of" derivedContent="Section 7"/>.</t>
      <t indent="0" pn="section-1-3"><xref target="RFC7297" format="default" sectionFormat="of" derivedContent="RFC7297"/> describes a Connectivity Provisioning
      Profile (CPP) template to capture connectivity requirements to be met by
      a transport infrastructure for the delivery of various services such as
      Voice over IP (VoIP), IPTV, and Virtual Private Network (VPN) services
      <xref target="RFC4026" format="default" sectionFormat="of" derivedContent="RFC4026"/>. The CPP document defines the set of IP
      transfer parameters that reflect the guarantees that can be provided by
      the underlying transport network together with reachability scope and
      capacity needs. CPNP uses the CPP template to encode connectivity
      provisioning clauses that are subject to negotiation. The accepted CPP
      will then be passed to other functional elements that are responsible
      for the actual service activation and provisioning. For example, 
      Network Configuration Protocol (NETCONF)
      <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> or RESTCONF 
      <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/> can be used to activate adequate network
      features that are required to deliver the accepted service. How the
      outcome of CPNP negotiation is translated into service and network
      provisioning actions is out of scope of this document.</t>
      <t indent="0" pn="section-1-4">As a reminder, several proposals have been made in the past by the
      (research) community (e.g., Common Open Policy Service protocol for 
      supporting Service Level Specification <xref target="I-D.nguyen-rap-cops-sls" format="default" sectionFormat="of" derivedContent="COPS-SLS"/>, Service Negotiation Protocol
      <xref target="SrNP" format="default" sectionFormat="of" derivedContent="SrNP"/>, Dynamic Service Negotiation
      Protocol <xref target="I-D.itsumo-dsnp" format="default" sectionFormat="of" derivedContent="DSNP"/>, Resource
      Negotiation and Pricing Protocol <xref target="RNAP" format="default" sectionFormat="of" derivedContent="RNAP"/>,
      Service Negotiation and Acquisition Protocol <xref target="SNAP" format="default" sectionFormat="of" derivedContent="SNAP"/>). 
      CPNP leverages the authors' experience
      with SrNP by separating the negotiation primitives from the service
      under negotiation. Moreover, careful examination of the other proposals
      revealed certain deficiencies that were easier to address through the
      creation of a new protocol rather than the modification of existing protocols. For
      example:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-1-5">
        <li pn="section-1-5.1">COPS-SLS relies upon the COPS usage for policy provisioning (COPS-PR) <xref target="RFC3084" format="default" sectionFormat="of" derivedContent="RFC3084"/>,
          which is a Historic RFC.</li>
        <li pn="section-1-5.2">DSNP is tightly designed with one specific service in mind (QoS)
          and does not make any distinction between a quotation phase and the
          actual service-ordering phase.</li>
      </ul>
      <t indent="0" pn="section-1-6">One of the primary motivations of this document is to provide a
      permanent reference to exemplify how service negotiation can be
      automated.</t>
      <t indent="0" pn="section-1-7">Implementation details are out of scope. An example of required
      modules and interfaces to implement this specification is sketched in
      Section 4 of <xref target="AGAVE" format="default" sectionFormat="of" derivedContent="AGAVE"/>. This specification builds on
      that effort.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-2-1">This document makes use of the following terms:</t>
      <dl newline="false" spacing="normal" indent="3" pn="section-2-2">
        <dt pn="section-2-2.1">Customer:</dt>
        <dd pn="section-2-2.2">
          <t indent="0" pn="section-2-2.2.1">Is a business role that denotes an entity
          that is involved in the definition and the possible negotiation of
          an order, including a Connectivity Provisioning Agreement, with a
          Provider. A connectivity provisioning document is captured in a
          dedicated CPP template-based document, which may specify (among
          other information) the sites to be connected, border nodes,
          outsourced operations (e.g., routing, traffic steering). </t>
          <t indent="0" pn="section-2-2.2.2">The right to invoke the subscribed service may be
          delegated by the Customer to third-party end users or brokering
          services.</t>
          <t indent="0" pn="section-2-2.2.3">A Customer can be a Service
          Provider, an application owner, an enterprise, a user, etc.</t>
        </dd>
        <dt pn="section-2-2.3">Network Provider (or Provider):</dt>
        <dd pn="section-2-2.4">
          <t indent="0" pn="section-2-2.4.1">Owns and administers
          one or many transport domain(s) (typically Autonomous Systems (ASes))
          composed of (IP) switching and transmission resources (e.g.,
          routing, switching, forwarding, etc.). Network Providers are
          responsible for delivering and operating connectivity services
          (e.g., offering global or restricted reachability at specific
          rates). Offered connectivity services may not necessarily be
          restricted to IP. </t>
          <t indent="0" pn="section-2-2.4.2">The policies to be
          enforced by the connectivity service delivery components can be
          derived from the technology-specific clauses that might be included
          in agreements with the Customers. If no such clauses are included in
          the agreement, the mapping between the connectivity requirements and
          the underlying technology-specific policies to be enforced is
          deployment specific.</t>
        </dd>
        <dt pn="section-2-2.5">Quotation Order:</dt>
        <dd pn="section-2-2.6">Denotes a request made by the
          Customer to the Provider that includes a set of requirements. The
          Customer may express its service-specific requirements by assigning
          (strictly or loosely defined) values to the information items
          included in the commonly understood template (e.g., CPP template)
          describing the offered service. These requirements constitute the
          parameters to be mutually agreed upon.</dd>
        <dt pn="section-2-2.7">Offer:</dt>
        <dd pn="section-2-2.8">
          <t indent="0" pn="section-2-2.8.1">Refers to a response made by the Provider to a
          Customer's quotation order that describes the ability of the
          Provider to satisfy the order at the time of its receipt. Offers
          reflect the capability of the Provider in accommodating received
          Customer orders beyond monolithic 'yes/no' answers.
          </t>
          <t indent="0" pn="section-2-2.8.2">An offer may fully or partially meet the
          requirements of the corresponding order. In the latter case, it may
          include alternative suggestions that the Customer may take into
          account by issuing a new order.</t>
        </dd>
        <dt pn="section-2-2.9">Agreement:</dt>
        <dd pn="section-2-2.10">Refers to an order placed by the Customer
          and accepted by the Provider. It signals the successful conclusion
          of a negotiation cycle.</dd>
      </dl>
    </section>
    <section anchor="fe" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-cpnp-functional-elements">CPNP Functional Elements</name>
      <t indent="0" pn="section-3-1">The following functional elements are defined:</t>
      <dl newline="false" spacing="normal" indent="3" pn="section-3-2">
        <dt pn="section-3-2.1">CPNP client (or client): </dt>
        <dd pn="section-3-2.2">
          <t indent="0" pn="section-3-2.2.1">Denotes a software instance
          that sends CPNP requests and receives CPNP responses. The current
          operations that can be performed by a CPNP client are listed
          below:</t>
          <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-3-2.2.2">
            <li pn="section-3-2.2.2.1" derivedCounter="1.">Create a quotation order (<xref target="provision" format="default" sectionFormat="of" derivedContent="Section 9.2.1"/>).</li>
            <li pn="section-3-2.2.2.2" derivedCounter="2.">Cancel an ongoing quotation order under negotiation (<xref target="cancel" format="default" sectionFormat="of" derivedContent="Section 9.2.7"/>).</li>
            <li pn="section-3-2.2.2.3" derivedCounter="3.">Accept an offer made by a server (<xref target="accept" format="default" sectionFormat="of" derivedContent="Section 9.2.4"/>).</li>
            <li pn="section-3-2.2.2.4" derivedCounter="4.">Withdraw an agreement (<xref target="with" format="default" sectionFormat="of" derivedContent="Section 9.2.8"/>).</li>
            <li pn="section-3-2.2.2.5" derivedCounter="5.">Update an agreement (<xref target="upd" format="default" sectionFormat="of" derivedContent="Section 9.2.9"/>).</li>
          </ol>
        </dd>
        <dt pn="section-3-2.3">CPNP server (or server):</dt>
        <dd pn="section-3-2.4">
          <t indent="0" pn="section-3-2.4.1">Denotes a software instance
          that receives CPNP requests and sends back CPNP responses
          accordingly. The CPNP server is responsible for the following
          operations:</t>
          <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-3-2.4.2">
            <li pn="section-3-2.4.2.1" derivedCounter="1.">Process a quotation order (<xref target="proc" format="default" sectionFormat="of" derivedContent="Section 9.2.2"/>).</li>
            <li pn="section-3-2.4.2.2" derivedCounter="2.">Make an offer (<xref target="offer" format="default" sectionFormat="of" derivedContent="Section 9.2.3"/>).</li>
            <li pn="section-3-2.4.2.3" derivedCounter="3.">Cancel an ongoing quotation order (<xref target="sordu" format="default" sectionFormat="of" derivedContent="Section 11.2.3"/>).</li>
            <li pn="section-3-2.4.2.4" derivedCounter="4.">Process an order withdrawal (<xref target="sordu" format="default" sectionFormat="of" derivedContent="Section 11.2.3"/>).</li>
          </ol>
        </dd>
      </dl>
    </section>
    <section anchor="opm" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-order-processing-models">Order Processing Models</name>
      <t indent="0" pn="section-4-1">For preparing their service orders, Customers may need to be aware of
      the offered services. Therefore, Providers should first proceed with the
      announcement (or the exposure) of the services they can provide. The
      service announcement process may take place at designated global or
      Provider-specific service markets or through explicit interactions with
      the Providers. The details of this process are outside the scope of this
      document.</t>
      <t indent="0" pn="section-4-2">With or without such service announcement/exposure mechanisms in
      place, the following order processing models can be distinguished:</t>
      <dl newline="true" spacing="normal" indent="3" pn="section-4-3">
        <dt pn="section-4-3.1">Frozen model:</dt>
        <dd pn="section-4-3.2">The Customer
          cannot actually negotiate the parameters of the service(s) offered
          by a Provider. After consulting the Provider's service portfolio,
          the Customer selects the service offer to which he or she wants to subscribe and
          places an order to the Provider. Order handling is quite simple on
          the Provider side because the service is not customized per
          Customer's requirements, but rather designed to address a
          Customer base that shares the same requirements (i.e., these
          Customers share the same Connectivity Provisioning Profile). This mode
          can be implemented using existing tools such as <xref target="RFC8309" format="default" sectionFormat="of" derivedContent="RFC8309"/>.</dd>
        <dt pn="section-4-3.3">Negotiation-based model:</dt>
        <dd pn="section-4-3.4">Unlike the frozen model, the Customer documents
          his/her requirements in a request for a quotation, which is then
          sent to one or several Providers. Solicited Providers check whether
          they can address these requirements or not, and get back to the
          Customer accordingly, possibly with an offer that may not exactly
          match the Customer's requirements (e.g., a 100 Mbps connection cannot be
          provisioned given the amount of available resources, but an 80 Mbps
          connection can be provided). A negotiation between the Customer and
          the Provider(s) then follows until both parties reach an agreement
          (or do not).</dd>
      </dl>
      <t indent="0" pn="section-4-4">Both frozen and negotiation-based models require the existence of
      appropriate service templates like a CPP template and their
      instantiation for expressing specific offerings from Providers and
      service requirements from Customers, respectively. CPNP can be used in
      either model for automating the required Customer-Provider interactions.
      The frozen model can be seen as a special case of the negotiation-based
      model. This document focuses on the negotiation-based model. Not only
      'yes/no' answers but also counterproposals may be offered
      by the Provider in response to Customer orders.</t>
      <t indent="0" pn="section-4-5">Order processing management on the Network Provider's side usually
      solicits features supported by the following functional blocks: </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4-6">
        <li pn="section-4-6.1">Network provisioning (including order activation, Network
          Planning, etc.)</li>
        <li pn="section-4-6.2">Authentication, authorization, and accounting (AAA)</li>
        <li pn="section-4-6.3">Network and service management (performance measurement and
          assessment, fault detection, etc.)</li>
        <li pn="section-4-6.4">Sales-related functional blocks (e.g., billing, invoice
          validation)</li>
        <li pn="section-4-6.5">Network impact analysis</li>
      </ul>
      <t indent="0" pn="section-4-7">CPNP does not assume any specific knowledge about these functional
      blocks, drawing an explicit line between protocol operation and the
      logic for handling connectivity provisioning requests. An order
      processing logic is typically fed with the information manipulated by
      the aforementioned functional blocks. For example, the resources that
      can be allocated to accommodate the Customer's requirements may depend on
      network availability estimates as calculated by the planning functions
      and related policies, as well as the number of orders to be processed
      simultaneously over a given period of time.</t>
      <t indent="0" pn="section-4-8">This document does not elaborate on how Customers are identified and
      subsequently managed by the Provider's information system.</t>
    </section>
    <section anchor="suc" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-sample-use-cases">Sample Use Cases</name>
      <t indent="0" pn="section-5-1">A non-exhaustive list of CPNP use cases is provided below:</t>
      <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-5-2">
        <li pn="section-5-2.1" derivedCounter="1.">
          <t indent="0" pn="section-5-2.1.1"><xref target="RFC4176" format="default" sectionFormat="of" derivedContent="RFC4176"/> introduces the Layer 3 VPN (L3VPN)
          Service Order Management functional block, which is responsible for
          managing the requests initiated by the Customers and tracks the
          status of the completion of the related operations. CPNP can be used
          between the Customer and the Provider to negotiate L3VPN service
          parameters. </t>
          <t indent="0" pn="section-5-2.1.2">A CPNP server could therefore
          be part of the L3VPN Service Order Management functional block
          discussed in <xref target="RFC4176" format="default" sectionFormat="of" derivedContent="RFC4176"/>. A L3VPN Service YANG
          data model (L3SM) is defined in <xref target="RFC8299" format="default" sectionFormat="of" derivedContent="RFC8299"/>. Once
          an agreement is reached, the service can be provisioned using, e.g.,
          the L3VPN Network YANG data model specified in <xref target="I-D.ietf-opsawg-l3sm-l3nm" format="default" sectionFormat="of" derivedContent="L3VPN-NETWORK-YANG"/>.</t>
          <t indent="0" pn="section-5-2.1.3">Likewise, a CPNP server could be part of the Layer
          2 VPN (L2VPN) Service Order Management functional block. A YANG data
          model for L2VPN service delivery is defined in <xref target="RFC8466" format="default" sectionFormat="of" derivedContent="RFC8466"/>. Once an agreement is reached, the L2VPN
          service can be provisioned using, e.g., the L2VPN Network YANG data model
          specified in <xref target="I-D.ietf-opsawg-l2nm" format="default" sectionFormat="of" derivedContent="L2VPN-NETWORK-YANG"/>.</t>
        </li>
        <li pn="section-5-2.2" derivedCounter="2.">
          <t indent="0" pn="section-5-2.2.1">CPNP can be used between two adjacent domains to deliver IP
          interconnection services (e.g., enable, update, disconnect). For
          example, two Autonomous Systems (ASes) can be connected via several
          interconnection points. CPNP can be used between these ASes to
          upgrade existing links, request additional resources, provision a
          new interconnection point, etc. </t>
          <t indent="0" pn="section-5-2.2.2">See, for
          example, the framework documented in <xref target="ETICS" format="default" sectionFormat="of" derivedContent="ETICS"/>.</t>
        </li>
        <li pn="section-5-2.3" derivedCounter="3.">An integrated Provider can use CPNP to rationalize connectivity
          provisioning needs related to its service portfolio. A CPNP server
          function is used by network operations teams. A CPNP interface to
          trigger CPNP negotiation cycles is exposed to service management
          teams.</li>
        <li pn="section-5-2.4" derivedCounter="4.">
          <t indent="0" pn="section-5-2.4.1">Service Providers can use CPNP to initiate connectivity
          provisioning requests towards a number of Network Providers so as to
          optimize the cost of delivering their services. Although multiple
          CPNP ordering cycles can be initiated by a Service Provider towards
          multiple Network Providers, a subset of these orders may actually be
          put into effect.</t>
          <t indent="0" pn="section-5-2.4.2">For example, a cloud
          Service Provider can use CPNP to request more resources from Network
          Providers.</t>
        </li>
        <li pn="section-5-2.5" derivedCounter="5.">CPNP can also be used in the context of network slicing 
          <xref target="I-D.geng-netslices-architecture" format="default" sectionFormat="of" derivedContent="NETSLICES-ARCH"/> to request network
          resources together with a set of requirements that need to be
          satisfied by the Provider. Such requirements are not restricted to
          basic IP forwarding capabilities, but may also include a
          characterization of a set of service functions that may be invoked.
          For the network slicing case, the instances of a CPP template could
          be derived from the network slice template documented in
          <xref target="I-D.contreras-teas-slice-nbi" format="default" sectionFormat="of" derivedContent="TEAS-SLICE-NBI"/>.</li>
        <li pn="section-5-2.6" derivedCounter="6.">
          <t indent="0" pn="section-5-2.6.1">CPNP can be used in Machine-to-Machine (M2M) environments to
          dynamically subscribe to M2M services (e.g., access data
          retrieved by a set of sensors, extend sensor coverage, etc.).</t>
          <t indent="0" pn="section-5-2.6.2">Also, Internet of Things (IoT) <xref target="RFC6574" format="default" sectionFormat="of" derivedContent="RFC6574"/> 
          domains may rely on CPNP to enable dynamic
          access to data produced by involved objects, according to their
          specific policies, to various external stakeholders such as data
          analytics and business intelligence companies. Direct CPNP-based
          interactions between IoT domains and interested parties enable open
          access to diverse sets of data across the Internet, e.g., from
          multiple types of sensors, user groups, and/or geographical
          areas.</t>
        </li>
        <li pn="section-5-2.7" derivedCounter="7.">CPNP can be used in the context of Interface to Network Security Functions 
         (I2NSF) <xref target="RFC8329" format="default" sectionFormat="of" derivedContent="RFC8329"/> 
          to capture the Customer-driven policies to
          be enforced by a set of Network Security Functions.</li>
        <li pn="section-5-2.8" derivedCounter="8.">
          <t indent="0" pn="section-5-2.8.1">A Provider offering cloud services can expose a CPNP interface to
          allow Customers to dynamically negotiate typical data center
          resources, such as additional storage, processing and networking
          resources, enhanced security filters, etc.</t>
          <t indent="0" pn="section-5-2.8.2">Cloud computing Providers typically structure their
          computation service offerings by bundling CPU, RAM, and storage
          units as quotas, instances, or flavors that can be consumed in an
          ephemeral or temporal fashion during the lifetime of the required
          function. A similar approach is followed by CPNP (see for example,
          <xref target="activate" format="default" sectionFormat="of" derivedContent="Section 9.2.11"/>).</t>
        </li>
        <li pn="section-5-2.9" derivedCounter="9.">In the inter-cloud context (also called cloud of clouds or cloud
          federation), CPNP can be used to reserve computing and networking
          resources hosted by various cloud infrastructures.</li>
        <li pn="section-5-2.10" derivedCounter="10.">
          <t indent="0" pn="section-5-2.10.1">CDN Providers can use CPNP to extend their footprint by
          interconnecting their respective CDN infrastructures <xref target="RFC6770" format="default" sectionFormat="of" derivedContent="RFC6770"/> (see <xref target="cdni" format="default" sectionFormat="of" derivedContent="Figure 1"/>).</t>
          <figure anchor="cdni" align="left" suppress-title="false" pn="figure-1">
            <name slugifiedName="name-cdn-interconnection">CDN Interconnection</name>
            <artwork align="center" name="" type="" alt="" pn="section-5-2.10.2.1">
       ,--,--,--.             ,--,--,--.
    ,-'          `-.       ,-'          `-.
   (CDN Provider 'A')=====(CDN Provider 'B')
    `-.  (CDN-A) ,-'       `-. (CDN-B)  ,-'
      `--'--'--'             `--'--'--'
</artwork>
          </figure>
        </li>
        <li pn="section-5-2.11" derivedCounter="11.">
          <t indent="0" pn="section-5-2.11.1">Mapping Service Providers (MSPs) <xref target="RFC7215" format="default" sectionFormat="of" derivedContent="RFC7215"/>
          can use CPNP to enrich their mapping database by interconnecting
          their mapping system (see <xref target="map" format="default" sectionFormat="of" derivedContent="Figure 2"/>). This
          interconnection allows the relaxation of the constraints on PxTR (Proxy
          Ingress/Egress Tunnel Router) in favour of native LISP (Locator/ID
          Separation Protocol) forwarding <xref target="RFC6830" format="default" sectionFormat="of" derivedContent="RFC6830"/>.
          Also, it prevents the fragmentation of the LISP mapping database. A
          framework is described in <xref target="I-D.boucadair-lisp-idr-ms-discovery" format="default" sectionFormat="of" derivedContent="LISP-MS-DISCOVERY"/>.</t>
          <figure anchor="map" align="left" suppress-title="false" pn="figure-2">
            <name slugifiedName="name-lisp-mapping-system-interco">LISP Mapping System Interconnect</name>
            <artwork align="center" name="" type="" alt="" pn="section-5-2.11.2.1">
       ,--,--,--.             ,--,--,--.
    ,-'          `-.       ,-'          `-.
   (Mapping System 'A')===(Mapping System 'B')
    `-.          ,-'       `-.           ,-'
       `--'--'--'             `--'--'--'
</artwork>
          </figure>
        </li>
        <li pn="section-5-2.12" derivedCounter="12.">CPNP may also be used between SDN (Software-Defined Networking)
          controllers in contexts where Cooperating Layered Architecture for
          Software-Defined Networking (CLAS) is enabled <xref target="RFC8597" format="default" sectionFormat="of" derivedContent="RFC8597"/>.</li>
      </ol>
    </section>
    <section anchor="dm" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-cpnp-deployment-models">CPNP Deployment Models</name>
      <t indent="0" pn="section-6-1">Several CPNP deployment models can be envisaged. Two examples are
      listed below:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-2">
        <li pn="section-6-2.1">The Customer deploys a CPNP client while one or several CPNP
          servers are deployed by the Provider. A CPNP client can discover its
          CPNP servers using a variety of means (static, dynamic, etc.).</li>
        <li pn="section-6-2.2">The Customer does not enable any CPNP client. The Provider
          maintains a Customer Order Management portal. The Customer can
          initiate connectivity provisioning quotation orders via the portal;
          appropriate CPNP messages are then generated and sent to the
          relevant CPNP server. In this model, both the CPNP client and CPNP
          server are under the responsibility of the same administrative
          entity (i.e., Network Provider).</li>
      </ul>
      <t indent="0" pn="section-6-3">Once the negotiation of connectivity provisioning parameters is
      successfully concluded, that is, an order has been placed by the
      Customer, the actual network provisioning operations are initiated. The
      specification of related dynamic resource allocation and policy
      enforcement schemes, as well as how CPNP servers interact with the
      network provisioning functional blocks on the Provider side, are out of the
      scope of this document.</t>
      <t indent="0" pn="section-6-4">This document does not make any assumptions about the CPNP deployment
      model either.</t>
    </section>
    <section anchor="cnm" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-cpnp-negotiation-model">CPNP Negotiation Model</name>
      <t indent="0" pn="section-7-1">CPNP runs between a Customer and a Provider, carrying service orders
      from the Customer and corresponding responses from the Provider in 
      order to reach a service provisioning agreement. As the services
      offered by the Provider are well described, by means of the CPP template
      for connectivity matters, the negotiation process is essentially a
      value-settlement process, where an agreement is pursued on the values of
      the commonly understood information items (service parameters) included
      in the service description template (<xref target="service_template" format="default" sectionFormat="of" derivedContent="Section 9.1.9"/>).</t>
      <t indent="0" pn="section-7-2">The content that CPNP carries and the negotiation logic invoked 
      at Customer and Provider sides to manipulate the content (i.e., 
      the information carried in CPNP messages to proceed with the 
      negotiation) is transparent to the protocol. </t>
      <t indent="0" pn="section-7-3">The protocol aims to facilitate the execution of the negotiation
      logic by providing the required generic communication primitives.</t>
      <t indent="0" pn="section-7-4">Since negotiations are initiated and primarily driven by the
      Customer's negotiation logic, it is reasonable to assume that the
      Customer is the only party that can call for an agreement. An implicit
      approach is adopted for not overloading the protocol with additional
      messages. In particular, the acceptance of an offer made by the Provider
      signals a call for agreement from the Customer. Note that it is almost
      certain the Provider will accept this call since it refers to an offer
      that the Provider made. Of course, at any point the Provider or the Customer
      may quit the negotiations, each on its own grounds.</t>
      <t indent="0" pn="section-7-5">Based on the above, CPNP adopts a quotation order/offer/answer model,
      which proceeds through the following basic steps (<xref target="service_variants" format="default" sectionFormat="of" derivedContent="Figure 3"/>):</t>
      <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-7-6">
        <li pn="section-7-6.1" derivedCounter="1.">The CPNP client specifies its service requirements in a
          Provisioning Quotation Order (PQO). The order may include strictly or
          loosely defined values in the clauses describing service
          provisioning characteristics.</li>
        <li pn="section-7-6.2" derivedCounter="2.">The CPNP server declines the PQO, or makes an offer to address
          the requirements of the PQO, or suggests a counterproposal that
          partially addresses the requirements of the PQO in case specific
          requirements cannot be accommodated.</li>
        <li pn="section-7-6.3" derivedCounter="3.">The CPNP client either accepts or declines the offer. The acceptance 
          of the offer by the CPNP client implies a call for
	  agreement and, thus, the
          agreement between both parties and the conclusion of the
          negotiation.</li>
      </ol>
      <figure anchor="service_variants" align="left" suppress-title="false" pn="figure-3">
        <name slugifiedName="name-simplified-service-negotiat">Simplified Service Negotiation</name>
        <artwork align="center" name="" type="" alt="" pn="section-7-7.1">
+------+                     +------+ 
|Client|                     |Server| 
+------+                     +------+ 
   |=====Requested Service=====&gt;|  
   |&lt;=====Offered Service=======|  
   |=====Accepted Service======&gt;| 
</artwork>
      </figure>
      <t indent="0" pn="section-7-8">Multiple instances of CPNP may run at a Customer's or a Provider's
      domains. A CPNP client may be engaged in multiple, simultaneous
      negotiations with the same or different CPNP servers (parallel
      negotiations, see <xref target="mser" format="default" sectionFormat="of" derivedContent="Section 8.10"/>), and a CPNP server may
      need to negotiate with other Provider(s) as part of negotiations that
      are ongoing with a CPNP client (cascaded negotiations, see <xref target="cascaded" format="default" sectionFormat="of" derivedContent="Section 8.8"/>).</t>
      <t indent="0" pn="section-7-9">CPNP relies on various timers to run its operations. Two types of
      timers are defined: those that are specific to CPNP message transmission
      and those that are specific to the negotiation logic. The latter are
      used to guide the negotiation logic at both CPNP client and CPNP server
      sides, particularly in cases where the CPNP client is involved in
      parallel negotiations with several CPNP servers or in cases where the
      CPNP server is, in turn, involved in negotiations with other Providers for
      processing a given Customer-originated quotation order. CPNP allows a
      CPNP server to request extra time to proceed with the negotiation.
      This request may be accepted or rejected by the CPNP client.</t>
      <t indent="0" pn="section-7-10">Providers may need to publish available services to the Customers
      (see <xref target="opm" format="default" sectionFormat="of" derivedContent="Section 4"/>). CPNP may optionally support this
      functionality. Dedicated templates can be defined for the purpose of
      service announcement, which will be used by the CPNP clients to initiate
      their CPNP negotiation cycles.</t>
      <t indent="0" pn="section-7-11">For the sake of simplicity, a single offer/answer stage is assumed
      within one CPNP negotiation cycle. Nevertheless, as already stated,
      multiple CPNP negotiation cycles can be undertaken by a CPNP client (see
      <xref target="examples" format="default" sectionFormat="of" derivedContent="Figure 4"/>).</t>
      <t indent="0" pn="section-7-12">The model is flexible enough to accommodate changing conditions
      during the lifetime of a service (e.g., the introduction of an additional
      VPN site).</t>
      <figure anchor="examples" align="left" suppress-title="false" pn="figure-4">
        <name slugifiedName="name-overall-negotiation-process">Overall Negotiation Process</name>
        <artwork align="center" name="" type="" alt="" pn="section-7-13.1">
+------+                  +------+ +------+                  +------+
|Client|                  |Server| |Client|                  |Server|
+------+                  +------+ +------+                  +------+
   |=====Quotation Order=====&gt;|       |=====Quotation Order=====&gt;|
   |&lt;==========Offer==========|       |&lt;==========Offer==========|
   |===========Accept========&gt;|       |==========Decline========&gt;|

  1-Step Successful Negotiation         1-Step Failed Negotiation
            Cycle                               Cycle

+------+                  +------+ +------+                  +------+
|Client|                  |Server| |Client|                  |Server|
+------+                  +------+ +------+                  +------+
   |===Quotation Order(a)====&gt;|       |===Quotation Order(i)====&gt;|
   |&lt;==========Offer==========|       |&lt;==========Offer==========|   
   |==========Decline========&gt;|       |==========Decline========&gt;|
   |===Quotation Order(b)====&gt;|       |===Quotation Order(j)====&gt;|
   |&lt;==========Offer==========|       |&lt;==========Offer==========|   
   |===========Accept========&gt;|       |==========Decline========&gt;|
                                      |===Quotation Order(k)====&gt;|
                                      |&lt;==========Offer==========| 
                                      |==========Decline========&gt;|
                                      |===Quotation Order(l)====&gt;|
                                      |&lt;==Fail to make an offer==| 

    N-Step Negotiation Cycle:         N-Step Negotiation Cycle:
      Successful Negotiation              Failed Negotiation
</artwork>
      </figure>
      <t indent="0" pn="section-7-14">The means used by a CPNP client to retrieve a list of active/accepted
      offers are not defined in this document.</t>
      <t indent="0" pn="section-7-15">An order can be implicitly or explicitly activated. 
      <xref target="RFC7297" sectionFormat="of" section="3.11" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7297#section-3.11" derivedContent="RFC7297"/> specifies a dedicated clause called
      Activation Means. Such a clause indicates the required action(s) to be
      undertaken to activate access to the (IP connectivity) service. This
      document defines a dedicated CPNP message that can be used for explicit
      activation (<xref target="activate" format="default" sectionFormat="of" derivedContent="Section 9.2.11"/>).</t>
    </section>
    <section anchor="po" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-protocol-overview">Protocol Overview</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-8.1">
        <name slugifiedName="name-client-server-communication">Client/Server Communication</name>
        <t indent="0" pn="section-8.1-1">CPNP is a client/server protocol that can run over any transport
        protocol. The default transport mode is UDP secured with Datagram
        Transport Layer Security (DTLS) <xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/>. No
        permanent CPNP transport session needs to be maintained between the
        client and the server.</t>
        <t indent="0" pn="section-8.1-2">The CPNP client can be configured with the CPNP server(s).
        Typically, the CPNP client is configured with an IP address together 
        with a port number using manual or dynamic configuration means
        (e.g., DHCP). Alternatively, a Provider may advertise the port number
        (CPNP_PORT) it uses to bind the CPNP service using SRV <xref target="RFC2782" format="default" sectionFormat="of" derivedContent="RFC2782"/>.</t>
        <t indent="0" pn="section-8.1-3">The CPNP client may be provided with a domain name of the CPNP
        server for PKIX-based authentication purposes. CPNP servers should
        prefer the use of DNS-ID and SRV-ID over CN-ID identifier types in
        certificate requests (<xref target="RFC6125" sectionFormat="of" section="2.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6125#section-2.3" derivedContent="RFC6125"/>).
        URI-IDs should not be used for CPNP server identity verification.</t>
        <t indent="0" pn="section-8.1-4">The client sends CPNP requests using CPNP_PORT as the destination
        port number. The same port number used as the source port number of a
        CPNP request sent to a CPNP server is used by the server to reply to
        that request.</t>
        <t indent="0" pn="section-8.1-5">CPNP is independent of the IP address family.</t>
        <t indent="0" pn="section-8.1-6">CPNP retransmission for unreliable transports is discussed in 
        <xref target="retrans" format="default" sectionFormat="of" derivedContent="Section 11.4"/>.</t>
        <t indent="0" pn="section-8.1-7">Considerations related to mutual authentication are discussed in
        <xref target="Security" format="default" sectionFormat="of" derivedContent="Section 13"/>.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-8.2">
        <name slugifiedName="name-policy-configuration-on-the">Policy Configuration on the CPNP Server</name>
        <t indent="0" pn="section-8.2-1">As an input to its decision-making process, the CPNP server may be
        connected to various external modules such as Customer Profiles,
        Network Topology, Network Resource Management, Order Repositories,
        AAA, and Network Provisioning Manager (an example is shown in <xref target="fb" format="default" sectionFormat="of" derivedContent="Figure 5"/>).</t>
        <t indent="0" pn="section-8.2-2">These external modules provide inputs to the CPNP server so that
        it can do the following:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-8.2-3">
          <li pn="section-8.2-3.1">Check whether a Customer is entitled to initiate a provisioning
            quotation request.</li>
          <li pn="section-8.2-3.2">Check whether a Customer is entitled to cancel an ongoing
            order.</li>
          <li pn="section-8.2-3.3">Check whether administrative data (e.g., billing-related
            information) have been verified before the processing of the
            request starts.</li>
          <li pn="section-8.2-3.4">Check whether network capacity is available or additional
            capacity is required.</li>
          <li pn="section-8.2-3.5">Receive guidelines from network design and sales blocks (e.g.,
            pricing, network usage levels, thresholds associated with the
            number of CPP templates that can be processed over a given period
            of time as a function of the nature of the service to be
            delivered, etc.).</li>
          <li pn="section-8.2-3.6">Transfer completed orders to network provisioning blocks
            (referred to as "Network Provisioning Manager" in <xref target="fb" format="default" sectionFormat="of" derivedContent="Figure 5"/>). For example, the outcome of CPNP may be
            passed to modules such as Application-Based Network Operations
            (ABNO) <xref target="RFC7491" format="default" sectionFormat="of" derivedContent="RFC7491"/> or network controllers.
            These controllers will use protocols such as NETCONF <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> to interact with the appropriate network
            nodes and functions for the sake of proper service activation and
            delivery. </li>
        </ul>
        <t indent="0" pn="section-8.2-4">The above list of CPNP server operations is not
        exhaustive.</t>
        <figure anchor="fb" align="left" suppress-title="false" pn="figure-5">
          <name slugifiedName="name-order-handling-management-f">Order Handling Management Functional Block (Focus on Internal Interfaces)</name>
          <artwork align="center" name="" type="" alt="" pn="section-8.2-5.1">       . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
       .Business &amp; Administrative Management                   .      
       .+------------------------++---------------------------+.  
       .| Business Guidelines    ||    Billing &amp; Charging     |.
       .+-----------+------------++-----------+---------------+.
       .            |                         |                .
       .            +-------------------+     |                .
       . . . . . . . . . . . . . . . . .|. . .|. . . . . . . . .
       . . . . . . . . . . . . . . . . .|. . .|. . . . . . . . .
       .Order Handling Management       |     |                .
       . +-------------------+  +-------+-----+--------------+ .
       . |Network Topology DB+--+        CPNP Server         | .
       . +-------------------+  +-+---+---+---+---+-----+----+ . 
       .                          |   |   |   |   |     |      .
       . +------------------------+-+ |   |   |   |     |      .
       . |   Network Dimensioning   | |   |   |   |     |      .
       . |        &amp; Planning        | |   |   |   |     |      .
       . +--------------------------+ |   |   |   |     |      .
       . +----------------------------+-+ |   |   | +---+----+ .
       . |                              | |   |   | |   AAA  | .
       . |   Network       +------------+ |   |   | +--------+ .
       . |  Resource       | +------------+-+ | +-+----------+ .
       . |  Management     | |   Customer   | | |   Orders   | .
       . |                 | |   Profiles   | | | Repository | .
       . +-----------------+ +--------------+ | +------------+ .
       . . . . . . . . . . . . . . . . . . . .|. . . . . . . . .
       +--------------------------------------+----------------+
       |             Network Provisioning Manager              |   
       +-------------------------------------------------------+   
</artwork>
        </figure>
        <t indent="0" pn="section-8.2-6">The following order-handling modes can also be configured on the
        server:</t>
        <dl spacing="normal" indent="3" newline="false" pn="section-8.2-7">
          <dt pn="section-8.2-7.1">Fully automated mode:</dt>
          <dd pn="section-8.2-7.2">This mode does not require any action
            from the administrator when receiving a request for a service. The
            server can execute its decision-making process related to the
            orders received and can generate corresponding offers.</dd>
          <dt pn="section-8.2-7.3">Administrative validation checking:</dt>
          <dd pn="section-8.2-7.4">Some or all of the server's
            operations are subject to administrative validation procedures.
            This mode requires an action from the administrator for every
            request received. To that aim, the CPNP methods that can be
            automatically handled by the server (or are subject to one or
            several validation administrative checks) can be configured on the
            server.</dd>
        </dl>
      </section>
      <section anchor="session" numbered="true" toc="include" removeInRFC="false" pn="section-8.3">
        <name slugifiedName="name-cpnp-session-entries">CPNP Session Entries</name>
        <t indent="0" pn="section-8.3-1">A CPNP session entry is represented by a tuple defined as follows:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-8.3-2">
          <li pn="section-8.3-2.1">Transport session (typically, the IP address of the CPNP client,
            the client's port number, the IP address of the CPNP server, and the CPNP
            server's port number).</li>
          <li pn="section-8.3-2.2">Incremented sequence number (<xref target="sq_nu" format="default" sectionFormat="of" derivedContent="Section 11.3"/>).</li>
          <li pn="section-8.3-2.3">Customer agreement identifier: This is a unique identifier
            assigned to the order under negotiation by the CPNP client (<xref target="cu_id" format="default" sectionFormat="of" derivedContent="Section 9.1.1"/>). This identifier is also used by the
            client to identify the agreement that will result from a
            successful negotiation.</li>
          <li pn="section-8.3-2.4">Provider agreement identifier: This is a unique identifier
            assigned to the order under negotiation by the CPNP server (<xref target="pr_id" format="default" sectionFormat="of" derivedContent="Section 9.1.2"/>). This identifier is also used by the
            server to identify the agreement that will result from a
            successful negotiation.</li>
          <li pn="section-8.3-2.5">Transaction-ID (<xref target="trans" format="default" sectionFormat="of" derivedContent="Section 8.4"/>).</li>
        </ul>
      </section>
      <section anchor="trans" numbered="true" toc="include" removeInRFC="false" pn="section-8.4">
        <name slugifiedName="name-cpnp-transactions">CPNP Transactions</name>
        <t indent="0" pn="section-8.4-1">A CPNP transaction occurs between a client and a server for
        completing, modifying, or withdrawing a service agreement, and comprises
        all CPNP messages exchanged between the client and the server, from
        the first request sent by the client to the final response sent by the
        server. A CPNP transaction is bound to a CPNP session (<xref target="session" format="default" sectionFormat="of" derivedContent="Section 8.3"/>).</t>
        <t indent="0" pn="section-8.4-2">Because multiple CPNP transactions can be maintained by the CPNP
        client, the client must assign an identifier to uniquely identify a
        given transaction. This identifier is the Transaction-ID.</t>
        <t indent="0" pn="section-8.4-3">The Transaction-ID must be randomly assigned by the CPNP client,
        according to the best current practice for generating random numbers
        <xref target="RFC4086" format="default" sectionFormat="of" derivedContent="RFC4086"/> that cannot be guessed easily.
        The Transaction-ID is used for validating CPNP responses received by the
        client.</t>
        <t indent="0" pn="section-8.4-4">In the context of a transaction, the client needs to 
        select a sequence number randomly and then needs to assign it to the first CPNP message to
        send. This number is then incremented for each request message that is
        subsequently sent within the ongoing CPNP transaction (see <xref target="sq_nu" format="default" sectionFormat="of" derivedContent="Section 11.3"/>).</t>
      </section>
      <section anchor="timers" numbered="true" toc="include" removeInRFC="false" pn="section-8.5">
        <name slugifiedName="name-cpnp-timers">CPNP Timers</name>
        <t indent="0" pn="section-8.5-1">CPNP adopts a simple retransmission procedure that relies on a
        retransmission timer represented by RETRANS_TIMER and a maximum retry
        threshold. The use of RETRANS_TIMER and a maximum retry threshold are
        described in <xref target="behavior" format="default" sectionFormat="of" derivedContent="Section 11"/>.</t>
        <t indent="0" pn="section-8.5-2">The response timer (EXPECTED_RESPONSE_TIME) is set by the client to
        denote the time, in seconds, the client will wait to receive a
        response from the server to a PQO request
        (see <xref target="extime" format="default" sectionFormat="of" derivedContent="Section 9.1.6"/>). If the timer expires, the
        respective PQO is cancelled by the client, and a CANCEL
        message is generated accordingly.</t>
        <t indent="0" pn="section-8.5-3">The expected offer timer (EXPECTED_OFFER_TIME) is set by the server
        to indicate the time by when the CPNP server is expected to make an
        offer to the CPNP client (see <xref target="EXPECTED_OFFER_TIME" format="default" sectionFormat="of" derivedContent="Section 9.1.7"/>). If no offer is received by
        then, the CPNP client will consider the order as rejected.</t>
        <t indent="0" pn="section-8.5-4">An offer expiration timer (VALIDITY_OFFER_TIME) is set by the
        server to represent the time, in minutes, after which an offer made by
        the server becomes invalid (see <xref target="valtime" format="default" sectionFormat="of" derivedContent="Section 9.1.8"/>).</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-8.6">
        <name slugifiedName="name-cpnp-operations">CPNP Operations</name>
        <t indent="0" pn="section-8.6-1">CPNP operations are listed below. They may be augmented depending
        on the nature of some transactions or because of security
        considerations that may necessitate a distinct CPNP client/server
        authentication phase before negotiation begins. </t>
        <dl spacing="normal" newline="true" indent="3" pn="section-8.6-2">
          <dt pn="section-8.6-2.1">QUOTATION (<xref target="provision" format="default" sectionFormat="of" derivedContent="Section 9.2.1"/>): </dt>
          <dd pn="section-8.6-2.2">This operation is used by the client to initiate
            a PQO. Upon receipt of a QUOTATION
            request, the server may respond with a PROCESSING, OFFER, or a FAIL
            message. A QUOTATION-initiated transaction can be terminated by a
            FAIL message.</dd>
          <dt pn="section-8.6-2.3">PROCESSING (<xref target="proc" format="default" sectionFormat="of" derivedContent="Section 9.2.2"/>): </dt>
          <dd pn="section-8.6-2.4">This operation is used to inform the remote party
            that its message (the order quotation or the offer) was
            received and it is being processed. This message can also be issued by
            the server to request more time, in which case, the client may
            reply with an ACK or FAIL message depending on whether extra time
            can or cannot be granted.</dd>
          <dt pn="section-8.6-2.5">OFFER (<xref target="offer" format="default" sectionFormat="of" derivedContent="Section 9.2.3"/>): </dt>
          <dd pn="section-8.6-2.6">This operation is used by the server to inform
            the client about an offer that can best accommodate the
            requirements indicated in the previously received QUOTATION
            message.</dd>
          <dt pn="section-8.6-2.7">ACCEPT (<xref target="accept" format="default" sectionFormat="of" derivedContent="Section 9.2.4"/>): </dt>
          <dd pn="section-8.6-2.8">This operation is used by the client to confirm
            the acceptance of an offer made by the server. This message
            implies a call for agreement. An agreement is reached when an ACK
            is subsequently received from the server, which is likely to
            happen if the message is sent before the offer validity time
            expires; the server is unlikely to reject an offer that it has
            already made.</dd>
          <dt pn="section-8.6-2.9">DECLINE (<xref target="dec" format="default" sectionFormat="of" derivedContent="Section 9.2.5"/>): </dt>
          <dd pn="section-8.6-2.10">This operation is used by the client to reject an
            offer made by the server. The ongoing transaction may not be
            terminated immediately, e.g., the client may issue another order
            or the server may issue another offer.</dd>
          <dt pn="section-8.6-2.11">ACK (<xref target="ack" format="default" sectionFormat="of" derivedContent="Section 9.2.6"/>): </dt>
          <dd pn="section-8.6-2.12">This
            operation is used by the server to acknowledge the receipt of an
            ACCEPT or WITHDRAW message or by the client to confirm the server's 
            request for a time extension (conveyed in a PROCESSING message) 
            in order to process the last received quotation order.</dd>
          <dt pn="section-8.6-2.13">CANCEL (<xref target="cancel" format="default" sectionFormat="of" derivedContent="Section 9.2.7"/>): </dt>
          <dd pn="section-8.6-2.14">This operation is used by the client to cancel
            (quit) the ongoing transaction.</dd>
          <dt pn="section-8.6-2.15">WITHDRAW (<xref target="with" format="default" sectionFormat="of" derivedContent="Section 9.2.8"/>): </dt>
          <dd pn="section-8.6-2.16">This operation is used by the client to withdraw
            a completed order (i.e., an agreement).</dd>
          <dt pn="section-8.6-2.17">UPDATE (<xref target="upd" format="default" sectionFormat="of" derivedContent="Section 9.2.9"/>): </dt>
          <dd pn="section-8.6-2.18">This operation is used by the client to update an
            existing agreement. For example, this method can be invoked to add
            a new VPN site. This method will trigger a new negotiation
            cycle.</dd>
          <dt pn="section-8.6-2.19">FAIL (<xref target="fail" format="default" sectionFormat="of" derivedContent="Section 9.2.10"/>): </dt>
          <dd pn="section-8.6-2.20">
            <t indent="0" pn="section-8.6-2.20.1">This operation is used by the server to indicate
            that it cannot accommodate the requirements documented in the PQO
            conveyed in the QUOTATION message or to inform the client about an
            error encountered when processing the received message. In either
            case, the message implies that the server is unable to make offers,
            and, as a consequence, it terminates the ongoing transaction.
            </t>
            <t indent="0" pn="section-8.6-2.20.2">This message is also used by the client
            to reject a time extension request in a PROCESSING message received 
            from the server. The message includes a status code that 
            provides explanatory information.</t>
          </dd>
        </dl>
        <t indent="0" pn="section-8.6-3">The above CPNP primitives are service independent. CPNP messages
        may transparently carry service-specific objects that are handled by
        the negotiation logic at either side.</t>
        <t indent="0" pn="section-8.6-4">The document defines the service objects that are required for
        connectivity provisioning negotiation purposes 
        (see <xref target="cpd" format="default" sectionFormat="of" derivedContent="Section 8.7"/>). 
        Additional service-specific objects for CPNP messages to accommodate alternative
        deployment schemes or other service provisioning needs can be 
        defined in the future.</t>
      </section>
      <section anchor="cpd" numbered="true" toc="include" removeInRFC="false" pn="section-8.7">
        <name slugifiedName="name-connectivity-provisioning-d">Connectivity Provisioning Documents</name>
        <t indent="0" pn="section-8.7-1">CPNP makes use of several flavors of Connectivity Provisioning
        Documents (CPD). These documents follow the same CPP template
        described in <xref target="RFC7297" format="default" sectionFormat="of" derivedContent="RFC7297"/>.</t>
        <dl newline="true" spacing="normal" indent="3" pn="section-8.7-2">
          <dt pn="section-8.7-2.1">Requested CPD: </dt>
          <dd pn="section-8.7-2.2">Refers
            to the CPD included by a CPNP client in a QUOTATION request.</dd>
          <dt pn="section-8.7-2.3">Offered CPD: </dt>
          <dd pn="section-8.7-2.4">This
            document is included by a CPNP server in an OFFER message. Its
            information reflects the proposal of the server to accommodate all
            or a subset of the clauses depicted in a Requested CPD. A validity
            time is associated with the offer made.</dd>
          <dt pn="section-8.7-2.5">Accepted CPD: </dt>
          <dd pn="section-8.7-2.6">If
            the client accepts an offer made by the server, the Offered CPD is
            included in an ACCEPT message. This CPD is also included in an ACK
            message. Thus, a three-way handshake procedure is followed for
            successfully completing the negotiation.</dd>
        </dl>
        <t indent="0" pn="section-8.7-3"><xref target="example" format="default" sectionFormat="of" derivedContent="Figure 6"/> shows a typical CPNP negotiation
        cycle and the use of the different types of CPDs.</t>
        <figure anchor="example" align="left" suppress-title="false" pn="figure-6">
          <name slugifiedName="name-connectivity-provisioning-do">Connectivity Provisioning Documents</name>
          <artwork align="center" name="" type="" alt="" pn="section-8.7-4.1">
+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |======QUOTATION (Requested CPD)=====&gt;|
   |&lt;============PROCESSING==============|
   |&lt;========OFFER (Offered CPD)=========|
   |=============PROCESSING=============&gt;|
   |=======ACCEPT (Accepted CPD)========&gt;|
   |&lt;=======ACK (Accepted CPD)===========|
   |                                     |
</artwork>
        </figure>
        <t indent="0" pn="section-8.7-5">A CPD can include parameters with fixed values,
        loosely defined values, or any combination thereof. A CPD 
        is said to be concrete if all clauses have fixed values.</t>
        <t indent="0" pn="section-8.7-6">A typical evolution of a negotiation cycle would start with a
        quotation order with loosely defined parameters, and then, as offers
        are made, it would conclude with a concrete CPD for
        calling for the agreement.</t>
      </section>
      <section anchor="cascaded" numbered="true" toc="include" removeInRFC="false" pn="section-8.8">
        <name slugifiedName="name-child-pqos">Child PQOs</name>
        <t indent="0" pn="section-8.8-1">If the server detects that network resources from another Network
        Provider need to be allocated in order to accommodate the requirements
        described in a PQO (e.g., in the context of an inter-domain VPN
        service, additional Provider Edge (PE) router resources need to be allocated), the
        server may generate child PQOs to request the appropriate network
        provisioning operations (see <xref target="child" format="default" sectionFormat="of" derivedContent="Figure 7"/>). In such a
        situation, the server also behaves as a CPNP client. The server
        associates the parent order with its child PQOs. How this is achieved
        is implementation specific (e.g., this can be typically achieved by
        locally adding the reference of the child PQO to the parent
        order).</t>
        <figure anchor="child" align="left" suppress-title="false" pn="figure-7">
          <name slugifiedName="name-example-of-child-orders">Example of Child Orders</name>
          <artwork align="center" name="" type="" alt="" pn="section-8.8-2.1">
+------+            +--------+          +--------+
|Client|            |Server A|          |Server B|
+------+            +--------+          +--------+
   |                    |                    |
   |=====QUOTATION=====&gt;|                    |
   |&lt;====PROCESSING=====|                    |
   |                    |=====QUOTATION=====&gt;|
   |                    |&lt;====PROCESSING=====|
   |                    |&lt;=======OFFER=======|
   |                    |=====PROCESSING====&gt;|
   |                    |=======ACCEPT======&gt;|
   |                    |&lt;=======ACK=========|
   |&lt;=======OFFER=======|                    |
   |=====PROCESSING====&gt;|                    |
   |=======ACCEPT======&gt;|                    |
   |&lt;=======ACK=========|                    |
   |                    |                    |
</artwork>
        </figure>
        <t indent="0" pn="section-8.8-3">Note that the server must not activate recursion for an
        order if the client includes a negotiation option to restrict the
        negotiation scope to the resources of the server's domain (<xref target="nego" format="default" sectionFormat="of" derivedContent="Section 9.1.10.3"/>).</t>
        <t indent="0" pn="section-8.8-4">If recursion is not explicitly disabled, the server may notify the
        client when appropriate (<xref target="proc" format="default" sectionFormat="of" derivedContent="Section 9.2.2"/>). Such
        notification may depend on the nature of the service and also
        regulatory considerations.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-8.9">
        <name slugifiedName="name-multi-segment-service">Multi-Segment Service</name>
        <t indent="0" pn="section-8.9-1">A composite service (e.g., connectivity) requested by a Customer
        could imply multi-segment services (e.g., multi-segment connectivity
        spanning an end-to-end scope), in the sense that one single CPNP
        request is decomposed into multiple connectivity requests on the Provider's
        side (thereby leading to child orders). The Provider is in charge of
        handling the complexity of splitting the generic provisioning order in
        a multi-segment context. Such complexity is local to the Provider.</t>
      </section>
      <section anchor="mser" numbered="true" toc="include" removeInRFC="false" pn="section-8.10">
        <name slugifiedName="name-negotiating-with-multiple-c">Negotiating with Multiple CPNP Servers</name>
        <t indent="0" pn="section-8.10-1">A CPNP client may undertake multiple negotiations in parallel with
        several servers for various reasons, such as cost optimization and
        fail-safety. These multiple negotiations may lead to one or many
        agreements.</t>
        <t indent="0" pn="section-8.10-2">The salient point underlining the parallel negotiation scenarios is
        that, although the negotiation protocol is strictly between two
        parties, this may not be the case of the negotiation logic. The CPNP
        client negotiation logic may need to collectively drive parallel
        negotiations, as the negotiation with one server may affect the
        negotiation with other servers; for example, it may need to use the
        responses from all servers as an input for determining the messages
        (and their content) to subsequently send within the course of each
        individual negotiation. Therefore, timing is an important aspect on the
        client's side. The CPNP client needs to have the ability to
        synchronize the receipt of the responses from the servers. CPNP takes
        into account this requirement by allowing clients to specify in the
        QUOTATION message the time by which the server needs to respond (see
        <xref target="extime" format="default" sectionFormat="of" derivedContent="Section 9.1.6"/>).</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-8.11">
        <name slugifiedName="name-state-management">State Management</name>
        <t indent="0" pn="section-8.11-1">Both the client and the server maintain repositories to store
        ongoing orders. How these repositories are maintained is
        deployment specific. It is out of scope of this document to elaborate
        on such considerations. Timestamps are also logged to track state
        change. Tracking may be needed for various reasons, including
        regulatory or billing ones.</t>
        <t indent="0" pn="section-8.11-2">In order to accommodate failures that may lead to the reboot of the
        client or the server, the use of permanent storage is recommended,
        thereby facilitating state recovery. 
        </t>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-8.11.1">
          <name slugifiedName="name-on-the-client-side">On the Client Side</name>
          <t indent="0" pn="section-8.11.1-1">This is the list of the typical states that can be associated
          with a given order on the client's side:</t>
          <dl spacing="normal" indent="3" newline="false" pn="section-8.11.1-2">
            <dt pn="section-8.11.1-2.1">Created:</dt>
            <dd pn="section-8.11.1-2.2">The order has been created. It is not handled
              by the client until the administrator allows it to be processed.</dd>
            <dt pn="section-8.11.1-2.3">AwaitingProcessing:</dt>
            <dd pn="section-8.11.1-2.4">The administrator has approved the
              processing of a created order, but the order has not been handled
              yet.</dd>
            <dt pn="section-8.11.1-2.5">PQOSent:</dt>
            <dd pn="section-8.11.1-2.6"> The order has been sent to the server.</dd>
            <dt pn="section-8.11.1-2.7">ServerProcessing:</dt>
            <dd pn="section-8.11.1-2.8">The server has confirmed the receipt
              of the order.</dd>
            <dt pn="section-8.11.1-2.9">OfferReceived:</dt>
            <dd pn="section-8.11.1-2.10">An offer has been received from the
              server.</dd>
            <dt pn="section-8.11.1-2.11">OfferProcessing:</dt>
            <dd pn="section-8.11.1-2.12">A received offer is being processed
              by the client.</dd>
            <dt pn="section-8.11.1-2.13">AcceptSent:</dt>
            <dd pn="section-8.11.1-2.14">The client has confirmed the offer to the
              server.</dd>
            <dt pn="section-8.11.1-2.15">Completed:</dt>
            <dd pn="section-8.11.1-2.16">The offer has been acknowledged by the server.</dd>
            <dt pn="section-8.11.1-2.17">Cancelled:</dt>
            <dd pn="section-8.11.1-2.18">The order has failed or was cancelled.</dd>
          </dl>
          <t indent="0" pn="section-8.11.1-3">Sub-states may be defined (e.g., to track failed vs. cancelled
          orders), but those are not shown in <xref target="clientstate" format="default" sectionFormat="of" derivedContent="Figure 8"/>.</t>
          <figure anchor="clientstate" align="left" suppress-title="false" pn="figure-8">
            <name slugifiedName="name-example-of-a-cpnp-finite-st">Example of a CPNP Finite State Machine (Client Side)</name>
            <artwork align="center" name="" type="" alt="" pn="section-8.11.1-4.1">
+------------------+
|     Created      |-----------------+
+------------------+                 |
        |                            |
        v                            |
+------------------+                 |
|AwaitingProcessing|----------------+|
+------------------+                || 
        |                           ||
   QUOTATION/UPDATE                 ||
        v                           ||
+------------------+                ||
|     PQOSent      |---CANCEL------+||
+------------------+               vvv
        |                        +-----+
    PROCESSING                   |     |
        v                        |     |
+------------------+   CANCEL    |  C  |
| ServerProcessing |------------&gt;|  A  |
+------------------+    FAIL     |  N  |
        |                        |  C  |
        |                        |  E  | 
      OFFER                      |  L  |
        |                        |  L  |
        v                        |  E  |
+------------------+             |  D  |
|  OfferReceived   |---CANCEL---&gt;|     |
+------------------+             |     |
        | PROCESSING             +-----+
        v                          ^^^
+------------------+               |||
|  OfferProcessing |---DECLINE-----+||
+------------------+                ||
        | ACCEPT                    ||
        v                           ||
+------------------+                ||
|    AcceptSent    |---CANCEL-------+|
+------------------+                 |
        | ACK                        |
        v                            |
+------------------+                 |
|   Completed      |---WITHDRAW------+
+------------------+
</artwork>
          </figure>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-8.11.2">
          <name slugifiedName="name-on-the-server-side">On the Server Side</name>
          <t indent="0" pn="section-8.11.2-1">The following lists the states on the server's side that can be associated with a
          given order and a corresponding offer:</t>
          <dl spacing="normal" indent="3" newline="false" pn="section-8.11.2-2">
            <dt pn="section-8.11.2-2.1">PQOReceived:</dt>
            <dd pn="section-8.11.2-2.2">The order has been received from the
              client.</dd>
            <dt pn="section-8.11.2-2.3">AwaitingProcessing: </dt>
            <dd pn="section-8.11.2-2.4">The order is being processed by the
              server. An action from the server administrator may be
              needed.</dd>
            <dt pn="section-8.11.2-2.5">OfferProposed:</dt>
            <dd pn="section-8.11.2-2.6">The request has been successfully handled,
              and an offer has been sent to the client.</dd>
            <dt pn="section-8.11.2-2.7">ProcessingReceived:</dt>
            <dd pn="section-8.11.2-2.8">The server has received a PROCESSING message for
              an offer sent to the client.</dd>
            <dt pn="section-8.11.2-2.9">AcceptReceived:</dt>
            <dd pn="section-8.11.2-2.10">The server has received a confirmation for
              the offer from the client.</dd>
            <dt pn="section-8.11.2-2.11">Completed:</dt>
            <dd pn="section-8.11.2-2.12">The server has acknowledged the offer (accepted
              by client) to the client. Transitioning to this state assumes
              that the ACK was received by the client (this can be detected by
              the server if it receives a retransmitted ACCEPT message from the
              client).</dd>
            <dt pn="section-8.11.2-2.13">Cancelled:</dt>
            <dd pn="section-8.11.2-2.14">The order cannot be accommodated, or it has
              been cancelled by the client. Associated resources must be
              released in the latter case, if previously reserved.</dd>
            <dt pn="section-8.11.2-2.15">ChildCreated:</dt>
            <dd pn="section-8.11.2-2.16">A child order has been created in cases
              where resources from another Network Provider are needed.</dd>
            <dt pn="section-8.11.2-2.17">ChildPQOSent:</dt>
            <dd pn="section-8.11.2-2.18">A child order has been sent to the remote
              server.</dd>
            <dt pn="section-8.11.2-2.19">ChildServerProcessing:</dt>
            <dd pn="section-8.11.2-2.20">A child order is being
              processed by the remote server.</dd>
            <dt pn="section-8.11.2-2.21">ChildOfferReceived:</dt>
            <dd pn="section-8.11.2-2.22"> The remote server has received an offer to a
              child order.</dd>
            <dt pn="section-8.11.2-2.23">ChildOfferProcessing:</dt>
            <dd pn="section-8.11.2-2.24"> A received offer to a child order
              is being processed.</dd>
            <dt pn="section-8.11.2-2.25">ChildAcceptSent: </dt>
            <dd pn="section-8.11.2-2.26">The child offer (the offer received from
              the remote server in response to a child order) is confirmed to
              the remote server.</dd>
            <dt pn="section-8.11.2-2.27">ChildCompleted:</dt>
            <dd pn="section-8.11.2-2.28"> The accepted child offer has been acknowledged
              by the remote server.</dd>
          </dl>
          <figure anchor="serverstate" align="left" suppress-title="false" pn="figure-9">
            <name slugifiedName="name-cpnp-finite-state-machine-s">CPNP Finite State Machine (Server Side)</name>
            <artwork align="center" name="" type="" alt="" pn="section-8.11.2-3.1">
+------------------+           +------------------+    
|AwaitingProcessing|&lt;----------|    ChildCreated  |                        
+------------------+           +------------------+                   
        |                            |      ^ 
        v                            |      |                                                
+------------------+                 |      |           
|   ChildPQOSent   |----------------+|      Q     
+------------------+                ||      U              
        |                           ||      O                 
     QUOTATION/UPDATE               ||      T                  
        v                           ||      A  +--------------------+ 
+---------------------+   CANCEL    ||      T  |     PQOReceived    |      
|ChildServerProcessing|------------+||      I  +--------------------+ 
+---------------------+    FAIL    vvv      O       |      |  
        |                        +-----+    N    CANCEL    |
    PROCESSING                   |     |&lt;---|-------+  PROCESSING
        v                        |     |    |              v
+------------------+             |     |   +------------------------+            
|ChildOfferReceived|----CANCEL---|  C  |&lt;--|   AwaitingProcessing   |  
+------------------+             |  A  |   +------------------------+ 
        |                        |  N  |       ^          | OFFER
      OFFER                      |  C  |       | +------------------+ 
        |                        |  E  |&lt;DECLINE-|   OfferProposed  |
        |                        |  L  |       | +------------------+     
        v                        |  L  |       |          |
+------------------+             |  E  |       |      PROCESSING
|ChildOfferReceived|---CANCEL----|  D  |       |          v
+------------------+             |     |       | +------------------+      
        |                        |     |&lt;DECLINE-| Proc'ingReceived |     
   PROCESSING                    |     |       |+------------------+       
        |                        +-----+       |          | ACCEPT
        v                         ^^^^^        |          v  
+------------------+              |||||        | +------------------+
|ChildOfferProc'ing|---DECLINE----+|||+-CANCEL-|-|  AcceptReceived  |       
+------------------+               |||         | +------------------+ 
        |ACCEPT                    |||         |          |ACK
        v                          |||         |          v   
+------------------+               |||         | +------------------+
|  ChildAcceptSent |---CANCEL------+|+-WITHDRAW|-|    Completed     |       
+------------------+                |          | +------------------+                  
        | ACK                       |          |
        v                           |          |
+------------------+                |          |
|  ChildCompleted  |---WITHDRAW-----+          |
|                  +---------------------------+
+------------------+
</artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="co" numbered="true" toc="include" removeInRFC="false" pn="section-9">
      <name slugifiedName="name-cpnp-objects">CPNP Objects</name>
      <t indent="0" pn="section-9-1">This section defines CPNP objects using the Routing Backus-Naur Form (RBNF) format defined in 
      <xref target="RFC5511" format="default" sectionFormat="of" derivedContent="RFC5511"/>.  Please also note the
      following:</t>
      <aside pn="section-9-2">
        <t indent="0" pn="section-9-2.1">Note 1: The formats of CPNP messages are provided using a generic
          format. Implementors can adapt RBNF definitions to their "favorite"
          message format. For example, JSON <xref target="RFC8259" format="default" sectionFormat="of" derivedContent="RFC8259"/> or
          Concise Binary Object Representation (CBOR) <xref target="RFC7049" format="default" sectionFormat="of" derivedContent="RFC7049"/> can be used.</t>
      </aside>
      <aside pn="section-9-3">
        <t indent="0" pn="section-9-3.1">Note 2: CPNP messages cannot be blindly mapped to RESTCONF
          messages with the target service being modelled as configuration
          data because such data is supposed to be manipulated by a RESTCONF
          client only. In such a model, the RESTCONF server cannot use a value
          other than the one set by the client (e.g., <xref target="offer" format="default" sectionFormat="of" derivedContent="Section 9.2.3"/>) 
          or remove offers from its own initiative
          (e.g., <xref target="valtime" format="default" sectionFormat="of" derivedContent="Section 9.1.8"/>). An alternate approach might
          be to map CPNP operations into RESTCONF actions (RPC). Assessing the
          feasibility of such approach is out of scope.</t>
      </aside>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-9.1">
        <name slugifiedName="name-attributes">Attributes</name>
        <section anchor="cu_id" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.1">
          <name slugifiedName="name-customer_order_identifier">CUSTOMER_ORDER_IDENTIFIER</name>
          <t indent="0" pn="section-9.1.1-1">The CUSTOMER_ORDER_IDENTIFIER (Customer Order Identifier) is an identifier that is assigned
          by a client to identify an agreement. This identifier must be unique
          to the client.</t>
          <t indent="0" pn="section-9.1.1-2">Rules for assigning this identifier (including the structure and
          semantics) are specific to the client (Customer). The value of
          CUSTOMER_ORDER_IDENTIFIER is included in all CPNP messages.</t>
          <t indent="0" pn="section-9.1.1-3">The client (Customer) assigns an identifier to an order under
          negotiation before an agreement is reached. This identifier will be
          used to unambiguously identify the resulting agreement at the client
          side (Customer).</t>
          <t indent="0" pn="section-9.1.1-4">The server handles the CUSTOMER_ORDER_IDENTIFIER as an opaque
          value.</t>
        </section>
        <section anchor="pr_id" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.2">
          <name slugifiedName="name-provider_order_identifier">PROVIDER_ORDER_IDENTIFIER</name>
          <t indent="0" pn="section-9.1.2-1">The PROVIDER_ORDER_IDENTIFIER (Provider Order Identifier) is an identifier that is assigned
          by a server to identify an order. This identifier must be unique to
          the server.</t>
          <t indent="0" pn="section-9.1.2-2">Rules for assigning this identifier (including the structure and
          semantics) are specific to the server (Provider).
          The PROVIDER_ORDER_IDENTIFIER is included in all CPNP messages
          except QUOTATION messages (because the state is only present at the
          client side).</t>
          <t indent="0" pn="section-9.1.2-3">The server (Provider) assigns an identifier to an order under
          negotiation before an agreement is reached. This identifier will be
          used to unambiguously identify the resulting agreement at the server
          side (Provider).</t>
          <t indent="0" pn="section-9.1.2-4">The client handles the PROVIDER_ORDER_IDENTIFIER as an opaque
          value.</t>
        </section>
        <section anchor="trans_id" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.3">
          <name slugifiedName="name-transaction_id">TRANSACTION_ID</name>
          <t indent="0" pn="section-9.1.3-1">This object conveys the Transaction-ID introduced in <xref target="trans" format="default" sectionFormat="of" derivedContent="Section 8.4"/>.</t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-9.1.4">
          <name slugifiedName="name-sequence_number">SEQUENCE_NUMBER</name>
          <t indent="0" pn="section-9.1.4-1">The sequence number is a number that is monotonically incremented in
          every new CPNP message pertaining to a given CPNP transaction. This
          number is used to avoid replay attacks.</t>
          <t indent="0" pn="section-9.1.4-2">Refer to <xref target="sq_nu" format="default" sectionFormat="of" derivedContent="Section 11.3"/>.</t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-9.1.5">
          <name slugifiedName="name-nonce">NONCE</name>
          <t indent="0" pn="section-9.1.5-1">The NONCE is a random value assigned by the CPNP server. 
          Assigning a unique NONCE value for each order is recommended.</t>
          <t indent="0" pn="section-9.1.5-2">It is mandatory to then include the NONCE in subsequent CPNP client
          operations on the associated order (including the resulting
          agreement) such as withdrawing the order or updating the order.</t>
          <t indent="0" pn="section-9.1.5-3">If the NONCE validation checks fail, the server rejects the
          request with a FAIL message that includes the appropriate failure reason
          code.</t>
        </section>
        <section anchor="extime" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.6">
          <name slugifiedName="name-expected_response_time">EXPECTED_RESPONSE_TIME</name>
          <t indent="0" pn="section-9.1.6-1">This attribute indicates the time by when the CPNP client is
          expecting to receive a response from the CPNP server to a given PQO.
          If no offer is received by then, the CPNP client will consider the
          quotation order to be rejected.</t>
          <t indent="0" pn="section-9.1.6-2">The EXPECTED_RESPONSE_TIME follows the date format specified in <xref target="RFC3339" format="default" sectionFormat="of" derivedContent="RFC3339"/>.</t>
        </section>
        <section anchor="EXPECTED_OFFER_TIME" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.7">
          <name slugifiedName="name-expected_offer_time">EXPECTED_OFFER_TIME</name>
          <t indent="0" pn="section-9.1.7-1">This attribute indicates the time by when the CPNP server is
          expecting to make an offer to the CPNP client. If no offer is
          received by then, the CPNP client will consider the order 
          rejected.</t>
          <t indent="0" pn="section-9.1.7-2">The CPNP server may propose an expected offer time that does not
          match the expected response time indicated in the quotation order
          message. The CPNP client can accept or reject the proposed expected
          time by when the CPNP server will make an offer.</t>
          <t indent="0" pn="section-9.1.7-3">The CPNP server can always request extra time for its processing,
          but this may be accepted or rejected by the CPNP client.</t>
          <t indent="0" pn="section-9.1.7-4">The EXPECTED_OFFER_TIME follows the date format specified in <xref target="RFC3339" format="default" sectionFormat="of" derivedContent="RFC3339"/>.</t>
        </section>
        <section anchor="valtime" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.8">
          <name slugifiedName="name-validity_offer_time">VALIDITY_OFFER_TIME</name>
          <t indent="0" pn="section-9.1.8-1">This attribute indicates the time of validity of an offer made by
          the CPNP server. If the offer is not accepted before this time 
          expires, the CPNP server will consider the CPNP client as having rejected
          the offer; the CPNP server will silently remove this order from its
          base.</t>
          <t indent="0" pn="section-9.1.8-2">The VALIDITY_OFFER_TIME follows date format specified in <xref target="RFC3339" format="default" sectionFormat="of" derivedContent="RFC3339"/>.</t>
        </section>
        <section anchor="service_template" numbered="true" toc="include" removeInRFC="false" pn="section-9.1.9">
          <name slugifiedName="name-service_description">SERVICE_DESCRIPTION</name>
          <t indent="0" pn="section-9.1.9-1">This document defines a machinery to negotiate any aspect subject
          to negotiation. Service clauses that are under negotiation are
          conveyed using this attribute.</t>
          <t indent="0" pn="section-9.1.9-2">The structure of the connectivity provisioning clauses is
          provided in the following subsection.</t>
          <section anchor="cpd_template" numbered="true" toc="exclude" removeInRFC="false" pn="section-9.1.9.1">
            <name slugifiedName="name-cpd">CPD</name>
            <t indent="0" pn="section-9.1.9.1-1">The RBNF format of the CPD
            is shown in <xref target="rbnf_cpd" format="default" sectionFormat="of" derivedContent="Figure 10"/>.</t>
            <figure anchor="rbnf_cpd" align="left" suppress-title="false" pn="figure-10">
              <name slugifiedName="name-the-rbnf-format-of-the-cpd">The RBNF format of the CPD</name>
              <sourcecode type="rbnf" markers="false" pn="section-9.1.9.1-2.1">
&lt;CPD&gt; ::=  &lt;Connectivity Provisioning Component&gt; ...
&lt;Connectivity Provisioning Component&gt; ::=
                           &lt;CONNECTIVITY_PROVISIONING_PROFILE&gt; ...
&lt;CONNECTIVITY_PROVISIONING_PROFILE&gt; ::=
                           &lt;Customer Nodes Map&gt;
                           &lt;SCOPE&gt;
                           &lt;QoS Guarantees&gt;
                           &lt;Availability&gt;
                           &lt;CAPACITY&gt;
                           &lt;Traffic Isolation&gt;
                           &lt;Conformance Traffic&gt;
                           &lt;Flow Identification&gt;
                           &lt;Overall Traffic Guarantees&gt;
                           &lt;Routing and Forwarding&gt;
                           &lt;Activation Means&gt;
                           &lt;Invocation Means&gt;
                           &lt;Notifications&gt;
&lt;Customer Nodes Map&gt; ::=  &lt;Customer Node&gt; ...
&lt;Customer Node&gt; ::=  &lt;IDENTIFIER&gt;
                     &lt;LINK_IDENTIFIER&gt;
                     &lt;LOCALIZATION&gt;
</sourcecode>
            </figure>
          </section>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-9.1.10">
          <name slugifiedName="name-cpnp-information-elements">CPNP Information Elements</name>
          <t indent="0" pn="section-9.1.10-1">An Information Element (IE) is an optional object that can be
          included in a CPNP message.</t>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-9.1.10.1">
            <name slugifiedName="name-customer-description">Customer Description</name>
            <t indent="0" pn="section-9.1.10.1-1">The client may include administrative information such
            as the following:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.1.10.1-2">
              <li pn="section-9.1.10.1-2.1">Name</li>
              <li pn="section-9.1.10.1-2.2">Contact Information</li>
            </ul>
            <t indent="0" pn="section-9.1.10.1-3">The format of this Information Element is as follows:</t>
            <sourcecode type="rbnf" markers="false" pn="section-9.1.10.1-4">
&lt;Customer Description&gt; ::= [&lt;NAME&gt;] [&lt;Contact Information&gt;]
&lt;Contact Information&gt; ::=  [&lt;EMAIL_ADDRESS&gt;] [&lt;POSTAL_ADDRESS&gt;]
                           [&lt;TELEPHONE_NUMBER&gt; ...]
</sourcecode>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-9.1.10.2">
            <name slugifiedName="name-provider-description">Provider Description</name>
            <t indent="0" pn="section-9.1.10.2-1">The server may include administrative information in an offer
            such as the following:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.1.10.2-2">
              <li pn="section-9.1.10.2-2.1">Name</li>
              <li pn="section-9.1.10.2-2.2">AS Number <xref target="RFC6793" format="default" sectionFormat="of" derivedContent="RFC6793"/></li>
              <li pn="section-9.1.10.2-2.3">Contact Information</li>
            </ul>
            <t indent="0" pn="section-9.1.10.2-3">The format of this Information Element is as follows:</t>
            <sourcecode type="rbnf" markers="false" pn="section-9.1.10.2-4">
&lt;Provider Description&gt; ::= [&lt;NAME&gt;][&lt;Contact Information&gt;]
                           [&lt;AS_NUMBER&gt;]
</sourcecode>
          </section>
          <section anchor="nego" numbered="true" toc="exclude" removeInRFC="false" pn="section-9.1.10.3">
            <name slugifiedName="name-negotiation-options">Negotiation Options</name>
            <t indent="0" pn="section-9.1.10.3-1">The client may include some negotiation options such as the following:</t>
            <dl spacing="normal" indent="3" newline="false" pn="section-9.1.10.3-2">
              <dt pn="section-9.1.10.3-2.1">Setup purpose:</dt>
              <dd pn="section-9.1.10.3-2.2">A client may request the setup of a service
                (e.g., connectivity) only for testing purposes during a
                limited period. The order can be extended to become permanent
                if the client was satisfied during the test period. This
                operation is achieved using the UPDATE method.</dd>
              <dt pn="section-9.1.10.3-2.3">Activation type:</dt>
              <dd pn="section-9.1.10.3-2.4"> A client may request a permanent or
                scheduled activation type. If no activation type clause is
                included during the negotiation, this means that the order
                will be immediately activated right after the negotiation
                ends.</dd>
            </dl>
            <t indent="0" pn="section-9.1.10.3-3">The format of this Information Element is as follows:</t>
            <sourcecode type="rbnf" markers="false" pn="section-9.1.10.3-4">
&lt;Negotiation Options&gt; ::= [&lt;PURPOSE&gt;]
</sourcecode>
          </section>
        </section>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-9.2">
        <name slugifiedName="name-operation-messages">Operation Messages</name>
        <t indent="0" pn="section-9.2-1">This section defines the RBNF format of CPNP operation messages.
        The following operation codes are used: </t>
        <table align="left" pn="table-1">
          <name slugifiedName="name-cpnp-operation-message-code">CPNP Operation Message Codes</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Code</th>
              <th align="left" colspan="1" rowspan="1">Operation Message</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">QUOTATION</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="provision" format="default" sectionFormat="of" derivedContent="Section 9.2.1"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">PROCESSING</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="proc" format="default" sectionFormat="of" derivedContent="Section 9.2.2"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">OFFER</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="offer" format="default" sectionFormat="of" derivedContent="Section 9.2.3"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">ACCEPT</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="accept" format="default" sectionFormat="of" derivedContent="Section 9.2.4"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">DECLINE</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="dec" format="default" sectionFormat="of" derivedContent="Section 9.2.5"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">ACK</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="ack" format="default" sectionFormat="of" derivedContent="Section 9.2.6"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">CANCEL</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="cancel" format="default" sectionFormat="of" derivedContent="Section 9.2.7"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">8</td>
              <td align="left" colspan="1" rowspan="1">WITHDRAW</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="with" format="default" sectionFormat="of" derivedContent="Section 9.2.8"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">9</td>
              <td align="left" colspan="1" rowspan="1">UPDATE</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="upd" format="default" sectionFormat="of" derivedContent="Section 9.2.9"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">10</td>
              <td align="left" colspan="1" rowspan="1">FAIL</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="fail" format="default" sectionFormat="of" derivedContent="Section 9.2.10"/></td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">11</td>
              <td align="left" colspan="1" rowspan="1">ACTIVATE</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="activate" format="default" sectionFormat="of" derivedContent="Section 9.2.11"/></td>
            </tr>
          </tbody>
        </table>
        <t indent="0" pn="section-9.2-3">These codes are used to unambiguously identify a CPNP operation;
        the operation code is conveyed in the METHOD_CODE attribute
        mentioned in the following subsections.</t>
        <t indent="0" pn="section-9.2-4">In the following, VERSION refers to the CPNP version number. This
        attribute must be set to 1.</t>
        <section anchor="provision" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.1">
          <name slugifiedName="name-quotation">QUOTATION</name>
          <t indent="0" pn="section-9.2.1-1">The format of the QUOTATION message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.1-2">
&lt;QUOTATION Message&gt; ::=  &lt;VERSION&gt;
                         &lt;METHOD_CODE&gt;
                         &lt;SEQUENCE_NUMBER&gt;
                         &lt;TRANSACTION_ID&gt;
                         &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                         [&lt;EXPECTED_RESPONSE_TIME&gt;]
                         &lt;REQUESTED_CPD&gt;
                         [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.1-3">A QUOTATION message must include an order
          identifier that is generated by the client
          (CUSTOMER_ORDER_IDENTIFIER). Because several orders can be
          issued to several servers, the QUOTATION message must also include a
          Transaction-ID.</t>
          <t indent="0" pn="section-9.2.1-4">The message may include an EXPECTED_RESPONSE_TIME, which indicates
          by when the client expects to receive an offer from the server.
          The QUOTATION message must also include a requested service description
          (that is, a Requested CPD for
          connectivity services).</t>
          <t indent="0" pn="section-9.2.1-5">The message may include ACTIVATION_TYPE to request a permanent or
          scheduled activation type (e.g., using the ACTIVATE method defined
          in <xref target="activate" format="default" sectionFormat="of" derivedContent="Section 9.2.11"/>). If no such clause is included,
          the default mode is to assume that the order will be active once the
          accepted activation means are successfully invoked (e.g., <xref target="RFC7297" sectionFormat="of" section="3.11" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7297#section-3.11" derivedContent="RFC7297"/>).</t>
          <t indent="0" pn="section-9.2.1-6">When the client sends the QUOTATION message to the server, the
          state of the order changes to "PQOSent" at the client side.</t>
        </section>
        <section anchor="proc" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.2">
          <name slugifiedName="name-processing">PROCESSING</name>
          <t indent="0" pn="section-9.2.2-1">The format of the PROCESSING message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.2-2">
&lt;PROCESSING Message&gt; ::= &lt;VERSION&gt;
                         &lt;METHOD_CODE&gt;
                         &lt;SEQUENCE_NUMBER&gt;
                         &lt;TRANSACTION_ID&gt;
                         &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                         &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                         [&lt;EXPECTED_OFFER_TIME&gt;]
                         [&lt;PROCESSING_SUBCODE&gt;]
</sourcecode>
          <t indent="0" pn="section-9.2.2-3">Upon receipt of a QUOTATION message, the
          server proceeds with the parsing rules (see <xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>). 
          If no error is encountered, the server
          generates a PROCESSING response to the client to indicate the PQO
          has been received and it is being processed. The server must
          generate an order identifier that identifies the order in its local
          order repository. The server must copy the content of the
          CUSTOMER_ORDER_IDENTIFIER and TRANSACTION_ID fields as conveyed
          in the QUOTATION message. The server may include an
          EXPECTED_OFFER_TIME by when it expects to make an offer to the
          client.</t>
          <t indent="0" pn="section-9.2.2-4">Upon receipt of a PROCESSING message, the client verifies whether
          it has issued a PQO that contains the
          CUSTOMER_ORDER_IDENTIFIER and TRANSACTION_ID to that server. If no such PQO is
          found, the PROCESSING message must be silently ignored. If a PQO is
          found, the client may check whether it accepts the
          EXPECTED_OFFER_TIME, and then it changes to state of the order to
          "ServerProcessing".</t>
          <t indent="0" pn="section-9.2.2-5">If the server requires more time to process the quotation
          order, it may send a PROCESSING message that includes a new
          EXPECTED_OFFER_TIME. The client can answer with an ACK message if
          more time is granted (<xref target="timegranted" format="default" sectionFormat="of" derivedContent="Figure 11"/>) or with a
          FAIL message if the time extension request is rejected (<xref target="timerejected" format="default" sectionFormat="of" derivedContent="Figure 12"/>).</t>
          <t indent="0" pn="section-9.2.2-6">The server may provide more details in the PROCESSING_SUBCODE
          attribute about the reason for requesting more time to process the
          request. The following codes are defined:</t>
          <table align="left" pn="table-2">
            <name slugifiedName="name-processing_subcode-codes">PROCESSING_SUBCODE Codes</name>
            <thead>
              <tr>
                <th align="left" colspan="1" rowspan="1">Subcode</th>
                <th align="left" colspan="1" rowspan="1">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left" colspan="1" rowspan="1">1</td>
                <td align="left" colspan="1" rowspan="1">Upgrade of local resources</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">2</td>
                <td align="left" colspan="1" rowspan="1">Request external resources</td>
              </tr>
            </tbody>
          </table>
          <figure anchor="timegranted" align="left" suppress-title="false" pn="figure-11">
            <name slugifiedName="name-request-more-negotiation-ti">Request More Negotiation Time: Granted</name>
            <artwork align="center" name="" type="" alt="" pn="section-9.2.2-8.1">
+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |=======QUOTATION(Requested CPD)=====&gt;|
   |&lt;========PROCESSING(time1)===========|
                     ...
   |&lt;========PROCESSING(MoreTime)========|
   |============ACK(TimeGranted)========&gt;|
                     ...
   |&lt;=========OFFER(Offered CPD)=========|
   |=============PROCESSING=============&gt;|
   |=========ACCEPT(Accepted CPD)=======&gt;|
   |&lt;=========ACK(Accepted CPD)==========|
   |                                     |
</artwork>
          </figure>
          <figure anchor="timerejected" align="left" suppress-title="false" pn="figure-12">
            <name slugifiedName="name-request-more-negotiation-tim">Request More Negotiation Time: Rejected</name>
            <artwork align="center" name="" type="" alt="" pn="section-9.2.2-9.1">
+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |=======QUOTATION(Requested CPD)=====&gt;|
   |&lt;========PROCESSING(time1)===========|
                     ...
   |&lt;========PROCESSING(MoreTime)========|
   |=====FAIL(More Time Rejected)=======&gt;|
</artwork>
          </figure>
        </section>
        <section anchor="offer" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.3">
          <name slugifiedName="name-offer">OFFER</name>
          <t indent="0" pn="section-9.2.3-1">The format of the OFFER message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.3-2">
&lt;OFFER Message&gt; ::= &lt;VERSION&gt;
                    &lt;METHOD_CODE&gt;
                    &lt;SEQUENCE_NUMBER&gt;
                    &lt;TRANSACTION_ID&gt;
                    &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                    &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                    &lt;NONCE&gt;
                    &lt;VALIDITY_OFFER_TIME&gt;
                    &lt;OFFERED_CPD&gt;
                    [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.3-3">The server answers
          a QUOTATION request received from the client with an OFFER message. The offer will be
          considered to be rejected by the client if no confirmation (i.e., an ACCEPT
          message sent by the client) is received by the server before the
          expiration of the validity time.</t>
          <t indent="0" pn="section-9.2.3-4">The server may include ACTIVATION_TYPE to indicate whether the
          offer is about a permanent or scheduled activation type. The message
          may include ACTIVATION_SCHEDULE to indicate when the order is to be
          activated. If no such clause is included, the default mode is to
          assume that the order will be active once the accepted activation
          means are successfully invoked (e.g., <xref target="RFC7297" sectionFormat="of" section="3.11" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7297#section-3.11" derivedContent="RFC7297"/> or <xref target="activate" format="default" sectionFormat="of" derivedContent="Section 9.2.11"/>).</t>
        </section>
        <section anchor="accept" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.4">
          <name slugifiedName="name-accept">ACCEPT</name>
          <t indent="0" pn="section-9.2.4-1">The format of the ACCEPT message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.4-2">
&lt;ACCEPT Message&gt; ::= &lt;VERSION&gt;
                     &lt;METHOD_CODE&gt;
                     &lt;SEQUENCE_NUMBER&gt;
                     &lt;TRANSACTION_ID&gt;
                     &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                     &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                     &lt;NONCE&gt;
                     &lt;ACCEPTED_CPD&gt;
                     [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.4-3">This message is used by a client to
          confirm the acceptance of an offer received from a server. The
          fields of this message must be copied from the received OFFER
          message. This message should not be sent after the validity time of
          the offer expires, as indicated by the server (<xref target="offer" format="default" sectionFormat="of" derivedContent="Section 9.2.3"/>).</t>
        </section>
        <section anchor="dec" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.5">
          <name slugifiedName="name-decline">DECLINE</name>
          <t indent="0" pn="section-9.2.5-1">The format of the DECLINE message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.5-2">
&lt;DECLINE Message&gt; ::= &lt;VERSION&gt;
                      &lt;METHOD_CODE&gt;
                      &lt;SEQUENCE_NUMBER&gt;
                      &lt;TRANSACTION_ID&gt;
                      &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                      &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                      &lt;NONCE&gt;
                      [&lt;REASON&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.5-3">The client may issue a DECLINE
          message to reject an offer. CUSTOMER_ORDER_IDENTIFIER,
          PROVIDER_ORDER_IDENTIFIER, TRANSACTION_ID, and NONCE are used by
          the server as keys to find the corresponding order. If an order
          matches, the server changes the state of this order to "Cancelled"
          and then returns an ACK with a copy of the Requested CPD to the
          requesting client.</t>
          <t indent="0" pn="section-9.2.5-4">A DECLINE message may include an Information Element to indicate
          the reason for declining an offer. The following codes are defined:
          </t>
          <table align="left" pn="table-3">
            <name slugifiedName="name-decline-message-codes">DECLINE Message Codes</name>
            <thead>
              <tr>
                <th align="left" colspan="1" rowspan="1">Code</th>
                <th align="left" colspan="1" rowspan="1">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left" colspan="1" rowspan="1">1</td>
                <td align="left" colspan="1" rowspan="1">Unacceptable gap between the request and the offer</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">2</td>
                <td align="left" colspan="1" rowspan="1">Conflict with another offer from another server</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">3</td>
                <td align="left" colspan="1" rowspan="1">Activation type mismatch</td>
              </tr>
            </tbody>
          </table>
          <t indent="0" pn="section-9.2.5-6">If no order is found, the server returns a FAIL message to the
          requesting client. In order to prevent DDoS (Distributed Denial of
          Service) attacks, the server should restrict the number of FAIL
          messages sent to a requesting client. It may also rate-limit FAIL
          messages.</t>
          <t indent="0" pn="section-9.2.5-7">A flow example is shown in <xref target="decline" format="default" sectionFormat="of" derivedContent="Figure 13"/>.</t>
          <figure anchor="decline" align="left" suppress-title="false" pn="figure-13">
            <name slugifiedName="name-decline-flow-example">DECLINE Flow Example</name>
            <artwork align="center" name="" type="" alt="" pn="section-9.2.5-8.1">+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |=======QUOTATION(Requested CPD)=====&gt;|
   |&lt;============PROCESSING==============|
   |&lt;=========OFFER(Offered CPD)=========|
   |=============PROCESSING=============&gt;|
   |===============DECLINE==============&gt;|
   |&lt;================ACK=================|
   |                                     |
</artwork>
          </figure>
        </section>
        <section anchor="ack" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.6">
          <name slugifiedName="name-ack">ACK</name>
          <t indent="0" pn="section-9.2.6-1">The format of the ACK message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.6-2">
&lt;ACK Message&gt; ::= &lt;VERSION&gt;
                  &lt;METHOD_CODE&gt;
                  &lt;SEQUENCE_NUMBER&gt;
                  &lt;TRANSACTION_ID&gt;
                  &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                  &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                  [&lt;EXPECTED_RESPONSE_TIME&gt;]
                  [&lt;CPD&gt;]
                  [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.6-3">This message is issued by the server to
          close a CPNP transaction or by a client to grant more negotiation
          time to the server.</t>
          <t indent="0" pn="section-9.2.6-4">This message is sent by the server as a response to an ACCEPT,
          WITHDRAW, DECLINE, or CANCEL message. In this case, the ACK message
          must include the copy of the service description (i.e., CPD for connectivity services) as stored
          by the server. In particular, the following considerations are taken
          into account for connectivity provisioning services:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.2.6-5">
            <li pn="section-9.2.6-5.1">A copy of the Requested/Offered CPD is included by the server
              if it successfully handled a CANCEL message.</li>
            <li pn="section-9.2.6-5.2">A copy of the Updated CPD is included by the server if it
              successfully handled an UPDATE message.</li>
            <li pn="section-9.2.6-5.3">A copy of the Offered CPD is included by the server if it
              successfully handled an ACCEPT message in the context of a
              QUOTATION transaction (refer to "Accepted CPD" in <xref target="cpd" format="default" sectionFormat="of" derivedContent="Section 8.7"/>).</li>
            <li pn="section-9.2.6-5.4">An Empty CPD is included by the server if it successfully
              handled a DECLINE or WITHDRAW message.</li>
          </ul>
          <t indent="0" pn="section-9.2.6-6">A client may issue an ACK message as a response to a time
          extension request (conveyed in PROCESSING) received from the server.
          In such case, the ACK message must include an EXPECTED_RESPONSE_TIME
          that is likely to be set to the time extension requested by the
          server.</t>
        </section>
        <section anchor="cancel" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.7">
          <name slugifiedName="name-cancel">CANCEL</name>
          <t indent="0" pn="section-9.2.7-1">The format of the CANCEL message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.7-2">
&lt;CANCEL Message&gt; ::= &lt;VERSION&gt;
                     &lt;METHOD_CODE&gt;
                     &lt;SEQUENCE_NUMBER&gt;
                     &lt;TRANSACTION_ID&gt;
                     &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                     [&lt;CPD&gt;]
</sourcecode>
          <t indent="0" pn="section-9.2.7-3">The client can issue a CANCEL
          message at any stage during the CPNP negotiation process before an
          agreement is reached. The CUSTOMER_ORDER_IDENTIFIER and
          TRANSACTION_ID are used by the server as keys to find the
          corresponding order. If a quotation order matches, the server
          changes the state of this quotation order to "Cancelled" and then
          returns an ACK with a copy of the Requested CPD to the requesting
          client.</t>
          <t indent="0" pn="section-9.2.7-4">If no quotation order is found, the server returns a FAIL message
          to the requesting client.</t>
        </section>
        <section anchor="with" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.8">
          <name slugifiedName="name-withdraw">WITHDRAW</name>
          <t indent="0" pn="section-9.2.8-1">The format of the WITHDRAW message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.8-2">
&lt;WITHDRAW Message&gt; ::= &lt;VERSION&gt;
                       &lt;METHOD_CODE&gt;
                       &lt;SEQUENCE_NUMBER&gt;
                       &lt;TRANSACTION_ID&gt;
                       &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                       &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                       &lt;NONCE&gt;
                       [&lt;ACCEPTED_CPD&gt;]
                       [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.8-3">This message is used to withdraw an offer
          already accepted by the Customer. <xref target="withdraw" format="default" sectionFormat="of" derivedContent="Figure 14"/>
          shows a typical usage of this message.</t>
          <figure anchor="withdraw" align="left" suppress-title="false" pn="figure-14">
            <name slugifiedName="name-withdraw-flow-example">WITHDRAW Flow Example</name>
            <artwork align="center" name="" type="" alt="" pn="section-9.2.8-4.1">
+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |============WITHDRAW(CPD)===========&gt;|
   |&lt;============PROCESSING==============|
   |&lt;===========ACK(Empty CPD)===========|
   |                                     |
</artwork>
          </figure>
          <t indent="0" pn="section-9.2.8-5">The WITHDRAW message must include the same
          CUSTOMER_ORDER_IDENTIFIER, PROVIDER_ORDER_IDENTIFIER, and
          NONCE as those used when creating the order.</t>
          <t indent="0" pn="section-9.2.8-6">Upon receipt of a WITHDRAW message, the server checks whether an
          order matching the request is found. If an order is found, the state
          of the order is changed to "Cancelled", and an ACK message including
          an Empty CPD is returned to the requesting client. If no order is
          found, the server returns a FAIL message to the requesting
          client.</t>
        </section>
        <section anchor="upd" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.9">
          <name slugifiedName="name-update">UPDATE</name>
          <t indent="0" pn="section-9.2.9-1">The format of the UPDATE message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.9-2">
&lt;UPDATE Message&gt; ::= &lt;VERSION&gt;
                     &lt;METHOD_CODE&gt;
                     &lt;SEQUENCE_NUMBER&gt;
                     &lt;TRANSACTION_ID&gt;
                     &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                     &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                     &lt;NONCE&gt;
                     &lt;EXPECTED_RESPONSE_TIME&gt;
                     &lt;REQUESTED_CPD&gt;
                     [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.9-3">This message is sent by the CPNP client
          to update an existing service agreement (e.g., Accepted 
          CPD). The UPDATE message must include the same
          CUSTOMER_ORDER_IDENTIFIER, PROVIDER_ORDER_IDENTIFIER, and
          NONCE as those used when creating the order. The CPNP client
          includes a new service description (e.g., Updated CPD) that
          integrates the requested modifications. A new Transaction_ID must be
          assigned by the client.</t>
          <t indent="0" pn="section-9.2.9-4">Upon receipt of an UPDATE message, the server checks whether an
          order, having state "Completed", matches
          CUSTOMER_ORDER_IDENTIFIER, PROVIDER_ORDER_IDENTIFIER, and
          NONCE. </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.2.9-5">
            <li pn="section-9.2.9-5.1">If no order is found, the CPNP server generates a FAIL error
              with the appropriate error code (<xref target="fail" format="default" sectionFormat="of" derivedContent="Section 9.2.10"/>).</li>
            <li pn="section-9.2.9-5.2">
              <t indent="0" pn="section-9.2.9-5.2.1">If an order is found, the server checks whether it can honor
              the request:</t>
              <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.2.9-5.2.2">
                <li pn="section-9.2.9-5.2.2.1">A FAIL message is sent to the client if the server cannot
                  honor the request. The client may initiate a new PQO
                  negotiation cycle (that is, send a new UPDATE message).</li>
                <li pn="section-9.2.9-5.2.2.2">
                  <t indent="0" pn="section-9.2.9-5.2.2.2.1">An OFFER message including the updated clauses (e.g.,
                  Updated CPD) is sent to the
                  client. For example, the server maintains an order for
                  provisioning a VPN service that connects sites A, B, and C.
                  If the client sends an UPDATE message to remove site C, only
                  sites A and B will be included in the OFFER sent by the
                  server to the requesting client.</t>
                  <t indent="0" pn="section-9.2.9-5.2.2.2.2">Note that the cycle that is triggered by an
                  UPDATE message is also considered to be a negotiation
                  cycle.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t indent="0" pn="section-9.2.9-6">A flow chart that illustrates the use of UPDATE operation is
          shown in <xref target="update" format="default" sectionFormat="of" derivedContent="Figure 15"/>.</t>
          <figure anchor="update" align="left" suppress-title="false" pn="figure-15">
            <name slugifiedName="name-update-flow-example">UPDATE Flow Example</name>
            <artwork align="center" name="" type="" alt="" pn="section-9.2.9-7.1">
+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |=========UPDATE(Requested CPD)======&gt;|
   |&lt;============PROCESSING==============|
   |&lt;=========OFFER(Updated CPD)=========|
   |=============PROCESSING=============&gt;|
   |==========ACCEPT(Updated CPD)=======&gt;|
   |&lt;==========ACK(Updated CPD)==========|
   |                                     |
</artwork>
          </figure>
        </section>
        <section anchor="fail" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.10">
          <name slugifiedName="name-fail">FAIL</name>
          <t indent="0" pn="section-9.2.10-1">The format of the FAIL message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.10-2">
&lt;FAIL Message&gt; ::=  &lt;VERSION&gt;
                    &lt;METHOD_CODE&gt;
                    &lt;SEQUENCE_NUMBER&gt;
                    &lt;TRANSACTION_ID&gt;
                    &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                    &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                    &lt;STATUS_CODE&gt;
</sourcecode>
          <t indent="0" pn="section-9.2.10-3">This message is sent in the following
          cases:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.2.10-4">
            <li pn="section-9.2.10-4.1">The server cannot honor an order received from the client
              (i.e., received in a QUOTATION or UPDATE request).</li>
            <li pn="section-9.2.10-4.2">The server encounters an error when processing a CPNP request
              received from the client.</li>
            <li pn="section-9.2.10-4.3">The client cannot grant more time to the server. This is a
              response to a time extension request carried in a PROCESSING
              message.</li>
          </ul>
          <t indent="0" pn="section-9.2.10-5">The status code indicates the error code. The following codes are
          supported:</t>
          <table align="center" pn="table-4">
            <name slugifiedName="name-fail-message-error-codes">FAIL Message Error Codes</name>
            <thead>
              <tr>
                <th align="left" colspan="1" rowspan="1">Status Code</th>
                <th align="left" colspan="1" rowspan="1">Error Code</th>
                <th align="left" colspan="1" rowspan="1">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left" colspan="1" rowspan="1">1</td>
                <td align="left" colspan="1" rowspan="1">Message Validation Error</td>
                <td align="left" colspan="1" rowspan="1">The message cannot be validated (see <xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>).</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">2</td>
                <td align="left" colspan="1" rowspan="1">Authentication Required</td>
                <td align="left" colspan="1" rowspan="1">The request cannot be handled because authentication is required.</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">3</td>
                <td align="left" colspan="1" rowspan="1">Authorization Failed</td>
                <td align="left" colspan="1" rowspan="1">The request cannot be handled because authorization failed.</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">4</td>
                <td align="left" colspan="1" rowspan="1">Administratively prohibited</td>
                <td align="left" colspan="1" rowspan="1">The request cannot be handled because of administrative policies.</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">5</td>
                <td align="left" colspan="1" rowspan="1">Out of Resources</td>
                <td align="left" colspan="1" rowspan="1">The request cannot be honored because resources (e.g., capacity) are insufficient.</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">6</td>
                <td align="left" colspan="1" rowspan="1">Network Presence Error</td>
                <td align="left" colspan="1" rowspan="1">The request cannot be honored because there is no network presence.</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">7</td>
                <td align="left" colspan="1" rowspan="1">More Time Rejected</td>
                <td align="left" colspan="1" rowspan="1">The request to extend the time for negotiation is rejected by the client.</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">8</td>
                <td align="left" colspan="1" rowspan="1">Unsupported Activation Type</td>
                <td align="left" colspan="1" rowspan="1">The request cannot be handled because the requested activation type is not
supported.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="activate" numbered="true" toc="include" removeInRFC="false" pn="section-9.2.11">
          <name slugifiedName="name-activate">ACTIVATE</name>
          <t indent="0" pn="section-9.2.11-1">The format of the ACTIVATE message is shown below:</t>
          <sourcecode type="rbnf" markers="false" pn="section-9.2.11-2">
&lt;ACTIVATE Message&gt; ::= &lt;VERSION&gt;
                       &lt;METHOD_CODE&gt;
                       &lt;SEQUENCE_NUMBER&gt;
                       &lt;TRANSACTION_ID&gt;
                       &lt;CUSTOMER_ORDER_IDENTIFIER&gt;
                       &lt;PROVIDER_ORDER_IDENTIFIER&gt;
                       &lt;NONCE&gt;
                       &lt;ACTIVATION_SCHEDULE&gt;
                       [&lt;INFORMATION_ELEMENT&gt;...]
</sourcecode>
          <t indent="0" pn="section-9.2.11-3">This message is sent by the CPNP client
          to request the activation of an existing service agreement. The
          message must include the same CUSTOMER_ORDER_IDENTIFIER,
          PROVIDER_ORDER_IDENTIFIER, and NONCE as those used when creating
          the order. The CPNP client may include a schedule target for
          activating this order. A new Transaction_ID must be assigned by the
          client.</t>
          <t indent="0" pn="section-9.2.11-4">Upon receipt of an ACTIVATE message, the server checks whether an
          order, having state "Completed", matches
          CUSTOMER_ORDER_IDENTIFIER, PROVIDER_ORDER_IDENTIFIER, and
          NONCE. </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.2.11-5">
            <li pn="section-9.2.11-5.1">If no completed order is found, the CPNP server generates a
              FAIL error with the appropriate error code (<xref target="fail" format="default" sectionFormat="of" derivedContent="Section 9.2.10"/>).</li>
            <li pn="section-9.2.11-5.2">
              <t indent="0" pn="section-9.2.11-5.2.1">If an order is found, the server checks whether it can honor
              the request:</t>
              <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-9.2.11-5.2.2">
                <li pn="section-9.2.11-5.2.2.1">A FAIL message is sent to the client if the server cannot
                  honor the request (e.g., out of resources or explicit
                  activation wasn't negotiated with this client).</li>
                <li pn="section-9.2.11-5.2.2.2">An ACK is sent to the client to confirm that the
                  immediate activation (or deactivation) of the order or its
                  successful scheduling if a non-null ACTIVATION_SCHEDULE was
                  included in the request. Note that setting
                  ACTIVATION_SCHEDULE to 0 in an ACTIVATE request has a
                  special meaning: it is used to request a deactivation of an
                  accepted order. </li>
              </ul>
            </li>
          </ul>
          <t indent="0" pn="section-9.2.11-6"><xref target="activateex" format="default" sectionFormat="of" derivedContent="Figure 16"/> illustrates the use of the ACTIVATE
          operation.</t>
          <figure anchor="activateex" align="left" suppress-title="false" pn="figure-16">
            <name slugifiedName="name-activate-flow-example">ACTIVATE Flow Example</name>
            <artwork align="center" name="" type="" alt="" pn="section-9.2.11-7.1">
+------+                              +------+
|Client|                              |Server|
+------+                              +------+
   |================ACTIVATE()==========&gt;|
   |&lt;==============ACK()=================|
   |                                     |
</artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="validation" numbered="true" toc="include" removeInRFC="false" pn="section-10">
      <name slugifiedName="name-cpnp-message-validation">CPNP Message Validation</name>
      <t indent="0" pn="section-10-1">Both the client and the server proceed with CPNP message validation. The
      following tables summarize the validation checks to be followed.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-10.1">
        <name slugifiedName="name-on-the-client-side-2">On the Client Side</name>
        <table align="left" pn="table-5">
          <name slugifiedName="name-client-side-validation-chec">Client Side Validation Checks</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Operation</th>
              <th align="left" colspan="1" rowspan="1">Validation Checks</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">PROCESSING</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier}
          must match an existing PQO with a state set to "PQOSent". The
          sequence number carried in the packet must be larger than the
          sequence number maintained by the client.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">OFFER</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier}
          must match an existing order with state set to "PQOSent", or {Source
          IP address, source port number, destination IP address, destination
          port number, Transaction-ID, Customer Order Identifier, Provider
          Order Identifier} must match an existing order with a state set to
          "ServerProcessing". The sequence number carried in the packet must
          be larger than the sequence number maintained by the client.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">ACK (QUOTATION Transaction)</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier,
          Provider Order Identifier, Offered Connectivity Provisioning Document}
          must match an order with a state set to "AcceptSent". The sequence
          number carried in the packet must be larger than the sequence number
          maintained by the client.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">ACK (UPDATE Transaction)</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier,
          Provider Order Identifier, Updated Connectivity Provisioning Document}
          must match an order with a state set to "AcceptSent". The sequence
          number carried in the packet must be larger than the sequence number
          maintained by the client.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">ACK (WITHDRAW Transaction)</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier,
          Provider Order Identifier, Empty Connectivity Provisioning Document}
          must match an order with a state set to "Cancelled". The sequence
          number carried in the packet must be larger than the sequence number
          maintained by the client.</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-10.2">
        <name slugifiedName="name-on-the-server-side-2">On the Server Side</name>
        <table align="left" pn="table-6">
          <name slugifiedName="name-server-side-validation-chec">Server Side Validation Checks</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Method</th>
              <th align="left" colspan="1" rowspan="1">Validation Checks</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">QUOTATION</td>
              <td align="left" colspan="1" rowspan="1">The source IP address passes existing access filters (if any).
          The sequence number carried in the packet must not be lower than the
          sequence number maintained by the server.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">PROCESSING</td>
              <td align="left" colspan="1" rowspan="1">The sequence number carried in the packet must be greater than
          the sequence number maintained by the server.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">CANCEL</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier}
          must match an order with state set to "PQOReceived" or
          "OfferProposed" or "ProcessingReceived" or "AcceptReceived". The
          sequence number carried in the packet must be greater than the
          sequence number maintained by the server.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">ACCEPT</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier,
          Provider Order Identifier, Nonce, Offered Connectivity Provisioning
          Document} must match an order with state set to "OfferProposed" or
          "ProcessingReceived". The sequence number carried in the packet must
          be greater than the sequence number maintained by the server.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">FAIL</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier,
          Provider Order Identifier} must match an order with state set to
          "AwaitingProcessing" and for which a request to grant more time to
          process an offer was requested. The sequence number carried in the
          packet must be greater than the sequence number maintained by the
          server.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">DECLINE</td>
              <td align="left" colspan="1" rowspan="1">{Source IP address, source port number, destination IP address,
          destination port number, Transaction-ID, Customer Order Identifier,
          Provider Order Identifier, Nonce} must match an order with state set
          to "OfferProposed" or "ProcessingReceived". The sequence number
          carried in the packet must be greater than the sequence number
          maintained by the server.</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">UPDATE</td>
              <td align="left" colspan="1" rowspan="1">The source IP address passes existing access filters (if any), and
          {Customer Order Identifier, Provider Order Identifier, Nonce} must
          match an existing order with state "Completed".</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">WITHDRAW</td>
              <td align="left" colspan="1" rowspan="1">The source IP address passes existing access filters (if any), and
          {Customer Order Identifier, Provider Order Identifier, Nonce} must
          match an existing order with state "Completed".</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">ACTIVATE</td>
              <td align="left" colspan="1" rowspan="1">The source IP address passes existing access filters (if any), and
          {Customer Order Identifier, Provider Order Identifier, Nonce} must
          match an existing order with a state of "Completed" and its
          activation procedure set to explicit.</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="behavior" numbered="true" toc="include" removeInRFC="false" pn="section-11">
      <name slugifiedName="name-theory-of-operation">Theory of Operation</name>
      <t indent="0" pn="section-11-1">Both the CPNP client and server proceed with message validation checks as
      specified in <xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-11.1">
        <name slugifiedName="name-client-behavior">Client Behavior</name>
        <section anchor="creation" numbered="true" toc="include" removeInRFC="false" pn="section-11.1.1">
          <name slugifiedName="name-order-negotiation-cycle">Order Negotiation Cycle</name>
          <t indent="0" pn="section-11.1.1-1">To place a PQO, the client first
          initiates a local quotation order object identified by a unique
          identifier assigned by the client (Client Order Identifier). The
          state of the quotation order is set to "Created". The client then
          generates a QUOTATION request that includes the assigned
          identifier, possibly an expected response time, a Transaction-ID,
          and a requested service (e.g., Requested CPD). The client may include additional Information Elements
          such as Customer Description or Negotiation Options.</t>
          <t indent="0" pn="section-11.1.1-2">The client may be configured to not enforce negotiation checks on
          EXPECTED_OFFER_TIME; if so, the client should either not include
          the EXPECTED_RESPONSE_TIME attribute in the PQO or it should set 
          the attribute to infinite.  </t>
          <t indent="0" pn="section-11.1.1-3">Once the request is sent to the server, the state of the request
          is set to "PQOSent", and if a response time is included in
          the quotation order, a timer is set to the expiration time as included in
          the QUOTATION request. The client also maintains a copy of the CPNP
          session entry details used to generate the QUOTATION request. The
          CPNP client must listen on the same port number that it used to send
          the QUOTATION request.</t>
          <t indent="0" pn="section-11.1.1-4">If no answer is received from the server before the
          retransmission timer expires (i.e., RETRANS_TIMER, <xref target="timers" format="default" sectionFormat="of" derivedContent="Section 8.5"/>), the client retransmits the message until
          maximum retry is reached (e.g., three times). The same sequence number
          is used for retransmitted packets.</t>
          <t indent="0" pn="section-11.1.1-5">If a FAIL message is received, the client may decide to issue
          another (corrected) request towards the same server, cancel the
          local order, or contact another server. The behavior of the client
          depends on the error code returned by the server in the FAIL
          message.</t>
          <t indent="0" pn="section-11.1.1-6">If a PROCESSING message matching the CPNP session entry (<xref target="session" format="default" sectionFormat="of" derivedContent="Section 8.3"/>) is received, the client updates the CPNP
          session entry with the PROVIDER_ORDER_IDENTIFIER information. If
          the client does not accept the expected offer time that may have
          been indicated in the PROCESSING message, the client may decide to
          cancel the quotation order. If the client accepts the
          EXPECTED_OFFER_TIME, it changes the state of the order to
          "ServerProcessing" and sets a timer to the value of
          EXPECTED_OFFER_TIME. If no offer is made before the timer expires,
          the client changes the state of the order to "Cancelled".</t>
          <t indent="0" pn="section-11.1.1-7">As a response to a time extension request (conveyed in a
          PROCESSING message that included a new EXPECTED_OFFER_TIME), the
          client may either grant this extension by issuing an ACK message or reject
          the time extension by issuing a FAIL message with a status code set to
          "More Time Rejected".</t>
          <t indent="0" pn="section-11.1.1-8">If an OFFER message matching the CPNP session entry is received,
          the client checks if a PROCESSING message having the same
          PROVIDER_ORDER_IDENTIFIER has been received from the server. If
          a PROCESSING message was already received for the same order, but the
          PROVIDER_ORDER_IDENTIFIER does not match the identifier included
          in the OFFER message, the client silently ignores the message. If a
          PROCESSING message with the same PROVIDER_ORDER_IDENTIFIER was
          already received and matches the CPNP transaction identifier, the
          client changes the state of the order to "OfferReceived" and sets a
          timer to the value of VALIDITY_OFFER_TIME indicated in the OFFER
          message.</t>
          <t indent="0" pn="section-11.1.1-9">If an offer is received from the server (i.e., as documented in
          an OFFER message), the client may accept or reject the offer. The
          client accepts the offer by generating an ACCEPT message that
          confirms that the client agrees to subscribe to the offer documented
          in the OFFER message; the state of the order is passed to
          "AcceptSent". The transaction is terminated if an ACK message is
          received from the server. If no ACK is received from the server, the
          client proceeds with the retransmission of the ACCEPT message until
          the maximum retry is reached (<xref target="retrans" format="default" sectionFormat="of" derivedContent="Section 11.4"/>).</t>
          <t indent="0" pn="section-11.1.1-10">The client may also decide to reject the offer by sending a
          DECLINE message. The state of the order is set by the client to
          "Cancelled". If an offer is not acceptable to the client, the client
          may decide to contact a new server or submit another order to the
          same server. Guidelines to issue an updated order or terminate the
          negotiation are specific to the client.</t>
          <t indent="0" pn="section-11.1.1-11">An order can be activated (or deactivated) using the ACTIVATE
          message or other accepted activation means (<xref target="RFC7297" sectionFormat="of" section="3.11" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7297#section-3.11" derivedContent="RFC7297"/>).</t>
        </section>
        <section anchor="corw" numbered="true" toc="include" removeInRFC="false" pn="section-11.1.2">
          <name slugifiedName="name-order-withdrawal-cycle">Order Withdrawal Cycle</name>
          <t indent="0" pn="section-11.1.2-1">A client may withdraw a completed order. This is achieved by
          issuing a WITHDRAW message. This message must include the Customer Order
          Identifier, Provider Order Identifier, and Nonce returned during the order
          negotiation cycle, as specified in <xref target="creation" format="default" sectionFormat="of" derivedContent="Section 11.1.1"/>.</t>
          <t indent="0" pn="section-11.1.2-2">If no ACK is received from the server, the client proceeds with
          the retransmission of the message. If no ACK is received after the
          maximum retry is exhausted, the client should log the information
          and must send an alarm to the administrator. If there is no specific
          instruction from the administrator, the client should schedule
          another Withdrawal cycle. The client must not retry this Withdrawal
          cycle more frequently than every 300 seconds and must not retry more
          frequently than every 60 seconds.</t>
        </section>
        <section anchor="cordu" numbered="true" toc="include" removeInRFC="false" pn="section-11.1.3">
          <name slugifiedName="name-order-update-cycle">Order Update Cycle</name>
          <t indent="0" pn="section-11.1.3-1">A client may update a completed order. This is achieved by
          issuing an UPDATE message. This message must include the Customer Order
          Identifier, Provider Order Identifier, and Nonce returned during the
          order negotiation cycle specified in <xref target="creation" format="default" sectionFormat="of" derivedContent="Section 11.1.1"/>. The client must include in the UPDATE
          message an Updated CPD with the requested changes.</t>
          <t indent="0" pn="section-11.1.3-2">The subsequent message exchange is similar to what is documented in
          <xref target="creation" format="default" sectionFormat="of" derivedContent="Section 11.1.1"/>.</t>
        </section>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-11.2">
        <name slugifiedName="name-server-behavior">Server Behavior</name>
        <section anchor="handling" numbered="true" toc="include" removeInRFC="false" pn="section-11.2.1">
          <name slugifiedName="name-order-processing">Order Processing</name>
          <t indent="0" pn="section-11.2.1-1">Upon receipt of a QUOTATION message from a client, the server
          sets a CPNP session, stores the Transaction-ID, and generates a Provider
          Order Identifier. Once preliminary validation checks are completed 
          (<xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>), the server may return a
          PROCESSING message to inform the client that the quotation order is
          received and it is under processing; the server may include an
          expected offer time to notify the client by when an offer will be
          proposed. An order with state "AwaitingProcessing" is created by the
          server. The server runs its decision-making process to decide which
          offer it can make to honor the received order. The offer should be
          made before the expected offer time expires.</t>
          <t indent="0" pn="section-11.2.1-2">If the server cannot make an offer, it sends backs a FAIL message
          with the appropriate error code (<xref target="fail" format="default" sectionFormat="of" derivedContent="Section 9.2.10"/>).</t>
          <t indent="0" pn="section-11.2.1-3">If the server requires more negotiation time, it must send a
          PROCESSING message with a new EXPECTED_OFFER_TIME. The client may
          grant this extension by issuing an ACK message or reject the time
          extension by issuing a FAIL message with the status code set to "More Time
          Rejected". If the client doesn't grant more time, the server must
          answer before the initial expected offer time; otherwise, the client
          will decline the quotation order.</t>
          <t indent="0" pn="section-11.2.1-4">If the server can honor the request, or if it can make an offer that
          meets only some of the requirements, it creates an OFFER message.
          The server must indicate the Transaction-ID, the Customer Order
          Identifier as indicated in the QUOTATION message, and the Provider
          Order Identifier generated for this order. The server must also
          include the Nonce and the offered service document (e.g., Offered
          CPD). The server includes an offer
          validity time as well. Once sent to the client, the server changes
          the state of the order to "OfferProposed", and a timer set to the
          validity time is initiated.</t>
          <t indent="0" pn="section-11.2.1-5">If the server determines that additional network resources from
          another Network Provider are needed to accommodate a quotation
          order, it will create child PQO(s) and will behave as a CPNP client
          to negotiate child PQO(s) with possible partnering Providers (see
          <xref target="child" format="default" sectionFormat="of" derivedContent="Figure 7"/>).</t>
          <t indent="0" pn="section-11.2.1-6">If no PROCESSING, ACCEPT, or DECLINE message is received before
          the expiry of the RETRANS_TIMER, the server resends the same offer
          to the client. This procedure is repeated until maximum retry is
          reached.</t>
          <t indent="0" pn="section-11.2.1-7">If an ACCEPT message is received before the offered validity time
          expires, the server proceeds with validation checks as specified in
          <xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>. The state of the corresponding
          order is passed to "AcceptReceived". The server sends back an ACK
          message to terminate the order processing cycle.</t>
          <t indent="0" pn="section-11.2.1-8">If a CANCEL or a DECLINE message is received, the server proceeds with
          the cancellation of the order. The state of the order is then passed
          to "Cancelled".</t>
        </section>
        <section anchor="sordw" numbered="true" toc="include" removeInRFC="false" pn="section-11.2.2">
          <name slugifiedName="name-order-withdrawal">Order Withdrawal</name>
          <t indent="0" pn="section-11.2.2-1">A client may withdraw a completed order by issuing a WITHDRAW
          message. Upon receipt of a WITHDRAW message, the server proceeds
          with the validation checks, as specified in <xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-11.2.2-2">
            <li pn="section-11.2.2-2.1">If the checks fail, a FAIL message is sent back to the client
              with the appropriate error code (e.g., 1 (Message Validation
              Error), 2 (Authentication Required), or 3 (Authorization
              Failed)).</li>
            <li pn="section-11.2.2-2.2">If the checks succeed, the server clears the clauses of the
              CPD, changes the state of the
              order to "Cancelled", and sends back an ACK message with an
              Empty CPD.</li>
          </ul>
        </section>
        <section anchor="sordu" numbered="true" toc="include" removeInRFC="false" pn="section-11.2.3">
          <name slugifiedName="name-order-update">Order Update</name>
          <t indent="0" pn="section-11.2.3-1">A client may update an order by issuing an UPDATE message. Upon
          receipt of an UPDATE message, the server proceeds with the
          validation checks as specified in <xref target="validation" format="default" sectionFormat="of" derivedContent="Section 10"/>:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-11.2.3-2">
            <li pn="section-11.2.3-2.1">If the checks fail, a FAIL message is sent back to the client
              with the appropriate error code (e.g., 1 (Message Validation
              Error), 2 (Authentication Required), 3 (Authorization Failed),
              or 6 (Network Presence Error)).</li>
            <li pn="section-11.2.3-2.2">The exchange of subsequent messages is similar to what is
              specified in <xref target="creation" format="default" sectionFormat="of" derivedContent="Section 11.1.1"/>. The server should
              generate a new Nonce value to be included in the offer made to
              the client.</li>
          </ul>
        </section>
      </section>
      <section anchor="sq_nu" numbered="true" toc="include" removeInRFC="false" pn="section-11.3">
        <name slugifiedName="name-sequence-numbers">Sequence Numbers</name>
        <t indent="0" pn="section-11.3-1">In each transaction, sequence numbers are used to protect the
        transaction against replay attacks. Each communicating partner of the
        transaction maintains two sequence numbers, one for incoming packets
        and one for outgoing packets. When a partner receives a message, it
        will check whether the sequence number in the message is larger than
        the incoming sequence number maintained locally. If not, the message
        will be discarded. If the message is proved to be legitimate, the
        value of the incoming sequence number maintained locally will be
        replaced by the value of the sequence number in the message. When a
        partner sends out a message, it will insert the value of the outgoing
        sequence number into the message and increase the outgoing sequence
        number maintained locally by 1.</t>
      </section>
      <section anchor="retrans" numbered="true" toc="include" removeInRFC="false" pn="section-11.4">
        <name slugifiedName="name-message-retransmission">Message Retransmission</name>
        <t indent="0" pn="section-11.4-1">If a transaction partner sends out a message and does not receive
        any expected reply before the retransmission timer expires (i.e.,
        RETRANS_TIMER), a transaction partner will try to retransmit the
        message. The procedure is reiterated until a maximum retry is reached
        (e.g., three times). An exception is the last message (e.g., ACK) sent
        from the server in a transaction. After sending this message, the
        retransmission timer will be disabled since no additional feedback is
        expected.</t>
        <t indent="0" pn="section-11.4-2">In addition, if the partner receives a retransmission of the last
        incoming packet it handled, the partner can resend the same answer to
        the incoming packet with a limited frequency.  If an answer cannot be 
        generated right after the request is received, the partner needs to
        generate a PROCESSING message as the answer.</t>
        <t indent="0" pn="section-11.4-3">To optimize message retransmission, a partner could also store the
        last incoming packet and the associated answer. Note that the times of
        retransmission could be decided by the local policy, and retransmission
        will not cause any change of sequence numbers.</t>
      </section>
    </section>
    <section anchor="og" numbered="true" toc="include" removeInRFC="false" pn="section-12">
      <name slugifiedName="name-some-operational-guidelines">Some Operational Guidelines</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-12.1">
        <name slugifiedName="name-cpnp-server-logging">CPNP Server Logging</name>
        <t indent="0" pn="section-12.1-1">The CPNP server should be configurable to log various events and
        associated information. Such information may include the following:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-12.1-2">
          <li pn="section-12.1-2.1">Client's IP address</li>
          <li pn="section-12.1-2.2">Any event change (e.g., new quotation order, offer sent, order
            confirmation, order cancellation, order withdrawal, etc.)</li>
          <li pn="section-12.1-2.3">Timestamp</li>
        </ul>
        <t indent="0" pn="section-12.1-3">The exact logging details are deployment specific.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-12.2">
        <name slugifiedName="name-business-guidelines-and-obj">Business Guidelines and Objectives</name>
        <t indent="0" pn="section-12.2-1">The CPNP server can operate in the following modes: </t>
        <dl spacing="normal" newline="true" indent="3" pn="section-12.2-2">
          <dt pn="section-12.2-2.1">Fully automated mode: </dt>
          <dd pn="section-12.2-2.2">The CPNP server
            is provisioned with a set of business guidelines and objectives
            that will be used as an input to the decision-making process. The
            CPNP server will service received orders that fall into these
            business guidelines; otherwise, requests will be escalated to an
            administrator that will formally validate or invalidate an order
            request. The set of policies to be configured to the CPNP server
            are specific to each administrative entity managing a CPNP
            server.</dd>
          <dt pn="section-12.2-2.3">Administrative-based mode: </dt>
          <dd pn="section-12.2-2.4">This mode
            assumes some or all of the CPNP server's operations are subject to a
            formal administrative validation. CPNP events will trigger
            appropriate validation requests that will be forwarded to the
            contact person(s) or department that is responsible for
            validating the orders. Administrative validation messages are
            relayed using another protocol (e.g., SMTP) or a dedicated
            tool.</dd>
        </dl>
        <t indent="0" pn="section-12.2-3">Business guidelines are local to each administrative entity.
        How validation requests are presented to an administrator are out of
        scope of this document; each administrative entity may decide the
        appropriate mechanism to enable for that purpose.</t>
      </section>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-13">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-13-1">Means to defend the server against denial-of-service attacks must be
      enabled. For example, access control lists can be enforced on the
      client, the server, or the network in between to allow a trusted client
      to communicate with a trusted server.</t>
      <t indent="0" pn="section-13-2">The client and the server must be mutually authenticated.
      Authenticated encryption must be used for data confidentiality and
      message integrity.</t>
      <t indent="0" pn="section-13-3">The protocol does not provide security mechanisms to protect the
      confidentiality and integrity of the packets transported between the
      client and the server. An underlying security protocol such as (e.g.,
      Datagram Transport Layer Security (DTLS) <xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/>,
      Transport Layer Security (TLS) <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>) must be
      used to protect the integrity and confidentiality of protocol messages.
      In this case, if it is possible to provide automated key management 
      (<xref target="RFC4107" section="2.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4107#section-2.1" derivedContent="RFC4107"/>)
      and associate each transaction with a different key, inter-transaction
      replay attacks can naturally be addressed. If the client and the server
      use a single key, an additional mechanism should be provided to protect against
      inter-transaction replay attacks between them. Clients must implement
      DTLS record replay detection (<xref target="RFC6347" sectionFormat="of" section="3.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6347#section-3.3" derivedContent="RFC6347"/>) or an equivalent mechanism to protect against
      replay attacks.</t>
      <t indent="0" pn="section-13-4">DTLS and TLS with a cipher suite offering confidentiality protection
      and the guidance given in <xref target="RFC7525" format="default" sectionFormat="of" derivedContent="RFC7525"/> must be
      followed to avoid attacks on (D)TLS.</t>
      <t indent="0" pn="section-13-5">The client must silently discard CPNP responses received from unknown
      CPNP servers. The use of a randomly generated Transaction-ID makes it
      hard to forge a response from a server with a spoofed IP address
      belonging to a legitimate CPNP server. Furthermore, CPNP demands that
      messages from the server must include the correct identifiers of the
      orders. Two order identifiers are used: one generated by the client and
      a second one generated by the server. Both the CPNP client and server
      maintain the local identifier they assigned and the one assigned by the
      peer for a given order. Means to detect swapping of these identifiers
      (even when such swapping occurs inadvertently at the client or the
      server) should be enabled by CPNP clients/servers. For example, the CPNP
      server should not assign a Provider agreement identifier that is equal
      to a Customer agreement identifier used by the CPNP client. </t>
      <t indent="0" pn="section-13-6">The Provider must enforce the means to protect privacy-related
      information included in the documents (see <xref target="cpd" format="default" sectionFormat="of" derivedContent="Section 8.7"/>)
      exchanged in CPNP messages <xref target="RFC6462" format="default" sectionFormat="of" derivedContent="RFC6462"/>. In
      particular, this information must not be revealed to external parties
      without the consent of Customers. Providers should enforce policies to
      make Customer fingerprinting difficult to achieve (e.g., in a recursion
      request). For more discussion about privacy, refer to <xref target="RFC6462" format="default" sectionFormat="of" derivedContent="RFC6462"/>
        <xref target="RFC6973" format="default" sectionFormat="of" derivedContent="RFC6973"/>.</t>
      <t indent="0" pn="section-13-7">The Nonce and the Transaction-ID attributes provide sufficient
      randomness and can effectively tolerate attacks raised by off-path
      adversaries, who do not have the capability of eavesdropping and
      intercepting the packets transported between the client and the server.
      Only authorized clients must be able to modify accepted CPNP orders. The
      use of a randomly generated Nonce by the server makes it hard to modify
      an agreement on behalf of a malicious third party.</t>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-14">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-14-1">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.boucadair-lisp-idr-ms-discovery" to="LISP-MS-DISCOVERY"/>
    <displayreference target="I-D.geng-netslices-architecture" to="NETSLICES-ARCH"/>
    <displayreference target="I-D.contreras-teas-slice-nbi" to="TEAS-SLICE-NBI"/>
    <displayreference target="I-D.ietf-opsawg-l3sm-l3nm" to="L3VPN-NETWORK-YANG"/>
    <displayreference target="I-D.itsumo-dsnp" to="DSNP"/>
    <displayreference target="I-D.nguyen-rap-cops-sls" to="COPS-SLS"/>
    <displayreference target="I-D.ietf-opsawg-l2nm" to="L2VPN-NETWORK-YANG"/>
    <references pn="section-15">
      <name slugifiedName="name-references">References</name>
      <references pn="section-15.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3339" quoteTitle="true" derivedAnchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author initials="G." surname="Klyne" fullname="G. Klyne">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Newman" fullname="C. Newman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2002" month="July"/>
            <abstract>
              <t indent="0">This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC4086" target="https://www.rfc-editor.org/info/rfc4086" quoteTitle="true" derivedAnchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schiller" fullname="J. Schiller">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Crocker" fullname="S. Crocker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="June"/>
            <abstract>
              <t indent="0">Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t indent="0">Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC5511" target="https://www.rfc-editor.org/info/rfc5511" quoteTitle="true" derivedAnchor="RFC5511">
          <front>
            <title>Routing Backus-Naur Form (RBNF): A Syntax Used to Form Encoding Rules in Various Routing Protocol Specifications</title>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="April"/>
            <abstract>
              <t indent="0">Several protocols have been specified in the Routing Area of the IETF using a common variant of the Backus-Naur Form (BNF) of representing message syntax.  However, there is no formal definition of this version of BNF.</t>
              <t indent="0">There is value in using the same variant of BNF for the set of protocols that are commonly used together.  This reduces confusion and simplifies implementation.</t>
              <t indent="0">Updating existing documents to use some other variant of BNF that is already formally documented would be a substantial piece of work.</t>
              <t indent="0">This document provides a formal definition of the variant of BNF that has been used (that we call Routing BNF) and makes it available for use by new protocols.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5511"/>
          <seriesInfo name="DOI" value="10.17487/RFC5511"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" quoteTitle="true" derivedAnchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t indent="0">This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7297" target="https://www.rfc-editor.org/info/rfc7297" quoteTitle="true" derivedAnchor="RFC7297">
          <front>
            <title>IP Connectivity Provisioning Profile (CPP)</title>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Jacquenet" fullname="C. Jacquenet">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Wang" fullname="N. Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="July"/>
            <abstract>
              <t indent="0">This document describes the Connectivity Provisioning Profile (CPP) and proposes a CPP template to capture IP/MPLS connectivity requirements to be met within a service delivery context (e.g., Voice over IP or IP TV).  The CPP defines the set of IP transfer parameters to be supported by the underlying transport network together with a reachability scope and bandwidth/capacity needs.  Appropriate performance metrics, such as one-way delay or one-way delay variation, are used to characterize an IP transfer service.  Both global and restricted reachability scopes can be captured in the CPP.</t>
              <t indent="0">Such a generic CPP template is meant to (1) facilitate the automation of the service negotiation and activation procedures, thus accelerating service provisioning, (2) set (traffic) objectives of Traffic Engineering functions and service management functions, and (3) improve service and network management systems with 'decision- making' capabilities based upon negotiated/offered CPPs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7297"/>
          <seriesInfo name="DOI" value="10.17487/RFC7297"/>
        </reference>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" quoteTitle="true" derivedAnchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t indent="0">Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references pn="section-15.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="AGAVE" target="https://rd.springer.com/article/10.1007/s12243-009-0103-4" quoteTitle="true" derivedAnchor="AGAVE">
          <front>
            <title>The AGAVE Approach for Network Virtualization: Differentiated Services Delivery</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization showOnFrontPage="true">EU FP7 ETICS Project</organization>
            </author>
            <author fullname="Panos Georgatsos" initials="P." surname="Georgatsos"/>
            <author fullname="N. Wang" initials="N." surname="Wang"/>
            <author fullname="D. Griffin" initials="D." surname="Griffin"/>
            <author fullname="G. Pavlou" initials="G." surname="Pavlou"/>
            <author fullname="M. Howarth" initials="M." surname="Howarth"/>
            <author fullname="A. Elizondo" initials="A." surname="Elizondo"/>
            <date month="April" year="2009"/>
          </front>
          <refcontent>Annals of Telecommunication, Volume 64, 277-288</refcontent>
          <seriesInfo name="DOI" value="10.1007/s12243-009-0103-4"/>
        </reference>
        <reference anchor="I-D.nguyen-rap-cops-sls" quoteTitle="true" target="https://tools.ietf.org/html/draft-nguyen-rap-cops-sls-03" derivedAnchor="COPS-SLS">
          <front>
            <title>COPS Usage for SLS negotiation (COPS-SLS)</title>
            <author initials="T" surname="Nguyen" fullname="Thi Nguyen">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="July" day="5" year="2002"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-nguyen-rap-cops-sls-03"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-nguyen-rap-cops-sls-03.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.itsumo-dsnp" quoteTitle="true" target="https://tools.ietf.org/html/draft-itsumo-dsnp-03" derivedAnchor="DSNP">
          <front>
            <title>Dynamic Service Negotiation Protocol (DSNP)</title>
            <author initials="J." surname="Chen" fullname="Jyh-Cheng Chen">
              <organization showOnFrontPage="true">National Tsing Hua University</organization>
            </author>
            <date month="March" day="2" year="2006"/>
            <abstract>
              <t indent="0">   This memo presents the specification of Dynamic Service Negotiation
   Protocol (DSNP).  DSNP is a  protocol to negotiate the SLS (Service
   Level  Specification) in  IP layer.   It  can be  used for  service
   negotiation from host  to network, network to host,  and network to
   network.   The  automated  negotiation  makes  service  negotiation
   efficient in terms of time, cost, and correctness, etc. The dynamic
   negotiation not only allows users to adapt their needs dynamically,
   but  also  let providers  better  utilize  the  network.  The  DSNP
   messages and packet formats are  detailed. DSNP can be used in both
   wireline  and  wireless  networks.   It is,  however,  particularly
   useful  in mobile  environment.  To  demonstrate the  usefulness of
   DSNP,   a  reference  wireless   QoS  architecture   is  presented.
   Exemplary applications are illustrated.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-itsumo-dsnp-03"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-itsumo-dsnp-03.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="ETICS" target="https://cordis.europa.eu/project/id/248567" quoteTitle="true" derivedAnchor="ETICS">
          <front>
            <title>Economics and Technologies of Inter-Carrier Services</title>
            <author fullname="" surname="">
              <organization showOnFrontPage="true">EU FP7 ETICS Project</organization>
            </author>
            <date month="January" year="2014"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-opsawg-l2nm" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-opsawg-l2nm-00" derivedAnchor="L2VPN-NETWORK-YANG">
          <front>
            <title>A Layer 2 VPN Network YANG Model</title>
            <author fullname="Samier Barguil">
              <organization showOnFrontPage="true">Telefonica</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios">
              <organization showOnFrontPage="true">Telefonica</organization>
            </author>
            <author fullname="Mohamed Boucadair">
              <organization showOnFrontPage="true">Orange</organization>
            </author>
            <author fullname="Luis Angel Munoz">
              <organization showOnFrontPage="true">Vodafone</organization>
            </author>
            <author fullname="Luay Jalil">
              <organization showOnFrontPage="true">Verizon</organization>
            </author>
            <author fullname="Jichun Ma">
              <organization showOnFrontPage="true">China Unicom</organization>
            </author>
            <date month="July" day="2" year="2020"/>
            <abstract>
              <t indent="0">   This document defines a YANG Data model (called, L2NM) that can be
   used to manage the provisioning of Layer 2 VPN services within a
   Service Provider Network.  This YANG module provides representation
   of the Layer 2 VPN Service from a network standpoint.  The module is
   meant to be used by a Network Controller to derive the configuration
   information that will be sent to relevant network devices.

   The L2NM YANG Data model complements the Layer 2 Service Model
   (RFC8466) by providing a network-centric view of the service that is
   internal to a Service Provider.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-l2nm-00"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-ietf-opsawg-l2nm-00.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-opsawg-l3sm-l3nm" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-opsawg-l3sm-l3nm-05" derivedAnchor="L3VPN-NETWORK-YANG">
          <front>
            <title>A Layer 3 VPN Network YANG Model</title>
            <author fullname="Samier Barguil">
              <organization showOnFrontPage="true">Telefonica</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios">
              <organization showOnFrontPage="true">Telefonica</organization>
            </author>
            <author fullname="Mohamed Boucadair">
              <organization showOnFrontPage="true">Orange</organization>
            </author>
            <author fullname="Luis Angel Munoz">
              <organization showOnFrontPage="true">Vodafone</organization>
            </author>
            <author fullname="Alejandro Aguado">
              <organization showOnFrontPage="true">Nokia</organization>
            </author>
            <date month="October" day="16" year="2020"/>
            <abstract>
              <t indent="0">   This document defines a L3VPN Network YANG Model (L3NM) that can be
   used to manage the provisioning of Layer 3 Virtual Private Network
   (VPN) services within a Service Provider's network.  The model
   provides a network-centric view of L3VPN services.

   L3NM is meant to be used by a Network Controller to derive the
   configuration information that will be sent to relevant network
   devices.  The model can also facilitate the communication between a
   service orchestrator and a network controller/orchestrator.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-l3sm-l3nm-05"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-ietf-opsawg-l3sm-l3nm-05.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.boucadair-lisp-idr-ms-discovery" quoteTitle="true" target="https://tools.ietf.org/html/draft-boucadair-lisp-idr-ms-discovery-01" derivedAnchor="LISP-MS-DISCOVERY">
          <front>
            <title>LISP Mapping Service Discovery at Large</title>
            <author fullname="Mohamed Boucadair">
	 </author>
            <author fullname="Christian Jacquenet">
	 </author>
            <date month="March" day="9" year="2016"/>
            <abstract>
              <t indent="0">   Locator/ID Separation Protocol (LISP) operation relies upon a mapping
   mechanism that is used by ingress/egress Tunnel Routers (xTR) to
   forward traffic over the LISP network.  The ability of dynamically
   discovering the Map-Resolver and Map-Server entities that provide
   such mapping services is meant to facilitate global LISP operation
   (automatic discovery of Map-Resolvers and Map-Servers).

   This document specifies a BGP Extended Communities attribute that can
   be used to dynamically discover LISP Mapping Systems of different
   domains.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boucadair-lisp-idr-ms-discovery-01"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-boucadair-lisp-idr-ms-discovery-01.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.geng-netslices-architecture" quoteTitle="true" target="https://tools.ietf.org/html/draft-geng-netslices-architecture-02" derivedAnchor="NETSLICES-ARCH">
          <front>
            <title>Network Slicing Architecture</title>
            <author fullname="Liang Geng">
              <organization showOnFrontPage="true">China Mobile</organization>
            </author>
            <author fullname="Jie Dong">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author fullname="Stewart Bryant">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author fullname="Kiran Makhijani">
              <organization showOnFrontPage="true">Huawei Technologies</organization>
            </author>
            <author fullname="Alex Galis">
              <organization showOnFrontPage="true">University College London</organization>
            </author>
            <author fullname="Xavier de Foy">
              <organization showOnFrontPage="true">InterDigital Inc.</organization>
            </author>
            <author fullname="Slawomir Kuklinski">
              <organization showOnFrontPage="true">Orange</organization>
            </author>
            <date month="July" day="3" year="2017"/>
            <abstract>
              <t indent="0">   This document defines the overall architecture of network slicing.
   Based on the general architecture, basic concepts of network slicing
   and examples of network slicing instances are introduced for
   clarification purposes.  Some architectural considerations about the
   data plane, control plane, management and orchestration of network
   slicing are described to give a general view of network slicing
   implementation principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-netslices-architecture-02"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-geng-netslices-architecture-02.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC2782" target="https://www.rfc-editor.org/info/rfc2782" quoteTitle="true" derivedAnchor="RFC2782">
          <front>
            <title>A DNS RR for specifying the location of services (DNS SRV)</title>
            <author initials="A." surname="Gulbrandsen" fullname="A. Gulbrandsen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Vixie" fullname="P. Vixie">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Esibov" fullname="L. Esibov">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2000" month="February"/>
            <abstract>
              <t indent="0">This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2782"/>
          <seriesInfo name="DOI" value="10.17487/RFC2782"/>
        </reference>
        <reference anchor="RFC3084" target="https://www.rfc-editor.org/info/rfc3084" quoteTitle="true" derivedAnchor="RFC3084">
          <front>
            <title>COPS Usage for Policy Provisioning (COPS-PR)</title>
            <author initials="K." surname="Chan" fullname="K. Chan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Seligson" fullname="J. Seligson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Durham" fullname="D. Durham">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Gai" fullname="S. Gai">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="McCloghrie" fullname="K. McCloghrie">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Herzog" fullname="S. Herzog">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Reichmeyer" fullname="F. Reichmeyer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Yavatkar" fullname="R. Yavatkar">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Smith" fullname="A. Smith">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2001" month="March"/>
            <abstract>
              <t indent="0">This document describes the use of the Common Open Policy Service (COPS) protocol for support of policy provisioning (COPS-PR).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3084"/>
          <seriesInfo name="DOI" value="10.17487/RFC3084"/>
        </reference>
        <reference anchor="RFC4026" target="https://www.rfc-editor.org/info/rfc4026" quoteTitle="true" derivedAnchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author initials="L." surname="Andersson" fullname="L. Andersson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Madsen" fullname="T. Madsen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="March"/>
            <abstract>
              <t indent="0">The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions.  The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications.  This has lead to the development of a partially new set of concepts used to describe the set of VPN services. </t>
              <t indent="0">To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept.  This document seeks to make the terminology in the area clearer and more intuitive.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4107" target="https://www.rfc-editor.org/info/rfc4107" quoteTitle="true" derivedAnchor="RFC4107">
          <front>
            <title>Guidelines for Cryptographic Key Management</title>
            <author initials="S." surname="Bellovin" fullname="S. Bellovin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="June"/>
            <abstract>
              <t indent="0">The question often arises of whether a given security system requires some form of automated key management, or whether manual keying is sufficient.  This memo provides guidelines for making such decisions. When symmetric cryptographic mechanisms are used in a protocol, the presumption is that automated key management is generally but not always needed.  If manual keying is proposed, the burden of proving that automated key management is not required falls to the proposer.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="107"/>
          <seriesInfo name="RFC" value="4107"/>
          <seriesInfo name="DOI" value="10.17487/RFC4107"/>
        </reference>
        <reference anchor="RFC4176" target="https://www.rfc-editor.org/info/rfc4176" quoteTitle="true" derivedAnchor="RFC4176">
          <front>
            <title>Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management</title>
            <author initials="Y." surname="El Mghazli" fullname="Y. El Mghazli" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Nadeau" fullname="T. Nadeau">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Chan" fullname="K. Chan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Gonguet" fullname="A. Gonguet">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="October"/>
            <abstract>
              <t indent="0">This document provides a framework for the operation and management of Layer 3 Virtual Private Networks (L3VPNs).  This framework intends to produce a coherent description of the significant technical issues that are important in the design of L3VPN management solutions. The selection of specific approaches, and making choices among information models and protocols are outside the scope of this document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4176"/>
          <seriesInfo name="DOI" value="10.17487/RFC4176"/>
        </reference>
        <reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6125" quoteTitle="true" derivedAnchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Hodges" fullname="J. Hodges">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="March"/>
            <abstract>
              <t indent="0">Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" quoteTitle="true" derivedAnchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author initials="R." surname="Enns" fullname="R. Enns" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schoenwaelder" fullname="J. Schoenwaelder" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Bierman" fullname="A. Bierman" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6462" target="https://www.rfc-editor.org/info/rfc6462" quoteTitle="true" derivedAnchor="RFC6462">
          <front>
            <title>Report from the Internet Privacy Workshop</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t indent="0">On December 8-9, 2010, the IAB co-hosted an Internet privacy workshop with the World Wide Web Consortium (W3C), the Internet Society (ISOC), and MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL).  The workshop revealed some of the fundamental challenges in designing, deploying, and analyzing privacy-protective Internet protocols and systems.  Although workshop participants and the community as a whole are still far from understanding how best to systematically address privacy within Internet standards development, workshop participants identified a number of potential next steps. For the IETF, these included the creation of a privacy directorate to review Internet-Drafts, further work on documenting privacy considerations for protocol developers, and a number of exploratory efforts concerning fingerprinting and anonymized routing.  Potential action items for the W3C included investigating the formation of a privacy interest group and formulating guidance about fingerprinting, referrer headers, data minimization in APIs, usability, and general considerations for non-browser-based protocols.</t>
              <t indent="0">Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect the views of the IAB, W3C, ISOC, or MIT CSAIL.  This document is not an  Internet Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6462"/>
          <seriesInfo name="DOI" value="10.17487/RFC6462"/>
        </reference>
        <reference anchor="RFC6574" target="https://www.rfc-editor.org/info/rfc6574" quoteTitle="true" derivedAnchor="RFC6574">
          <front>
            <title>Report from the Smart Object Workshop</title>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Arkko" fullname="J. Arkko">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="April"/>
            <abstract>
              <t indent="0">This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on 'Interconnecting Smart Objects with the Internet'.  The workshop took place in Prague on 25 March 2011.  The main goal of the workshop was to solicit feedback from the wider community on their experience with deploying IETF protocols in constrained environments.  This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community.</t>
              <t indent="0">Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6574"/>
          <seriesInfo name="DOI" value="10.17487/RFC6574"/>
        </reference>
        <reference anchor="RFC6770" target="https://www.rfc-editor.org/info/rfc6770" quoteTitle="true" derivedAnchor="RFC6770">
          <front>
            <title>Use Cases for Content Delivery Network Interconnection</title>
            <author initials="G." surname="Bertrand" fullname="G. Bertrand" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Stephan" fullname="E. Stephan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Burbridge" fullname="T. Burbridge">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Eardley" fullname="P. Eardley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Ma" fullname="K. Ma">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Watson" fullname="G. Watson">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="November"/>
            <abstract>
              <t indent="0">Content Delivery Networks (CDNs) are commonly used for improving the End User experience of a content delivery service while keeping cost at a reasonable level.  This document focuses on use cases that correspond to identified industry needs and that are expected to be realized once open interfaces and protocols supporting the interconnection of CDNs are specified and implemented.  This document can be used to motivate the definition of the requirements to be supported by CDN Interconnection (CDNI) interfaces.  It obsoletes RFC 3570.  This document is not an Internet Standards Track specification;  it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6770"/>
          <seriesInfo name="DOI" value="10.17487/RFC6770"/>
        </reference>
        <reference anchor="RFC6793" target="https://www.rfc-editor.org/info/rfc6793" quoteTitle="true" derivedAnchor="RFC6793">
          <front>
            <title>BGP Support for Four-Octet Autonomous System (AS) Number Space</title>
            <author initials="Q." surname="Vohra" fullname="Q. Vohra">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Chen" fullname="E. Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="December"/>
            <abstract>
              <t indent="0">The Autonomous System number is encoded as a two-octet entity in the base BGP specification.  This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities.  This document obsoletes RFC 4893 and updates RFC 4271.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6793"/>
          <seriesInfo name="DOI" value="10.17487/RFC6793"/>
        </reference>
        <reference anchor="RFC6830" target="https://www.rfc-editor.org/info/rfc6830" quoteTitle="true" derivedAnchor="RFC6830">
          <front>
            <title>The Locator/ID Separation Protocol (LISP)</title>
            <author initials="D." surname="Farinacci" fullname="D. Farinacci">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Fuller" fullname="V. Fuller">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Meyer" fullname="D. Meyer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Lewis" fullname="D. Lewis">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="January"/>
            <abstract>
              <t indent="0">This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).  No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure.  The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
              <t indent="0">Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6830"/>
          <seriesInfo name="DOI" value="10.17487/RFC6830"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973" quoteTitle="true" derivedAnchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Aboba" fullname="B. Aboba">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Peterson" fullname="J. Peterson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Morris" fullname="J. Morris">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Hansen" fullname="M. Hansen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Smith" fullname="R. Smith">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="July"/>
            <abstract>
              <t indent="0">This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7049" target="https://www.rfc-editor.org/info/rfc7049" quoteTitle="true" derivedAnchor="RFC7049">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t indent="0">The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.  These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7049"/>
          <seriesInfo name="DOI" value="10.17487/RFC7049"/>
        </reference>
        <reference anchor="RFC7149" target="https://www.rfc-editor.org/info/rfc7149" quoteTitle="true" derivedAnchor="RFC7149">
          <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Jacquenet" fullname="C. Jacquenet">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="March"/>
            <abstract>
              <t indent="0">Software-Defined Networking (SDN) has been one of the major buzz words of the networking industry for the past couple of years.  And yet, no clear definition of what SDN actually covers has been broadly admitted so far.  This document aims to clarify the SDN landscape by providing a perspective on requirements, issues, and other considerations about SDN, as seen from within a service provider environment.</t>
              <t indent="0">It is not meant to endlessly discuss what SDN truly means but rather to suggest a functional taxonomy of the techniques that can be used under an SDN umbrella and to elaborate on the various pending issues the combined activation of such techniques inevitably raises.  As such, a definition of SDN is only mentioned for the sake of clarification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7149"/>
          <seriesInfo name="DOI" value="10.17487/RFC7149"/>
        </reference>
        <reference anchor="RFC7215" target="https://www.rfc-editor.org/info/rfc7215" quoteTitle="true" derivedAnchor="RFC7215">
          <front>
            <title>Locator/Identifier Separation Protocol (LISP) Network Element Deployment Considerations</title>
            <author initials="L." surname="Jakab" fullname="L. Jakab">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Coras" fullname="F. Coras">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Domingo-Pascual" fullname="J. Domingo-Pascual">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Lewis" fullname="D. Lewis">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="April"/>
            <abstract>
              <t indent="0">This document is a snapshot of different Locator/Identifier Separation Protocol (LISP) deployment scenarios.  It discusses the placement of new network elements introduced by the protocol, representing the thinking of the LISP working group as of Summer 2013.  LISP deployment scenarios may have evolved since then.  This memo represents one stable point in that evolution of understanding.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7215"/>
          <seriesInfo name="DOI" value="10.17487/RFC7215"/>
        </reference>
        <reference anchor="RFC7491" target="https://www.rfc-editor.org/info/rfc7491" quoteTitle="true" derivedAnchor="RFC7491">
          <front>
            <title>A PCE-Based Architecture for Application-Based Network Operations</title>
            <author initials="D." surname="King" fullname="D. King">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="March"/>
            <abstract>
              <t indent="0">Services such as content distribution, distributed databases, or inter-data center connectivity place a set of new requirements on the operation of networks.  They need on-demand and application-specific reservation of network connectivity, reliability, and resources (such as bandwidth) in a variety of network applications (such as point-to-point connectivity, network virtualization, or mobile back-haul) and in a range of network technologies from packet (IP/MPLS) down to optical.  An environment that operates to meet these types of requirements is said to have Application-Based Network Operations (ABNO).  ABNO brings together many existing technologies and may be seen as the use of a toolbox of existing components enhanced with a few new elements.</t>
              <t indent="0">This document describes an architecture and framework for ABNO, showing how these components fit together.  It provides a cookbook of existing technologies to satisfy the architecture and meet the needs of the applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7491"/>
          <seriesInfo name="DOI" value="10.17487/RFC7491"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" quoteTitle="true" derivedAnchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author initials="A." surname="Bierman" fullname="A. Bierman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t indent="0">This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259" quoteTitle="true" derivedAnchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author initials="T." surname="Bray" fullname="T. Bray" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="December"/>
            <abstract>
              <t indent="0">JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t indent="0">This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8299" target="https://www.rfc-editor.org/info/rfc8299" quoteTitle="true" derivedAnchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author initials="Q." surname="Wu" fullname="Q. Wu" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Litkowski" fullname="S. Litkowski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Tomotaki" fullname="L. Tomotaki">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Ogaki" fullname="K. Ogaki">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="January"/>
            <abstract>
              <t indent="0">This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service.  This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364.  This model is intended to be instantiated at the management system to deliver the overall service.  It is not a configuration model to be used directly on network elements.  This model provides an abstracted view of the Layer 3 IP VPN service configuration components.  It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service.  How the configuration of network elements is done is out of scope for this document.</t>
              <t indent="0">This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible.  The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8309" target="https://www.rfc-editor.org/info/rfc8309" quoteTitle="true" derivedAnchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author initials="Q." surname="Wu" fullname="Q. Wu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Liu" fullname="W. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Farrel" fullname="A. Farrel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="January"/>
            <abstract>
              <t indent="0">The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t indent="0">A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t indent="0">This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture.  Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8329" target="https://www.rfc-editor.org/info/rfc8329" quoteTitle="true" derivedAnchor="RFC8329">
          <front>
            <title>Framework for Interface to Network Security Functions</title>
            <author initials="D." surname="Lopez" fullname="D. Lopez">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Lopez" fullname="E. Lopez">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Dunbar" fullname="L. Dunbar">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Strassner" fullname="J. Strassner">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Kumar" fullname="R. Kumar">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="February"/>
            <abstract>
              <t indent="0">This document describes the framework for Interface to Network Security Functions (I2NSF) and defines a reference model (including major functional components) for I2NSF.  Network Security Functions (NSFs) are packet-processing engines that inspect and optionally modify packets traversing networks, either directly or in the context of sessions to which the packet is associated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8329"/>
          <seriesInfo name="DOI" value="10.17487/RFC8329"/>
        </reference>
        <reference anchor="RFC8466" target="https://www.rfc-editor.org/info/rfc8466" quoteTitle="true" derivedAnchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author initials="B." surname="Wen" fullname="B. Wen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Fioccola" fullname="G. Fioccola" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Xie" fullname="C. Xie">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Jalil" fullname="L. Jalil">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="October"/>
            <abstract>
              <t indent="0">This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service.  It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service.  How this configuration of network elements is done is out of scope for this document.</t>
              <t indent="0">The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t indent="0">The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8597" target="https://www.rfc-editor.org/info/rfc8597" quoteTitle="true" derivedAnchor="RFC8597">
          <front>
            <title>Cooperating Layered Architecture for Software-Defined Networking (CLAS)</title>
            <author initials="LM." surname="Contreras" fullname="LM. Contreras">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="CJ." surname="Bernardos" fullname="CJ. Bernardos">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Lopez" fullname="D. Lopez">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Iovanna" fullname="P. Iovanna">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="May"/>
            <abstract>
              <t indent="0">Software-Defined Networking (SDN) advocates for the separation of the control plane from the data plane in the network nodes and its logical centralization on one or a set of control entities.  Most of the network and/or service intelligence is moved to these control entities.  Typically, such an entity is seen as a compendium of interacting control functions in a vertical, tightly integrated fashion.  The relocation of the control functions from a number of distributed network nodes to a logical central entity conceptually places together a number of control capabilities with different purposes.  As a consequence, the existing solutions do not provide a clear separation between transport control and services that rely upon transport capabilities.</t>
              <t indent="0">This document describes an approach called Cooperating Layered Architecture for Software-Defined Networking (CLAS), wherein the control functions associated with transport are differentiated from those related to services in such a way that they can be provided and maintained independently and can follow their own evolution path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8597"/>
          <seriesInfo name="DOI" value="10.17487/RFC8597"/>
        </reference>
        <reference anchor="RNAP" target="http://www.cs.columbia.edu/~xinwang/public/projects/protocol.html" quoteTitle="true" derivedAnchor="RNAP">
          <front>
            <title>A Resource Negotiation and Pricing Protocol (RNAP)</title>
            <author fullname="Xin Wang" initials="X." surname="Wang">
              <organization showOnFrontPage="true"/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SNAP" target="http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.5907" quoteTitle="true" derivedAnchor="SNAP">
          <front>
            <title>SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems</title>
            <author fullname="Karl Czajkowski"/>
            <author fullname="Ian Foster"/>
            <author fullname="Carl Kesselman"/>
            <author fullname="Volker Sander"/>
            <author fullname="Steven Tuecke"/>
            <date year="2002"/>
          </front>
          <seriesInfo name="DOI" value="10.1.1.19.5907"/>
        </reference>
        <reference anchor="SrNP" target="https://www.ist-tequila.org/presentations/srnp-pipcm.pdf" quoteTitle="true" derivedAnchor="SrNP">
          <front>
            <title>Service Negotiation Protocol (SrNP)</title>
            <author fullname="Panos Georgatsos" initials="P." surname="Georgatsos"/>
            <author fullname="Dimitris Giannakopoulos" initials="G." surname="Giannakopoulos"/>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.contreras-teas-slice-nbi" quoteTitle="true" target="https://tools.ietf.org/html/draft-contreras-teas-slice-nbi-02" derivedAnchor="TEAS-SLICE-NBI">
          <front>
            <title>Considerations for defining a Transport Slice NBI</title>
            <author fullname="Luis M. Contreras">
              <organization showOnFrontPage="true">Telefonica</organization>
            </author>
            <author fullname="Shunsuke Homma">
              <organization showOnFrontPage="true">NTT</organization>
            </author>
            <author fullname="Jose A. Ordonez-Lucena">
              <organization showOnFrontPage="true">Telefonica</organization>
            </author>
            <date month="July" day="13" year="2020"/>
            <abstract>
              <t indent="0">   The transport network is an essential component in the end-to-end
   delivery of services and, consequently, with the advent of network
   slicing it is necessary to understand what could be the way in which
   the transport network is consumed as a slice.  This document analyses
   the needs of potential transport slice customers (i.e., use cases) in
   order to identify the functionality required on the North Bound
   Interface (NBI) of a transport slice controller for satisfying such
   transport slice requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-contreras-teas-slice-nbi-02"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-contreras-teas-slice-nbi-02.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">Thanks to <contact fullname="Diego R. Lopez"/>, 
      <contact fullname="Adrian Farrel"/>, <contact fullname="Éric Vyncke"/>, 
      <contact fullname="Eric Kline"/>, and <contact fullname="Benjamin Kaduk"/> for the comments.</t>
      <t indent="0" pn="section-appendix.a-2">Thanks to those that reviewed this document for publication
      in the Independent Stream.</t>
      <t indent="0" pn="section-appendix.a-3">Special thanks to <contact fullname="Luis Miguel Contreras Murillo"/> for the detailed
      review.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Mohamed Boucadair" initials="M." role="editor" surname="Boucadair">
        <organization showOnFrontPage="true">Orange</organization>
        <address>
          <postal>
            <city>Rennes</city>
            <code>35000</code>
            <country>France</country>
          </postal>
          <email>mohamed.boucadair@orange.com</email>
        </address>
      </author>
      <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
        <organization showOnFrontPage="true">Orange</organization>
        <address>
          <postal>
            <city>Rennes</city>
            <code>35000</code>
            <country>France</country>
          </postal>
          <email>christian.jacquenet@orange.com</email>
        </address>
      </author>
      <author fullname="Dacheng Zhang" initials="D." surname="Zhang">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <email>dacheng.zhang@huawei.com</email>
        </address>
      </author>
      <author fullname="Panos Georgatsos" initials="P." surname="Georgatsos">
        <organization abbrev="CERTH" showOnFrontPage="true">Centre for Research and Innovation Hellas</organization>
        <address>
          <postal>
            <street>78, Filikis Etairias str.</street>
            <city>Volos</city>
            <region>Hellas</region>
            <code>38334</code>
            <country>Greece</country>
          </postal>
          <phone>+302421306070</phone>
          <email>pgeorgat@gmail.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
