<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc compact="yes"?>
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc strict="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>
<rfc category="info"
     docName="draft-liu-policy-based-management-framework-00"
     ipr="trust200902">
  <front>
    <title abbrev="SUPA Policy-based Management Framework">SUPA Policy-based Management Framework</title>

    <author fullname="Will(Shucheng) Liu" initials="W." surname="Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Bantian, Longgang District</street>
          <city>Shenzhen</city>
          <code>518129</code>
          <country>China</country>
        </postal>
        <email>liushucheng@huawei.com</email>
      </address>
    </author>

    <author fullname="Chongfeng Xie" initials="C." surname="Xie">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>China Telecom Information Technology Innovation Park</street>
          <city>Beijing</city>
          <code>102209</code>
          <country>China</country>
        </postal>
        <email>xiechf.bri@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="John Strassner" initials="J." surname="Strassner">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>2330 Central Expressway</street>
          <city>Santa Clara</city>
          <code>95138</code>
          <country>CA USA</country>
        </postal>
        <email>john.sc.strassner@huawei.com</email>
      </address>
    </author>

    <author fullname="Georgios Karagiannis" initials="G."
            surname="Karagiannis">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Hansaallee 205</street>
          <city>Dusseldorf</city>
          <code>40549</code>
          <country>Germany</country>
        </postal>
        <email>Georgios.Karagiannis@huawei.com</email>
      </address>
    </author>

    <author fullname="Maxim Klyus" initials="M." surname="Klyus">
      <organization>NetCracker</organization>
      <address>
        <postal>
          <street>Kozhevnicheskaya str.,7 Bldg. #1</street>
          <city>Moscow</city>
          <country>Russia</country>
        </postal>
        <email>klyus@netcracker.com</email>
      </address>
    </author>

    <author fullname="Jun Bi" initials="J." surname="Bi">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>Network Research Center, Tsinghua University</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>junbi@tsinghua.edu.cn</email>
      </address>
    </author>

	<author fullname="Ying Cheng" initials="Y." surname="Cheng">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <street>No.21 Financial Street, XiCheng District</street>
          <city>Beijing</city>
          <code>100033</code>
          <country>China</country>
        </postal>
        <email>chengying10@chinaunicom.cn</email>
      </address>
    </author>
   
	<author fullname="Dacheng Zhang" initials="D." surname="Zhang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
		  <street></street>
          <city>Beijing</city>
          <code></code>
          <country>China</country>
        </postal>
        <email>	dacheng.zhang@huawei.com</email>
      </address>
    </author>
	
    <date/>

    <abstract>
      <t>Simplified Use of Policy Abstractions (SUPA) defines base YANG data
      models to encode policy, which point to device-, technology-, and
      service-specific YANG models developed elsewhere. Policy
      rules within an operator's environment can be used to express
      high-level, possibly network-wide policies to a network management
      function (within a controller, an orchestrator, or a network element).
      The network management function can then control the configuration
      and/or monitoring of network elements and services. This document
      describes the SUPA basic framework, its elements and interfaces.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Traffic flows over increasingly complex enterprise and service provider networks become more and more important. Meanwhile, the rapid growth of the variety makes the task of network operations and management applications deploying new services much more difficult. Moreover, network operators want to deploy new services quickly and efficiently. Two possible mechanisms for dealing with this growing difficulty are the use of software abstractions to simplify the design and configuration of monitoring and control operations, and the use of programmatic control over the configuration and operation of such networks.  Policy-based management can be used to combine these two mechanisms into an extensible framework.</t>

      <t>Policy rules within an operator's environment are a set of rules that define how services are designed, delivered, and operated. The SUPA (Simplified Use of Policy Abstractions) data model represents high-level, possibly network-wide policy, which can be input to a network management function (within a controller, an orchestrator, or a network element).The network management function can then control the configuration
and/or monitoring of network elements and services according to such policies.</t>

       <t>SUPA defines a generic
      policy information model (GPIM) [I-D.ietf-supa-generic-policy-info-model] for use in network
      operations and management applications. The GPIM defines concepts and
      terminology needed by policy management independent of the form and
      content of the policy rule. The Event-Condition-Action (ECA)
	  Policy Rule Information Model (EPRIM) [I-D.ietf-supa-generic-policyinfo-model] extends the GPIM by defining how to build policy rules
	  according to the event-condition-action paradigm. 
	  </t>

      <t>Both the GPIM and the EPRIM are targeted at controlling the
      configuration and monitoring of network elements throughout the service
      development and deployment lifecycle. The GPIM and the EPRIM can both
      be translated into corresponding YANG [RFC6020][RFC6020bis] modules that
      define policy concepts, terminology, and rules in a generic and
      interoperable manner; additional YANG modules may also be derived from
      the GPIM and/or EPRIM to manage specific functions.</t>

      <t>The key benefit of policy management is that it enables different
      network elements and services to be instructed to behave the same way,
      even if they are programmed differently. Management applications will
      benefit from using policy rules that enable scalable and consistent
      programmatic control over the configuration and monitoring of network
      elements and services.</t>

	<t>Some typical and useful instances, for authors to understand the applicability of SUPA, such as SNMP blocking upon load of link reaching a threshold, virtual maching migration upon the changinng of user location, are written in [I-D.cheng-supa-applicability]. </t>
    </section>

	
	<section title="Terminology">
	  <t>SUPA: Simplified Use of Policy Abstractions, is the working group name, which defines a data model, to be used to represent high-level, possibly network-wide policies, which can be input to a network management function (within a controller, an orchestrator, or a network element). </t>
	  
	  <t>YANG: an acronym for "Yet Another Next Generation". YANG is a data modeling language used to model configuration and
   state data manipulated by the Network Configuration Protocol
   (NETCONF), NETCONF remote procedure calls, and NETCONF notifications.[RFC6020]</t>
   
	  <t>ECA: Event-Condition-Action, is a short-cut for referring to the structure of active rules in event driven architecture and active database systems.</t>
	  
	  <t>EMS: Element Management System, software to monitor and control network elements (devices) in telecommunications.</t>
	  
	  <t>NMS: Network Management System, a set of hardware and/or software tools that allow an IT professional to supervise the individual components of a network within a larger network management framework.</t>
	  
	  <t>OSS: Operations/Operational Support System,  are computer systems used by telecommunications service providers to manage their networks (e.g., telephone networks).</t>
	  
	  <t>BSS: Business Support Systems, are used to support various end-to-end telecommunication services.</t>
	  
	  <t> GPIM: Generic Policy Information Model, which defines concepts and
      terminology needed by policy management independent of the form and
      content of the policy rule. </t> 		
 		
	  <t> EPRIM: ECA Policy Rule Information Model, which extends the GPIM by defining how to build policy
      rules according to the event-condition-action paradigm.</t>
	  
	  <t>GPDM: Generic Policy Data Models [I-D.ietf-supa-generic-policy-data-model], are created from
        the GPIM. These YANG data model policies are used to control the
        configuration of network elements that model the service(s) to be
        managed. The relationship of information model (IM) and DM can be founded in [RFC3444].</t>
		
	  <t>Declarative Policy: policies that specify the goals to be achieved but not
        how to achieve those goals (also called "intent-based" policies). Please note that declarative policies are
        out of scope for the initial phase of SUPA. </t>
	</section>
	
    <section title="Framework for Generic Policy-based Management">
      <t>This section briefly describes the design and operation of the SUPA
      policy-based management framework.</t>

      <section title="Overview">
        <t>Figure 1 shows a simplified functional architecture of how SUPA is
        used to define policies for creating network element configuration
        snippets. (Note from Editor: a "snippet" is a small piece of information
        (e.g., part of a sentence that was cut out).) SUPA uses the GPIM to
        define a consensual vocabulary that different actors can use to
        interact with network elements and services. The EPRIM defines a
        generic structure for imperative policies. The GPIM, and/or the
        combination of the GPIM and the EPRIM, is converted to generic YANG
        data modules.</t>

        <t>In one possible approach (shown with
   asterisks in Figure 1), SUPA Generic Policy and SUPA ECA Policy
        YANG data modules together with the Resource and Service YANG data
        models specified in IETF (which define the specific elements that will
        be controlled by policies) are used by the Service Interface Logic.
        This Service Interface Logic creates appropriate input mechanisms for
        the operator to define policies (e.g., a web form or a script) for
        creating and managing the network configuration. The operator
        interacts with the interface, the policies input by operators are then translated to
        configuration snippets.</t>

        <t>Note that the Resource and Service YANG models may not exist. In this case, the SUPA generic
		policy YANG data modules serve as an extensible basis to develop new
		YANG data models for the Service Interface Logic 
		This transfers the work specified by the Resource and Service YANG
		data models specified in IETF into the Service Interface Logic.
		</t>

        <figure title="Figure 1: SUPA Framework">
          <artwork><![CDATA[                                    
                       +---------------------+
   +----------+       \|        SUPA         |
   |   IETF   |---+----+  Information Models |
   +----------+   |   /|    GPIM and EPRIM   |
                  |    +---------+-----------+
      Assignments |              | Defines Policy Concepts
      and Manage  |             \|/
        Content   |    +---------+-----------+
                  |   \|    SUPA Generic     |
                  +----+    & ECA Policy     |
                      /|  YANG Data modules  |
                       +---------+-----------+
                                 *  Possible Approach
   +-----------------------------*-----------------------------+
   |  Management System          *                             |
   |                            \*/                            |
   |            Fills  +---------+---------+  +-------------+  |
   | +--------+ Forms \| Service Interface |/ |Resource and |/ | +----+
   | |Operator|--------+       Logic       +--|Service YANG |----|IETF|
   | +--------+ Runs  /| (locally defined  |\ | Data Models |\ | +----+
   |           scripts |forms, scripts,...)|  +-------------+  |
   |                   +---------+---------+                   |
   |                            \|/                            |
   |                     +-------+--------+                    |
   |                     |  Local Devices |                    |
   |                     | and Management |                    |
   |                     |     Systems    |                    |
   |                     +----------------+                    |
   +-----------------------------------------------------------+
]]></artwork>
        </figure>

        <t>Figure 1 is exemplary. The Operator actor can
        interact with SUPA in other ways not shown in Figure 1. In addition,
        other actors (e.g., an application developer) that can interact with
        SUPA are not shown for simplicity.</t>

        <t>The EPRIM defines an ECA policy as an
        example of imperative policies. An ECA policy rule is activated when
        its event clause is true; the condition clause is then evaluated and,
        if true, signals the execution of one or more actions in the action
        clause. This type of policy explicitly defines the current and desired
        states of the system being managed. Imperative policy rules require
        additional management functions, which are explained in section 3.2
        below.</t>

        <t>Figure 2 shows how the SUPA Policy Model is used to create policy
        data models step by step and how the policy rules are used to
        communicate among various network management functions located on
        different layers.</t>

        <t>The Generic Policy Information Model (GPIM) is used to construct
        policies. The GPIM defines generic policy concepts, as well as two
        types of policies: ECA policy rules and declarative policy
        statements. </t>

        <t>A set of Generic Policy Data Models (GPDM) are then created from
        the GPIM. These YANG data model policies are then used to control the
        configuration of network elements that model the service(s) to be
        managed.</t>
		
		<t>Resource and Service YANG Data Models: models of the service as
        well as physical and virtual network topology including the resource
        attributes (e.g., data rate or latency of links) and operational
        parameters needed to support service deployment over the network
        topology.</t>

        <!--<t>SUPA designed YANG data models can be the input for management
        functions, and automatically generate interfaces and data stores.
        During the run time, components communicate with the data instances
        for management and monitoring.</t> added in version 01 by zhoutianran, removed in version 02 from the comments of Johannes merkle as as this paragraph is missing leading and not necessary explanation for the figure below.-->

        <figure title="Figure 2: SUPA Policy Model Framework">
          <artwork><![CDATA[
                              |  SUPA Policy Model
                              |
                              |  +----------------------------------+
                              |  | Generic Policy Information Model |
                              |  +----------------------------------+
                              |        D                 D
                              |        D   +-------------v-------------+
 +----------------------+     |        D   |   ECA Policy Rule         |
 | OSS/BSS/Orchestrator <--+  |        D   |   Information Model       |
 +----------^-----------+  |  |        D   +---------------------------+
            C              |  |        D                          D
            C              |  |  +----+D+------------------------+D+---+
            C              +-----+     D  SUPA Policy Data Model  D    |
 +----------v-----------+     |  | ----v-----------------------+  D    |
 |  EMS/NMS/Controller  <--------+ | Generic Policy Data Model |  D    |
 +----------^-----------+     |  | ----------------------------+  D    |
            C              +-----+              D                 D    |
            C              |  |  |    +---------v-----------------v--+ |
 +----------v-----------+  |  |  |    |  ECA Policy Rule Data Model  | |
 |  Network Element     <--+  |  |    +------------------------------+ |
 +----------------------+     |  +-------------------------------------+
                              |
                              |
]]></artwork>
        </figure>

        <t>In Figure 2:<list>
            <t>The double-headed arrow with Cs means communication;</t>

            <t>The arrow with Ds means derived from.</t>
          </list></t>

        <t>The components within this framework are:</t>

        <t>SUPA Policy Model: represents one or more policy modules that
        contain the following entities:</t>

        <t>Generic Policy Information Model: a model for defining policy rules
        that are independent of data repository, data definition, query,
        implementation languages, and protocol. This model is abstract and is
        used for design; it MUST be turned into a data model for
        implementation.</t>

        <t>Generic Policy Data Model: a model of policy rules that are
        dependent on data repository, data definition, query, implementation
        languages, and protocol.</t>

        <t>ECA Policy Rule Information Model (EPRIM): represents a policy
        rule as a statement that consists of an event clause, a condition
        clause, and an action clause. This type of Policy Rule explicitly
        defines the current and desired states of the system being managed.
        This model is abstract and is used for design; it MUST be turned into
        a data model for implementation.</t>

        <t>ECA Policy Rule Data Model: a model of policy rules, derived from
		EPRIM, while each policy rule consists of an event clause, a condition clause, and an
		action clause.
		</t>

        <t>EMS/NMS/Controller: represents one or more entities that are able
        to control the operation and management of a network infrastructure
        (e.g., a network topology that consists of Network Elements).</t>

        <t>Network Element (NE), which can interact with local or remote
        EMS/NMS/Controller in order to exchange information, such as
        configuration information, policy enforcement capabilities, and
        network status.</t>

        <t>Relationship between Policy, Service and Resource models can be
        illustrated by the figure below.</t>

        <figure title="Figure 3: Relationship between Policy, Service and Resource models">
          <artwork><![CDATA[                                    
      +---------------+                   +----------------+
      |    Policy     |         (1)       |    Service     |
      |               |*******************|                |
      |   ( SUPA )    |*******************| ( L3SM, ... )  |
      +---------------+                   +----------------+
             **                                  /*\
               **                                *
                 **                            *
              (2)  **                        *   (3)
                     **                    *
                       **                *
                         **            *
                     +-------------------+
                     |    Resource       |
                     |                   |
                     | (Inventory, ... ) |
                     +-------------------+
]]></artwork>
        </figure>

        <t>In Figure 3: <list>
            <t>(1) policy manages and can adjust service behavior as necessary
            (1:1..n). In addition, data from resources and services are used to select
			and/or modify policies during runtime.<vspace/> 
			(2) policy manages and can adjust resource
            behavior as necessary (1:1..n)<vspace/> 
			(3) resource hosts
            service; changing resources may change service behavior as
            necessary</t>
          </list></t>

        <t>Policies are used to control the management of resources and
        services, while data from resources and services are used to select
        and/or modify policies during runtime. More importantly, policies can
        be used to manage how resources are allocated and assigned to
        services. This enables a single policy to manage one or multiple
        services and resources as well as their dependencies. (1:1..n) in (1)
        and (2) below figure 3 show one policy rule is able to manages and
        can adjust one or multiple services/resources. Line (1) and (2)
        connecting policy to resource and policy to service are the same, and line
        (3) connecting resource to service is different as it's navigable only
        from resource to service.</t>
      </section>

      <section title="Operation">
        <t>SUPA can be used to define various types of policies, including
        policies that affect services and/or the configuration of individual
        or groups of network elements. SUPA can be used by a centralized
        and/or distributed set of entities for creating, managing, interacting
        with, and retiring policy rules.</t>

        <t>The SUPA scope is limited to policy information and data models.
        SUPA does not define network resource data models or network service
        data models; both are out of scope. Instead, SUPA makes use of
        network resource data models defined by other WGs or SDOs.</t>

        <t>Declarative policies are out of scope for the initial phase of SUPA.</t>
      </section>

      <section title="The GPIM and the EPRIM">
        <t>The GPIM provides a common vocabulary for representing concepts
        that are common to different types of policy, but which are
        independent of language, protocol, repository, and level of
        abstraction. Hence, the GPIM defines concepts and vocabulary needed by
        policy management systems independent of the form and content of the
        policy. The EPRIM is a more specific model that refines the GPIM to
        specify policy rules in an event-condition-action form.</t>

        <t>This enables different policies at different levels of abstraction
        to form a continuum, where more abstract policies can be translated
        into more concrete policies, and vice-versa. For example, the
        information model can be extended by generalizing concepts from an
        existing data model into the GPIM; the GPIM extensions can then be
        used by other data models.</t>
      </section>

      <section title="Creation of Generic YANG Modules">
        <t>An information model is abstract. As such, it cannot be directly
        instantiated (i.e., objects cannot be created directly from it).
        Therefore, both the GPIM and the combination of the GPIM and the
        EPRIM, are translated to generic YANG modules.</t>

        <t>SUPA will provide guidelines for translating the GPIM (or the
        combination of the GPIM and the EPRIM) into concrete YANG data models
        that define how to manage and communicate policies between systems.
        Multiple imperative policy YANG data models may be instantiated from
        the GPIM (or the combination of the GPIM and the EPRIM). In
        particular, SUPA will specify a set of YANG data models that will
        consist of a base policy model for representing policy management
        concepts independent of the type or structure of a policy, and as
        well, an extension for defining policy rules according to the ECA
        paradigm.(Note from Editor: This means that policies can be defined
   using the GPIM directly, or using the combination of the GPIM and the
   EPRIM. If you use only the GPIM, you get a technology- and vendor-independent
   information model that you are free to map to the data model of your choice;
   note that the structure of a policy is NOT defined. If you use the GPIM and
   the EPRIM, you get a technology- and vendor-independent information model that
 defines policies as an event-condition-action (i.e., imperative) rule.)</t>

        <t>The process of developing the GPIM, EPRIM and the
        derived/translated YANG data models is realized following the sequence
        shown below. After completing this process and if the implementation
        of the YANG data models requires it, the GPIM and EPRIM and the
        derived/translated YANG data models are updated and synchronized.</t>

        <t>(1)=&gt;(2)=&gt;(3)=&gt;(4)=&gt;(3')=&gt;(2')=&gt;(1')</t>

        <t>Where, (1)=GPIM; (2)=EPRIM; (3)=YANG data models; (4)=
        Implementation; (3')= update of YANG data models; (2')=update of
        EPRIM; (1') = update of GPIM</t>

        <t>The YANG module derived from the GPIM contains concepts and
        terminology for the common operation and administration of policy-
        based systems, as well as an extensible structure for policy rules of
        different paradigms. The YANG module derived from the EPRIM extends
        the generic nature of the GPIM by representing policies using an
        event-condition-action structure.</t>

        <t>The above sequence allows for the addition of new, as well as the
        editing of existing model elements in the GPIM and EPRIM. In practice,
        the implementation sequence may be much simpler. Specifically, it is
        unlikely that the GPIM will need to be changed. In addition, changes
        to the EPRIM will likely be focused on fine-tuning the behavior
        offered by a specific set of model elements.</t>
      </section>
    </section>

    <section title="Security Considerations ">
      <t>This informational document presents the framework and workflow of SUPA, as well as an explanation on the relationship of policy, service and resources. This document does not introduce any new security issues, and the framework has no security impact on the Internet. The same considerations are relevant as those for the base NETCONF protocol (see Section 9 in [RFC6241]).</t>
    </section>

    <section title="IANA Considerations ">
      <t>This document has no actions for IANA.</t>
    </section>

    <section title="Contributors">
      <t>The following people all contributed to creating this document,
      listed in alphabetical order: <list>
          <t>Ying Chen, China Unicom <vspace blankLines="0"/> Luis M.
          Contreras, Telefonica I+D <vspace blankLines="0"/> Dan Romascanu,
          Avaya<vspace blankLines="0"/> Juergen Schoenwaelder, Jacobs University,
          Germany<vspace blankLines="0"/> Qiong Sun, China Telecom</t>
        </list></t>
    </section>

    <section title="Acknowledgements">
      <t>This document has benefited from reviews, suggestions, comments and
      proposed text provided by the following members, listed in alphabetical
      order: Andy Bierman, Marc Blanchet, Benoit Claise, Joel Halpern, 
	Jonathan Hansford, Diego R. Lopez, Johannes Merkle, Gunter	Wang, Yangyang Wang, Bert Wijnen, Tianran Zhou.</t>

      <t>Part of the initial draft of this document was picked up from
      previous documents, and this section lists the acknowledgements from
      them.</t>

      <t>From "SUPA Value Proposition" [I-D.klyus-supa-value-proposition]</t>

      <t>The following people all contributed to creating this document,
      listed in alphabetical order: <list>
          <t>Vikram Choudhary, Huawei Technologies <vspace blankLines="0"/>
          Luis M. Contreras, Telefonica I+D <vspace blankLines="0"/> Dan
          Romascanu, Avaya <vspace blankLines="0"/> Juergen Schoenwaelder, Jacobs University, Germany <vspace blankLines="0"/> Qiong Sun, China
          Telecom<vspace/> Parviz Yegani, Juniper Networks</t>
        </list></t>

      <t>This document has benefited from reviews, suggestions, comments and
      proposed text provided by the following members, listed in alphabetical
      order: H. Rafiee, J. Saperia and C. Zhou.</t>

      <t>The authors of "SUPA Value Proposition" [I-D.klyus-supa-value-proposition] were: <list>
          <t>Maxim Klyus, Ed. , NetCracker<vspace/> John Strassner, Ed. ,
          Huawei Technologies<vspace/> Will(Shucheng) Liu, Huawei
          Technologies<vspace/> Georgios Karagiannis, Huawei
          Technologies<vspace/> Jun Bi, Tsinghua University</t>
        </list></t>

      <t>The initial draft of this document merged one document, and this
      section lists the acknowledgements from it.</t>

      <t>From "Problem Statement for Simplified Use of Policy Abstractions
      (SUPA)"  [I-D.karagiannis-supa-problem-statement]</t>

      <t>The authors of this draft would like to thank the following persons
      for the provided valuable feedback and contributions: Diego Lopez,
      Spencer Dawkins, Jun Bi, Xing Li, Chongfeng Xie, Benoit Claise, Ian
      Farrer, Marc Blancet, Zhen Cao, Hosnieh Rafiee, Mehmet Ersue, Simon
      Perreault, Fernando Gont, Jose Saldana, Tom Taylor, Kostas Pentikousis,
      Juergen Schoenwaelder, John Strassner, Eric Voit, Scott O. Bradner,
      Marco Liebsch, Scott Cadzow, Marie-Jose Montpetit. Tina Tsou, Will Liu
      and Jean-Francois Tremblay contributed to an early version of this
      draft.</t>

      <t>The authors of "Problem Statement for Simplified Use of Policy
      Abstractions (SUPA)"  [I-D.karagiannis-supa-problem-statement] were: <list>
          <t>Georgios Karagiannis, Huawei Technologies<vspace/> Qiong Sun,
          China Telecom<vspace/> Luis M. Contreras, Telefonica<vspace/> Parviz
          Yegani, Juniper<vspace/> John Strassner, Huawei
          Technologies<vspace/> Jun Bi, Tsinghua University</t>
        </list></t>

      <t>From "The Framework of Simplified Use of Policy Abstractions (SUPA)"
       [I-D.zhou-supa-framework]</t>

      <t>The authors of this draft would like to thank the following persons
      for the provided valuable feedback: Diego Lopez, Jose Saldana, Spencer
      Dawkins, Jun Bi, Xing Li, Chongfeng Xie, Benoit Claise, Ian Farrer, Marc
      Blancet, Zhen Cao, Hosnieh Rafiee, Mehmet Ersue, Mohamed Boucadair, Jean
      Francois Tremblay, Tom Taylor, Tina Tsou, Georgios Karagiannis, John
      Strassner, Raghav Rao, Jing Huang.</t>


      <t>The authors of "The Framework of Simplified Use of Policy
      Abstractions (SUPA)"  [I-D.zhou-supa-framework] were: <list>
          <t>Cathy Zhou, Huawei Technologies<vspace/> Luis M. Contreras,
          Telefonica<vspace/> Qiong Sun, China Telecom<vspace/> Parviz Yegani,
          Juniper</t>
        </list></t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119" ?>
    </references>

    <references title="Informative References">
      <?rfc include="reference.RFC.3198" ?>
	  <?rfc include="reference.RFC.3444" ?>
	  <?rfc include="reference.RFC.6020" ?>
	  <?rfc include="reference.RFC.6241" ?>
	  <?rfc include="reference.RFC.7285" ?>
	  <?rfc include="reference.RFC.7950" ?>
      <?rfc include="reference.I-D.ietf-supa-generic-policy-info-model" ?>
	  <?rfc include="reference.I-D.ietf-supa-generic-policy-data-model" ?>
	  <?rfc include="reference.I-D.karagiannis-supa-problem-statement" ?>
	  <?rfc include="reference.I-D.klyus-supa-value-proposition" ?>
	  <?rfc include="reference.I-D.zhou-supa-framework" ?>
	  <?rfc include="reference.I-D.cheng-supa-applicability" ?>
    </references>
  </back>
</rfc>
