<?xml version='1.0' encoding='ascii'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>
<rfc ipr="trust200902" docName="draft-jia-intarea-scenarios-problems-addressing-01" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en">

  <front>
    <title abbrev="Scenarios and Problems in Addressing">Challenging Scenarios and Problems in Internet Addressing</title>

    <author initials="Y." surname="Jia" fullname="Yihao Jia">
      <organization abbrev="Huawei">Huawei Technologies Co., Ltd</organization>
      <address>
        <postal>
          <street>156 Beiqing Rd.</street>
          <city>Beijing</city>
          <code>100095</code>
          <country>P.R. China</country>
        </postal>
        <email>jiayihao@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Shenoy" fullname="Nirmala Shenoy">
      <organization abbrev="RIT">Rochester Institute of Technology</organization>
      <address>
        <postal>
          <street/>
          <city>New-York</city>
          <code>14623</code>
          <country>USA</country>
        </postal>
        <email>nxsvks@rit.edu</email>
      </address>
    </author>
    <author initials="P." surname="Mendes" fullname="Paulo Mendes">
      <organization abbrev="Airbus">Airbus</organization>
      <address>
        <postal>
          <street>Willy-Messerschmitt Strasse 1</street>
          <city>Munich</city>
          <code>81663</code>
          <country>Germany</country>
        </postal>
        <email>paulo.mendes@airbus.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake 3rd" fullname="Donald E. Eastlake 3rd">
      <organization abbrev="Futurewei">Futurewei Technologies</organization>
      <address>
        <postal>
          <street>2386 Panoramic Circle</street>
          <city>Apopka, FL</city>
          <code>32703</code>
          <country>United States of America</country>
        </postal>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization abbrev="China Mobile">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Ave</street>
          <city>Xicheng, Beijing</city>
          <code>100053</code>
          <country>P.R. China</country>
        </postal>
        <email>liupengyjy@chinamobile.com</email>
      </address>
    </author>

    <date/>

    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Internet Protocol (IP) has been the major technological success in information technology of the last half century. As the Internet becomes pervasive, IP has been replacing communication technology for many domain-specific solutions. However, domains with specific requirements as well as communication behaviors and semantics still exist and represent what <xref target="RFC8799" pageno="false" format="default"/> recognizes as &#8220;limited domains&#8221;.</t>

<t>This document describes well-recognized scenarios that showcase possibly different addressing requirements, which are challenging to be accommodated in the IP addressing model. These scenarios highlight issues related to the Internet addressing model and call for starting a discussion on a way to re-think/evolve the addressing model so to better accommodate different domain-specific requirements.</t>

<t>The issues identified in this document are complemented and deepened by a  detailed gap analysis in a separate companion document <xref target="GAP_ANALYSIS" pageno="false" format="default"/>.</t>



    </abstract>


  </front>

  <middle>


<section anchor="SEC:intro" title="Introduction" numbered="true" toc="default">

<t>The Internet Protocol (IP), positioned as the unified protocol at the (Internet) network layer, is seen by many as key to the innovation stemming from Internet-based applications and services. Even more so, with the success of TCP/IP protocol stack, IP has been gradually replacing existing domain-specific protocols, evolving into the core protocol of the entire communication system. At its inception roughly 40 years ago <xref target="RFC0791" pageno="false" format="default"/>, the Internet addressing system, represented in the form of the IP address and its locator-based semantics, has brought the notion of a &#8216;common addressing for all communication&#8217;. Compared to proprietary technology-specific solutions, such &#8216;common addressing for all communication&#8217; advance ensures end-to-end communication from any device connected to the Internet to another.</t>

<t>However, scenarios, associated services, node behaviors, and requirements on packet delivery have since been significantly extended, with Internet technologies being developed to accommodate them in the framework of addressing that stood at the beginning of the Internet&#8217;s development. This evolution is reflected in the concept of the &#8220;Limited Domain&#8221;, first introduced in <xref target="RFC8799" pageno="false" format="default"/>. It refers to a single physical network, attached to or running in parallel with the Internet, or is defined by a set of users and nodes distributed over a much wider area, but drawn together by a single virtual network over the Internet. Key to a limited domain is that requirements, behaviors, and semantics could be noticeable local and, more importantly, specific to the limited domain. Very often, the realization of a limited domain is defined by specific communication scenario(s) that exhibit the domain-specific behaviors and pose the requirements that lead to the establishment of the limited domain.</t>

<t>One key architectural aspect, when communicating within limited domains, is that of addressing and, therefore, the address structure, as well as the semantic that is being used for the routing of packets. The topological location centrality of IP is fundamental when reconciling the often differing semantics for &#8216;addressing&#8217; that can be found in those limited domains. The result of this fundamental role of the single IP addressing is that limited domains have to adopt specific solutions, e.g., translating/mapping/converting concepts, semantics, and ultimately, domain-specific addressing, into the common IP addressing used across limited domains.</t>

<t>This document advocates flexibility in addressing in order to accommodate limited domain specific semantics, while, if possible, ensuring a single holistic addressing scheme able to reduce, or even entirely remove, the need for aligning the address semantics of different limited domains, such as the current topological location semantic of the Internet. Ultimately, such holistic addressing could be beneficial to those communication scenarios realized within limited domains by improving efficiency, removing of constraints imposed by needing to utilize the limited semantics of IP addressing, and/or in other ways.</t>

<t>In other words, this document revolves around the following question:</t>

<t><list style="empty">
  <t>&#8220;Should limited domains purely rely on IP addresses and therefore deal with the complexity of translating any semantic mismatch themselves, or should flexibility for supporting those limited domains be a key focus for an evolved Internet addressing?&#8221;</t>
</list></t>

<t>To that end, this document describes well-recognized scenarios in limited domains that could benefit from greater flexibility in addressing and analyses problems encountered throughout these scenarios due to the lack of that flexibility. The purpose of this memo is thus to stimulate discussion on the emerging needs for addressing at large with the possibility to fundamentally re-think the addressing in the Internet beyond the current objectives of IPv6 <xref target="RFC8200" pageno="false" format="default"/>.</t>

<t>It is important to remark that any change in the addressing, hence at the data plane level, leads to changes and challenges at the control plane level, i.e., routing. The latter is an even harder problem than just addressing and might need more research efforts that are beyond the objective of this document, which focuses solely on the data plane.</t>

<t>The content in this document is complemented by a detailed gap analysis, which can be found in <xref target="GAP_ANALYSIS" pageno="false" format="default"/>, that elaborates on the issues identified in this memo in reference to extensions to Internet addressing that have attempted to address those issues.</t>

<!-- BACKUP
# Conventional Terminology {#SEC:term}
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here.
-->

</section>
<section anchor="SEC:cases" title="Communication Scenarios in Limited Domains" numbered="true" toc="default">

<t>The following sub-sections outline a number of scenarios, all of which belong to the concept of &#8220;limited domains&#8221; <xref target="RFC8799" pageno="false" format="default"/>. While the list of scenarios may look long, this document focuses on scenarios with a number of aspects that we observe in those limited domains, captured in the sub-section titles. For each scenario, we point at possible challenges, which we will pick upon in <xref target="SEC:problem" pageno="false" format="default"/>, when describing more formally the existing  shortcomings in current Internet addressing.</t>

<section anchor="SEC:constrained" title="Communication in Constrained Environments" numbered="true" toc="default">

<t>In a number of communication scenarios, such as those encountered in the Internet of Things (IoT), a simple, low-cost communication network is required, and there are limitations for network devices in computational power, memory, and energy availability. In addition to IEEE 802.15.4, i.e., Low-Rate Wireless Personal Area Network <xref target="LR-WPAN" pageno="false" format="default"/>, several limited domains exist through utilizing link layer technologies such as Bluetooth Low Energy (BLE) <xref target="BLE" pageno="false" format="default"/>, Digital European Cordless Telecommunications (DECT) - Ultra Low Energy (ULE) <xref target="DECT-ULE" pageno="false" format="default"/>, Master-Slave/Token-Passing (MS/TP) <xref target="BACnet" pageno="false" format="default"/>, Near-Field-Communication (NFC) <xref target="ECMA-340" pageno="false" format="default"/>, and Power Line Communication (PLC) <xref target="IEEE_1901.1" pageno="false" format="default"/>.</t>

<t>Generally, a group of IoT network devices form a constrained nodes network at the edge, and IoT terminals connect to these network devices for data transmission.
This type of networks and IoT devices in the network require as little computational power as possible, small memory requirements, good energy availability to reduce the total cost of ownership of the network. Furthermore, in the context of industrial IoT, real-time requirements and scalability make IP technology not naturally suitable as communication technology (<xref target="OCADO" pageno="false" format="default"/>).</t>

<t>The end-to-end principle (detailed in <xref target="RFC2775" pageno="false" format="default"/>) requires Internet protocols (e.g., IPv6 <xref target="RFC8200" pageno="false" format="default"/>) to run on such constrained node networks, allowing IoT devices using multiple communication technologies to talk on the Internet. Often, devices located at the edge of constrained networks act as gateway devices, usually performing header compression (<xref target="RFC4919" pageno="false" format="default"/>). To ensure security and reliability, multiple gateways must be deployed. IoT devices on the network can select one of those gateways for traffic passthrough by the devices on the (limited domain) network.</t>

<t>Given the constraints imposed on the computational and possibly also communication technology, the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., IPv6 address, may pose a challenge when operating such networks.</t>

<t>Another example of a constrained environment is an aircraft, which encompasses not only passenger communication but also the integration of real-time data exchange to ensure that processes and functions in the cabin are automatically monitored or actuated. Two possible examples are large scale passenger aircraft and military aircraft.</t>

<t>Large scale passenger aircraft (and their networks) have high requirements placed on them for performance, efficiency, and high dispatch reliability. Additionally, due to their size and commercial operation, they often have multiple network domains, including high criticality Aircraft Control Domain networks, Aircraft Information Services Domain, as well as Passenger Information Entertainment System Domains. The onboard presence of multiple domains, especially when interconnected, as well as design assurance levels drives a wide variety of traffic requirements and additional security requirements on network implementations.</t>

<t>In what concerns avionics networks, the goal for any aircraft network is to be able to send and receive information reliably and seamlessly. From this perspective, the medium with which these packets of information are sent is of little consequence so long as there is a level of determinism to it. However, there is currently no effective method in implementing wireless inter- and intra-communications between all subsystems. The emerging wireless sensor network technology in commercial applications such as smart thermostat systems, and smart washer/dryer units could be transposed onto aircraft and fleet operations. The proposal for having an Wireless Avionics Intra-Communications (WAIC) system promises reduction in the complexity of electrical wiring harness design and fabrication, reduction in wiring weight, increased configuration, and potential monitoring of otherwise inaccessible moving or rotating aircraft parts. Similar to the IoT concept, WAIC systems consist of short-range communications and are a potential candidate for passenger entertainment systems, smoke detectors, engine health monitors, tire pressure monitoring systems, and other kinds of aircraft maintenance systems.</t>

<t>While there are still many obstacles in terms of network security, traffic control, and technical challenges, future WAIC can enable real-time seamless communications between aircraft and between ground teams and aircraft as opposed to the discrete points of data leveraged today in aircraft communications. For that, WAIC infrastructure should also be connected to outside IP based networks in order to access edge/cloud facilities for data storage and mining. However, the restricted capacity (energy, communication) of most aircraft devices (e.g. sensors) and the nature of the transmitted data &#8211; periodic transmission of small packets &#8211; may pose some challenges for the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., an IPv6 address. Moreover, most of the aircraft applications and services are focused on the data (e.g. temperature of gas tank on left wing) and not on the topological location of the data source. This means that the current topological location semantic of IP addresses is not beneficial for aircraft applications and services.</t>

<t>Greater flexibility in Internet addressing may avoid complex and energy hungry operations, like header compression and fragmentation, necessary to translate protocol headers from one limited domain to another, while enabling semantics different from locator-based addressing may better support the communication that occurs in those environments.</t>

</section>
<section anchor="SEC:dynamic" title="Communication within Dynamically Changing Topologies" numbered="true" toc="default">

<t>Communication may occur over networks that exhibit dynamically changing topologies. One such example is that of satellite networks, providing global Internet connections through a combination of inter-satellite and ground station communication. With the convergence of space-based and terrestrial networks, users can experience seamless broadband access, e.g., on cruise ships, flights, and within cars, often complemented by and seamlessly switching between Wi-Fi, cellular, or satellite based networks at any time.</t>

<t>The satellite network service provider will plan the transmission path of user traffic based on the network coverage, satellite orbit, route, and link load, providing potentially high-quality Internet connections for users in areas that are not, or hard to be, covered by terrestrial networks. The involved topologies of the satellite network will be changing constantly while observing a regular flight pattern in relation to other satellite and predictable overflight patterns to ground users.</t>

<t>Although satellite bearer services are capable of transporting IPv4 and IPv6, as well as associated protocols such as IP Multicast, DNS services and routing information, no IP functionality is implemented on-board the spacecraft limiting the capability of leveraging for instance large scale satellite constellations.</t>

<t>One of the major constraints of deploying routing capability on board a satellite is power consumption. Due to this, space routers may end up being intermittently powered up during a daytime sunlit pass. Another limitation of the first generation of IP routers in space was the lack of capability to remotely manage and upgrade software while in operation. This will lead to an intermittent operation of the space router.</t>

<t>The limitations faced in early development of IP based satellite communication payloads, showed the need to develop a flexible networking solution that would only allow delay tolerant communications in the present of intermittent connectivity as well as a networking solution able to perform in a scenario encompassing mobile devices with the capability of storing data, leading to a significant reduction of latency, which is the major impairment of satellite networks. However, the inefficiencies of the current Internet architecture with regard to different aspects such as mobility, traffic management, or content delivery have progressively led to the ossification of the Internet. The root of these inefficiencies is the fact that the current Internet host centric model does not match the Internet dominant usage, which involves end-users exchanging information or accessing services, independently of the device where the information is located or which provides the service. Moreover the current IP addressing schemes, with focus on IP unicast addressing with extended deployment of IP multicast and some IP anycast do not take advantage of the broadcast nature of satellite networks. Moreover networking platforms based on a name (data or service) based addressing scheme would bring several potential benefits to satellite networks aiming to tackle their major challenges, including high propagation delay and changing network topology in the case of LEO constellations.</t>

<t>Another example is that of vehicular communication, where services may be accessed across vehicles, such as self-driving cars, for the purpose of collaborative objection recognition (e.g., for collision avoidance), road status conveyance (e.g., for pre-warning of road-ahead conditions), and other purposes. Communication may include Road Side Units (RSU) with the possibility to create ephemeral connections to those RSUs for the purpose of workload offloading, joint computation over multiple (vehicular) inputs, and other purposes <xref target="I-D.ietf-lisp-nexagon" pageno="false" format="default"/>. Communication here may exhibit a multi-hop nature, not just involving the vehicle and the RSU over a direct link. Those topologies are naturally changing constantly due to the dynamic nature of the involved communication nodes.</t>

<t>The advent of Flying Ad-hoc NETworks (FANETs) has opened up an opportunity to create new added-value services. Although these networks share common features with vehicular ad hoc networks, they present several unique characteristics such as energy efficiency, mobility degree, the capability of swarming, and the potential large scale of swarm networks. Due to high mobility of FANET nodes, the network topology changes more frequently than in a typical vehicular ad hoc network. From a routing point of view, although ad-hoc reactive and proactive routing approaches can be used, there are other type of routing protocols that have been developed for FANETS, such as hybrid routing protocols and position based routing protocols, aiming to increase efficiency in large scale networks with dynamic topologies.</t>

<t>Both type of protocols challenge the current Internet addressing semantic: in the case of hybrid protocols, two different routing strategies are used inside and outside a network zone. While inside a zone packets are routed to a specific destination IP address, between zones, query packets are routed to a subset of neighbors as determined by a bordercast algorithm. In the case of position based routing protocol, the IP addressing scheme is not used at all, since packets are routing to a different identifier, corresponding to the geographic location of the destination and not its topological location.</t>

<t>Moreover most of the application/services deployed in FANETs tend to be agnostic of the topological location of nodes, being instead focus on the location of data or services. This distinction is even more important because is dynamic network such as FANET robust networking solutions may rely on the redundancy of data and services, meaning that they may be found in more than one device in the network.</t>

<t>In the aforementioned network technologies, there is a significant difference between the high dynamics of the underlying network topologies, compared to the relative static nature of terrestrial network topology, as reported in <xref target="HANDLEY" pageno="false" format="default"/>. As a consequence, the notion of a topological network location becomes restrictive in the sense that not only the relation between network nodes and user endpoint may change, but also the relation between the nodes that form the network itself. This may lead to the challenge of maintaining and updating the topological addresses in this constantly changing network topology.</t>

<t>In attempts to utilize entirely different semantics for the addressing itself, geographic-based routing, such as in <xref target="CARTISEAN" pageno="false" format="default"/>, has been proposed for MANETs (Mobile Ad-hoc NETworks) through providing geographic coordinates based addresses to achieve better routing performance, lower overhead, and lower latency <xref target="MANET1" pageno="false" format="default"/>.</t>

<t>Flexibility in Internet addressing here would allow for accommodating such geographic address semantics into the overall Internet addressing, while also enabling name/content-based addressing, utilizing the redundancy of many network locations providing the possible data.</t>

</section>
<section anchor="SEC:mobility" title="Communication among Moving Endpoints" numbered="true" toc="default">

<t>When packet switching was first introduced, back in the 60s/70s, it was intended to replace the rigid circuit switching with a communication infrastructure that was more resilient to failures. As such, the design never really considered communication endpoints as mobile. Even in the pioneering ALOHA <xref target="ALOHA" pageno="false" format="default"/> system, despite considering wireless and satellite links, the network was considered static (with the exception of failures and satellites, which fall in what is discussed in <xref target="SEC:dynamic" pageno="false" format="default"/>). Ever since, a lot of efforts have been devoted to overcome such limitations once it became clear that endpoint mobility will become a main (if not THE main) characteristic of ubiquitous communication systems.</t>

<t>The IETF has for a long time worked on solutions that would allow extending the IP layer with mobility support. Because of the topological semantic of IP addresses, endpoints need to change addresses each time they visit a different network. However, because routing and endpoint identification is also IP address based, this leads to a communication disruption.</t>

<t>To cope with such a situation, anchor-based Mobile IP mechanisms have been introduced (<xref target="RFC5177" pageno="false" format="default"/>, <xref target="RFC6626" pageno="false" format="default"/> <xref target="RFC5944" pageno="false" format="default"/>, <xref target="RFC5275" pageno="false" format="default"/>). Mobile IP is based on a relatively complex and heavy mechanism that makes it hard to deploy and it is not very efficient. Furthermore, it is even less suitable than native IP in constrained environments like the ones discussed in <xref target="SEC:constrained" pageno="false" format="default"/>.</t>

<t>Alternative approaches to Mobile IP often leverage the introduction of some form of overlay. LISP <xref target="I-D.ietf-lisp-introduction" pageno="false" format="default"/>, by separating the topological semantic from the identification semantic of IP addresses, is able to cope with endpoint mobility by dynamically mapping endpoint identifiers with routing locators <xref target="I-D.ietf-lisp-mn" pageno="false" format="default"/>. This comes at the price of an overlay that needs its own additional control plane <xref target="I-D.ietf-lisp-rfc6833bis" pageno="false" format="default"/>.</t>

<t>Similarly, the NVO3 (Network Virtualization Overlays) Working Group, while focusing on Data Center environments, also explored an overlay-based solution for multi-tenancy purposes, but also resilient to mobility since relocating Virtual Machines (VMs) is common practice. NVO3 considered for a long time several data planes that implement slightly different flavors of overlays (<xref target="RFC8926" pageno="false" format="default"/>, <xref target="RFC7348" pageno="false" format="default"/>, <xref target="I-D.ietf-intarea-gue" pageno="false" format="default"/>), but lacks an efficient control plane specifically tailored for DCs.</t>

<t>Alternative mobility architectures have also been proposed in order to cope with endpoint mobility outside the IP layer itself. The Host Identity Protocol (HIP) <xref target="RFC7401" pageno="false" format="default"/> introduced a new namespace in order to identify endpoints, namely the Host Identity (HI), while leveraging the IP layer for topological location. On the one hand, such an approach needs to revise the way applications interact with the network layer, by modifying the DNS (now returning an HI instead of an IP address) and applications to use the HIP socket extension. On the other hand, early adopters do not necessarily gain any benefit unless all communicating endpoints upgrade to use HIP.  In spite of this, such a solution may work in the context of a limited domain.</t>

<t>Another alternative approach is adopted by Information-Centric Networking (ICN) <xref target="RFC7476" pageno="false" format="default"/>. By making content a first class citizen of the communication architecture, the &#8220;what&#8221; rather than the &#8220;where&#8221; becomes the real focus of the communication. However, as explained in the next sub-section, ICN can run either over the IP layer or completely replace it, which in turn can be seen as running the Internet and ICN as logically completely separated limited domains.</t>

<t>Sometimes, the transport layer gets involved in mobility solutions, either by introducing explicit in-band signaling to allow for communicating IP address changes (e.g., in SCTP <xref target="RFC5061" pageno="false" format="default"/> and MPTCP <xref target="RFC6182" pageno="false" format="default"/>), or by introducing some form of connection ID that allows for identifying a communication independently from IP addresses (e.g., the connection ID used in QUIC <xref target="QUIC" pageno="false" format="default"/>).</t>

<t>Unmanned Aircraft Systems (UAS) are examples of moving devices that require a stable mobility management scheme since they consist of a number of Unmanned Aerial Vehicles (UAV) subordinated to a Ground Control Station (GCS). The information produced by the different sensors and electronic devices available at each UAV is collected and processed by a software or hardware data acquisition unit, being transmitted towards the GCS, where it is inspected and/or analyzed. Analogously, control information transmitted from the GCS to the UAV enables the execution of control operations over the aircraft, such as changing the route planning or the direction pointed by a camera.</t>

<t>Although UAVs may have redundant links to maintain communications in long-range missions (e.g., satellite), most of the communications between the GCS and the UAVs take place over wireless data links, e.g., based on a radio line-of-sight technology, Wi-Fi or 3G/4G. While in some scenarios, UAVs will operate always under the range of the same cellular base station, in missions with large range, UAVs will move between different cellular or wireless ground infrastructure, meaning that the UAV needs to upload its topological locator and re-start the ongoing communication sessions. In such cases, most of existing Mobile IP approaches may play a role, as well as approaches to split the UAV identifier and the topological locator, such as HIP.</t>

<t>However, while the industry is given the first steps towards evolved UAS architectures and communication models, the data-centric communication plays an increasing role, where information is named and decoupled from its location, and applications/services operate over these named data rather than on host-to-host communications.</t>

<t>In this context, the Data Distribution Service (DDS) has emerged as an industry-oriented open standard that follows this approach. The space and time decoupling allowed by DDS is very relevant in any dynamic and distributed system, since interacting entities are not forced to know each other and are not forced to be simultaneously present to exchange data. Time decoupling can significantly simplify the management of intermittent data-links, in particular for wireless connectivity between UAS, as well as facilitate seamless UAV mobility between GCSs.</t>

<t>In the case of using TCP/IP, mobility of UAVs introduces a significant challenge. Consider the case where a GCS is receiving telemetry information from a specific UAV. Assuming that the UAV moves and changes its point of attachment to the network, it will have to configure a new IP address on its wireless interface. However, this is problematic, as the telemetry information is still being sent by to the previous IP address of the UAV. This simple example illustrates the necessity to deploy mobility management solutions to handle this type of situations.</t>

<t>However, mobility management solutions increase the complexity of the deployment and may impact the performance of data distribution, both in terms of signaling/data overhead and communication path delay. Considering the specific case of multicast data streams, mobility of content producers and consumers is inherently handled by multicast routing protocols, which are able to react to changes of location of mobile nodes by reconstructing the corresponding multicast delivery trees. Nevertheless, this comes with a cost in terms of signaling and data overhead (data may still flow through branches of a multicast delivery tree where there are no receivers while the routing protocol does not converge).</t>

<t>Another alternative it to perform the mobility management of producers and consumers not at the application layer based on IP multicast trees, but on the network layer based on an Information Centric Network approach, which was already mentioned in this section.</t>

<t>Greater flexibility in addressing may help in dealing with mobility more efficiently, e.g., through an augmented semantic that may fulfil the mobility requirements <xref target="RFC7429" pageno="false" format="default"/>.</t>

</section>
<section anchor="SEC:service" title="Communication Across Services" numbered="true" toc="default">

<t>As a communication infrastructure spanning many facets of life, the Internet integrates services and resources from various aspects such as remote collaboration, shopping, content production as well as delivery, education, and many more. Accessing those services and resources directly through URIs has been proposed by methods such as those defined in ICN <xref target="RFC7476" pageno="false" format="default"/>, where providers of services and resources can advertise those through unified identifiers without additional planning of identifiers and locations for underlying data and their replicas. Users can access required services and resources by virtue of using the URI-based identification, with an ephemeral relationship built between user and provider, while the building of such relationship may be constrained with user- as well as service-specific requirements, such as proximity (finding nearest provider), load (finding fastest provider), and others.</t>

<t>While systems like ICN <xref target="CCN" pageno="false" format="default"/> provide an alternative to the locator-based addressing of IP, its deployment requires an overlay (over IP) or native deployment (alongside IP), the latter with dedicated gateways needed for translation. Underlay deployments are also envisioned in <xref target="RFC8763" pageno="false" format="default"/>, where ICN solutions are being used to facilitate communication between IP addressed network endpoints or URI-based service endpoints, still requiring gateway solutions for interconnection with ICN-based networks as well as IP routing based networks (cf., <xref target="ICN5G" pageno="false" format="default"/><xref target="ICNIP" pageno="false" format="default"/>).</t>

<t>Although various approaches combining service and location-based addressing have been devised, the key challenge here is to facilitate a &#8220;natural&#8221;, i.e., direct communication, without the need for gateways above the network layer.</t>

<t>Another aspect of communication across services is that of chaining individual services to a larger service. Here, an identifier would be used that serves as a link to next hop destination within the chain of single services, as done in the work on Service Function Chaining (SFC). With this, services are identified at the level of Layer 2/3 (<xref target="RFC7665" pageno="false" format="default"/>, <xref target="RFC8754" pageno="false" format="default"/>, <xref target="RFC8595" pageno="false" format="default"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677" pageno="false" format="default"/> although the service chain identification is carried as an NSH header (<xref target="RFC7665" pageno="false" format="default"/>, separate to the packet identifiers. The forwarding with the chain of services utilizes individual locator-based IP addressing (for L3 chaining) to communicate the chained operations from one Service Function Forwarder <xref target="RFC7665" pageno="false" format="default"/> to another, leading to concerns regarding overhead incurred through the stacking of those chained identifiers in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>

<t>Greater flexibility in addressing may allow for incorporating different information, e.g., service as well as chaining semantics, into the overall Internet addressing.</t>

</section>
<section anchor="SEC:steering" title="Steering Communication Traffic" numbered="true" toc="default">

<t>Steering traffic within a communication scenario may involve at least two aspects, namely (i) limiting certain traffic towards a certain set of communication nodes and (ii) constraining the sending of packets towards a given destination (or a chain of destinations) with metrics that would allow the selection among one or more possible destinations.</t>

<t>One possibility for limiting traffic inside limited domains, towards specific objects, e.g., devices, users, or group of them, is subnet partition with techniques such as VLAN <xref target="RFC5517" pageno="false" format="default"/>, VxLAN <xref target="RFC7348" pageno="false" format="default"/>, or more evolved solution like TeraStream <xref target="TERASTREAM" pageno="false" format="default"/> realizing such partitioning. Such mechanisms usually involve significant configuration, and even small changes in network and user nodes could result in a repartition and possibly additional configuration efforts. Another key aspect is the complete lack of correlation of the topological address and any likely more semantic-rich identification that could be used to make policy decisions regarding traffic steering. Suitably enriching the semantics of the packet address, either that of the sender or receiver, so that such decision could be made while minimizing the involvement of higher layer mechanisms, is a crucial challenge for improving on network operations and speed of such limited domain traffic.</t>

<t>When making decisions to select one out of a set of possible destinations for a packet, IP anycast semantics can be applied albeit being limited to the locator semantic of the IP address itself. Recent work in <xref target="SFCANYCAST" pageno="false" format="default"/> suggests utilizing the notion of IP anycast address to encode a &#8220;service identifier&#8221;, which is dynamically mapped onto network locations where service instances fulfilling the service request may be located. Scenarios where this capability may be utilized are provided in <xref target="SFCANYCAST" pageno="false" format="default"/> and include, but are not limited to, scenarios such as edge-assisted VR/AR, transportation, and digital twins.</t>

<t>The challenge here lies in the possible encoding of not only the service information itself but the constraint information that helps the selection of the &#8220;best&#8221; service instance and which is likely a service-specific constraint in relation to the particular scenario. The notion of an address here is a conditional (on those constraints) one where this conditional part is an essential aspect of the forwarding action to be taken. It needs therefore consideration in the definition of what an address is, what is its semantic, and how the address structure ought to look like.</t>

<t>As outlined in the previous sub-section, chaining services are another aspect of steering traffic along a chain of constituent services, where the chain is identified through either a stack of individual identifiers, such as in Segment Routing <xref target="RFC8402" pageno="false" format="default"/>, or as an identifier that serves as a link to next hop destination within the chain, such as in Service Function Chaining (SFC). The latter can be applied to services identified at the level of Layer 2/3 (<xref target="RFC7665" pageno="false" format="default"/>, <xref target="RFC8754" pageno="false" format="default"/>, <xref target="RFC8595" pageno="false" format="default"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677" pageno="false" format="default"/>. However, the overhead incurred through the stacking of those chained identifiers is a concern in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>

<t>Flexibility in addressing may enable more semantic rich encoding schemes that may help in steering traffic at hardware level and speed, without complex mechanisms usually resulting in handling packets in the slow path of routers.</t>

</section>
<section anchor="SEC:builtin-sec" title="Communication with built-in security" numbered="true" toc="default">

<t>Today, strong security and privacy in the Internet is usually implemented as an overlay based on the concept of Mix Networks (<xref target="TOR" pageno="false" format="default"/>, <xref target="SPHINX" pageno="false" format="default"/>). Among the various reasons for such approach is the limited semantic of current IP addresses, which do not allow to natively express security features or trust relationships. Efforts like Cryptographically Generated Addresses (CGA) <xref target="RFC3972" pageno="false" format="default"/>, provide some security features by embedding a truncated public key in the last 57-bit of IPv6 address, thereby greatly enhancing authentication and security within an IP network via asymmetric cryptography and IPsec <xref target="RFC4301" pageno="false" format="default"/>. The development of the Host Identity Protocol (HIP) <xref target="RFC7401" pageno="false" format="default"/> saw the introduction of cryptographic identifiers for the newly introduced Host Identity (HI) to allow for enhanced accountability, and therefore trust. The use of those HIs, however, is limited by the size of IPv6 128bit addresses.</t>

<t>Through a greater flexibility in addressing, any security-related key, certificate, or identifier could instead be included in a suitable address structure without any information loss (i.e., as-is, without any truncation or operation as such), avoiding therefore compromises such as those in HIP. Instead, CGAs could be created using full length certificates, or being able to support larger HIP addresses in a limited domain that uses it. This could significantly help in constructing a trusted and secure communication at the network layer, leading to connections that could be considered as absolute secure (assuming the cryptography involved is secure). Even more, anti-abuse mechanisms and/or DDoS protection mechanisms like the one under discussion in PEARG (<xref target="PEARG" pageno="false" format="default"/>) Research Group may leverage a greater flexibility of the overall Internet addressing, if provided, in order to be more effective.</t>

</section>
<section anchor="SEC:nin" title="Communication in Alternative Forwarding Architectures" numbered="true" toc="default">

<t>The performance of communication networks has long been a focus for optimization due to the immediate impact on cost of ownership for communication service providers. Technologies like MPLS <xref target="RFC3031" pageno="false" format="default"/> have been introduced to optimize lower layer communication, e.g., by mapping L3 traffic into aggregated labels of forwarding traffic for the purposes of, e.g., traffic engineering.</t>

<t>Even further, other works have emerged in recent years that have replaced the notion of packets with other concepts for the same purpose of improved traffic engineering and therefore efficiency gains. One such area is that of Software Defined Networks (SDN) <xref target="RFC7426" pageno="false" format="default"/>, which has highlighted how a majority of Internet traffic is better identified by flows, rather than packets. Based on such observation, alternate forwarding architectures have been devised that are flow-based or path-based. With this approach, all data belonging to the same traffic stream is delivered over the same path, and traffic flows are identified by some connection or path identifier rather than by complete routing information, possibly enabling fast hardware based switching.</t>

<t>On the one hand, such a communication model may be more suitable for real-time traffic like in the context of Deterministic Networks (<xref target="DETNET" pageno="false" format="default"/>), where indeed a lot of work has focused on how to &#8220;identify&#8221; packets belonging to the same DETNET flow in order to jointly manage the forwarding within the desired deterministic boundaries.</t>

<t>On the other hand, it may improve the communication efficiency in constrained wireless environments (cf., <xref target="SEC:constrained" pageno="false" format="default"/>), by reducing the overhead, hence increasing the number of useful bits per second per Hz.</t>

<t>Also, the delivery of information across similar flows may be combined into a multipoint delivery of a single return flow, e.g., for scenarios of requests for a video chunk from many clients being responded to with a single (multi-destination) flow, as outlined in <xref target="BIER-MC" pageno="false" format="default"/> as an example. Another opportunity to improve communication efficiency is being pursued in ongoing IETF/IRTF work to deliver IP- or HTTP-level packets directly over path-based or flow-based transport network solutions, such as in <xref target="TROSSEN" pageno="false" format="default"/><xref target="BIER-MC" pageno="false" format="default"/><xref target="ICNIP" pageno="false" format="default"/><xref target="ICN5G" pageno="false" format="default"/> with the capability to bundle unicast forward communication streams flexibly together in return path multipoint relations. Such capability is particularly opportune in scenarios such as chunk-based video retrieval or distributed data storage. However, those solutions currently require gateways to &#8220;translate&#8221; the flow communication into the packet-level addressing semantic in the peering IP networks. Furthermore, the use of those alternative forwarding mechanisms often require the encapsulation of Internet addressing information, leading to wastage of bandwidth as well as processing resources.</t>

<t>Providing an alternative way of forwarding data has also been the motivation for the efforts created in the European Telecommunication Standards Institute (ETSI), which formed a Industry Specification Group (ISG) named Non-IP Networking (NIN) <xref target="ETSI-NIN" pageno="false" format="default"/>. This group sets out to develop and standardize a set of protocols leveraging an alternative forwarding architecture, such as provided by a flow-based switching paradigm. The deployment of such protocols may be seen to form limited domains, still leaving the need to interoperate with the (packet-based forwarding) Internet; a situation possibly enabled through a greater flexibility of the addressing used across Internet-based and alternative limited domains alike.</t>

<t>As an alternative to IP routing, EIBP (Extended Internet Bypass Protocol) <xref target="EIBP" pageno="false" format="default"/> offers a communications model that can work with IP in parallel and entirely transparent and independent to any operation at network layer. For this, EIBP proposes the use of physical and/or virtual structures in networks and among networks to auto assign routable addresses that capture the relative position of routers in a network or networks in a connected set of networks, which can be used to route the packets between end domains. EIBP operates at Layer 2.5 and provides encapsulation (at source domain), routing, and de-encapsulation (at destination domain) for packets. EIBP can forward any type of packets between domains. A resolver to map the domain ID to EIBP&#8217;s edge router addresses is required. When queried for a specific domain, the resolver will return the corresponding edge router structured addresses.</t>

<t>EIBP decouples routing operations from end domain operations, offering to serve any domain, without point solutions to specific domains. EIBP also decouples routing IDs or addresses from end device/domain addresses. This allows for accommodation of new and upcoming domains. A domain can extend EIBP&#8217;s structured addresses into the domain, by joining as a nested domain under one or more edge routers, or by extending the edge router&#8217;s structure addresses to its devices.</t>

<t>A greater flexibility in addressing semantics may reduce the aforementioned wastage by accommodating Internet addressing in the light of such alternative forwarding architectures, instead enabling the direct use of the alternative forwarding information.</t>

</section>
</section>
<section anchor="SEC:problem" title="Issues in Addressing" numbered="true" toc="default">

<t>There are a number of issues that we can identify from the communication scenarios in <xref target="SEC:cases" pageno="false" format="default"/>, not claiming to be exhaustive in our list:</t>

<t><list style="numbers">
  <t>Limiting Alternative Address Semantics: Several communication scenarios pursue the use of alternative semantics of what constitute an &#8216;address&#8217; of a packet traversing the Internet, which may fall foul of the defined network interface semantic of IP addresses.</t>
  <t>Hampering Security: Aligning with the semantic and length limitations of IP addressing may hamper the security objectives of any new semantic, possibly leading to detrimental effects and possible other workarounds (at the risk of introducing fragility rather than security).</t>
  <t>Complicating Traffic Engineering: Utilizing a plethora of non-address inputs into the traffic steering decision in real networks complicates traffic engineering in that it makes the development of suitable policies more complex, while also leading to possible contention between methods being used.</t>
  <t>Hampering Efficiency: Extending IP addressing through point-wise solutions also hampers efficiency, e.g., through needed re-encapsulation (therefore increasing the header processing overhead as well as header-to-payload ratio), through introducing path stretch, or through requiring compression techniques to reduce the header proportion of large addresses when operating in constrained environments.</t>
  <t>Fragility: The introduction of point solutions, each of which comes with possibly own usages of address or packet fields, together with extension-specific operations, increases the overall fragility of the resulting system, caused, for instance, through contention between feature extensions that were neither foreseen in the design nor tested during the implementation phase.</t>
  <t>Extensibility: Accommodating new requirements through ever new extensions as an extensibility approach to addressing compounds aspects discussed before, i.e., fragility, efficiency etc. It complicates engineering due to the clearly missing boundaries against which contentions with other extensions could be managed. It complicates standardization since extension-based extensibility requires independent, and often lengthy, standardization processes. And ultimately, deployments are complicated due to backward compatibility testing required for any new extension being integrated into the deployed system.</t>
</list></t>

<t>The table below shows how the above identified issues do arise somehow in our outlined communication scenarios in <xref target="SEC:cases" pageno="false" format="default"/>.
This overview will be deepened in more detail in the gap analysis document <xref target="GAP_ANALYSIS" pageno="false" format="default"/>.</t>

<texttable title="Issues Involved in Challenging Scenarios" anchor="mapping" suppress-title="false" align="center" style="full">
      <ttcol align="left">&#160;</ttcol>
      <ttcol align="left">Issue 1</ttcol>
      <ttcol align="left">Issue 2</ttcol>
      <ttcol align="left">Issue 3</ttcol>
      <ttcol align="left">Issue 4</ttcol>
      <ttcol align="left">Issue 5</ttcol>
      <ttcol align="left">Issue 6</ttcol>
      <c>Constrained Environments</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Dynamically Changing Topologies</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Moving Endpoints</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Across Services</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Traffic Steering</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Built-in Security</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Alternative Forwarding Architectures</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
</texttable>

</section>
<section anchor="problem-statement" title="Problem Statement" numbered="true" toc="default">

<t>This document highlights that the conceptual framework of limited domains positions the many extensions to IP addressing as approaches to accommodate new requirements in emerging communication scenarios, each of which are being often deployed within limited domains.</t>

<t>While this may be interpreted as a crucial point to the flexibility of addressing in the Internet in order to accommodate those ever increasing number of communication scenarios, we have identified a number of issues (as described in this document) that position the existing Internet addressing structure itself as a potential hinderance in solving key problems for Internet service provisioning. Such problems include supporting new, e.g., service-oriented, scenarios more efficiently, with improved security and efficient traffic engineering, as well as large scale mobility.</t>

<t>Referring back to our introductory question on flexibility in addressing (or leaving the problem to limited domain solutions to deal with), we offer at this stage no definite answer nor do we propose or promote specific solutions to the problems here portrayed. Instead, this document aims at stimulating discussion on the emerging needs for addressing with the possibility to fundamentally re-think the addressing in the Internet beyond the current objectives of IPv6.</t>

<!-- LI: Following paragraph needs modifying when GA documents will exist -->
<t>To complement our problem statement in this document, the companion gap analysis document <xref target="GAP_ANALYSIS" pageno="false" format="default"/> deepens the issues identified in <xref target="SEC:problem" pageno="false" format="default"/> along key properties of today&#8217;s Internet addressing.</t>

</section>
<section anchor="SEC:sec" title="Security Considerations" numbered="true" toc="default">

<t>The present memo does not introduce any new technology and/or mechanism and as such does not introduce any security threat to the TCP/IP protocol suite.</t>

<t>Nevertheless, it is worth to observe whether or not greater flexibility of addressing (as suggested in previous sections) would allow to introduce fully featured security in endpoint identification, potentially able to eradicate the spoofing problem, as one example. Furthermore, it may be used to include application gateways&#8217; certificates in order to provide more efficiency, e.g., using web certificates also in the addressing of web services. While increasing security, privacy protection may also be improved.</t>

</section>
<section anchor="SEC:iana" title="IANA Considerations" numbered="true" toc="default">

<t>This document does not include an IANA request.</t>

</section>


  </middle>

  <back>


    <references title="Informative References">




<reference anchor="I-D.ietf-lisp-nexagon" quote-title="true">
   <front>
      <title>Network-Hexagons: H3-LISP GeoState &amp; Mobility Network</title>
      <author fullname="Sharon Barkai">
	 <organization>Nexar Inc.</organization>
      </author>
      <author fullname="Bruno Fernandez-Ruiz">
	 <organization>Nexar Inc.</organization>
      </author>
      <author fullname="S ZionB">
	 <organization>Nexar Inc.</organization>
      </author>
      <author fullname="Rotem Tamir">
	 <organization>Nexar Inc.</organization>
      </author>
      <author fullname="Alberto Rodriguez-Natal">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Fabio Maino">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Albert Cabellos-Aparicio">
	 </author>
      <author fullname="Dino Farinacci">
	 <organization>lispers.net</organization>
      </author>
      <date month="February" day="13" year="2021"/>
      <abstract>
	 <t>   This document specifies use of H3 and LISP to publish-subscribe and reflect
   the real-time state and status of public road segments by:
   - Tile-by-tile IPv6 addressable digital-twin of each road-segment
   - Tile by tile, indexed annotation of streets &amp; curbs in near real time
   - Sharing hazards, blockages, parking, weather, maintenance, inventory..
   - Brokering MobilityClients producing and consuming geo-state information
   - Reflected in geo-spatial IP multicast channels to subscribed clients


	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-nexagon-07"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-nexagon-07.txt"/>
</reference>


<reference anchor="I-D.ietf-lisp-introduction" quote-title="true">
   <front>
      <title>An Architectural Introduction to the Locator/ID Separation Protocol (LISP)</title>
      <author fullname="Albert Cabellos">
	 </author>
      <author fullname="Damien Saucez">
	 </author>
      <date month="April" day="2" year="2015"/>
      <abstract>
	 <t>   This document describes the architecture of the Locator/ID Separation
   Protocol (LISP), making it easier to read the rest of the LISP
   specifications and providing a basis for discussion about the details
   of the LISP protocols.  This document is used for introductory
   purposes, more details can be found in RFC6830, the protocol
   specification.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-introduction-13"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-introduction-13.txt"/>
</reference>


<reference anchor="I-D.ietf-lisp-mn" quote-title="true">
   <front>
      <title>LISP Mobile Node</title>
      <author fullname="Dino Farinacci">
	 <organization>lispers.net</organization>
      </author>
      <author fullname="Darrel Lewis">
	 <organization>cisco Systems</organization>
      </author>
      <author fullname="David Meyer">
	 <organization>1-4-5.net</organization>
      </author>
      <author fullname="Chris White">
	 <organization>Logical Elegance</organization>
      </author>
      <date month="February" day="14" year="2021"/>
      <abstract>
	 <t>   This document describes how a lightweight version of LISP's ITR/ETR
   functionality can be used to provide seamless mobility to a mobile
   node.  The LISP Mobile Node design described in this document uses
   standard LISP functionality to provide scalable mobility for LISP
   mobile nodes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-mn-09"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-mn-09.txt"/>
</reference>


<reference anchor="I-D.ietf-intarea-gue" quote-title="true">
   <front>
      <title>Generic UDP Encapsulation</title>
      <author fullname="Tom Herbert">
	 <organization>Quantonium</organization>
      </author>
      <author fullname="Lucy Yong">
	 <organization>Independent</organization>
      </author>
      <author fullname="Osama Zia">
	 <organization>Microsoft</organization>
      </author>
      <date month="October" day="26" year="2019"/>
      <abstract>
	 <t>   This specification describes Generic UDP Encapsulation (GUE), which
   is a scheme for using UDP to encapsulate packets of different IP
   protocols for transport across layer 3 networks. By encapsulating
   packets in UDP, specialized capabilities in networking hardware for
   efficient handling of UDP packets can be leveraged. GUE specifies
   basic encapsulation methods upon which higher level constructs, such
   as tunnels and overlay networks for network virtualization, can be
   constructed. GUE is extensible by allowing optional data fields as
   part of the encapsulation, and is generic in that it can encapsulate
   packets of various IP protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-gue-09"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-intarea-gue-09.txt"/>
</reference>

<reference anchor="SFCANYCAST" quote-title="true">
  <front>
    <title>Distributed Function Chaining with Anycast Routing</title>
    <author initials="A." surname="Wion" fullname="Adrien Wion">
      <organization/>
    </author>
    <author initials="M." surname="Bouet" fullname="Mathieu Bouet">
      <organization/>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization/>
    </author>
    <author initials="V." surname="Conan" fullname="Vania Conan">
      <organization/>
    </author>
    <date year="2019" month="April"/>
  </front>
  <seriesInfo name="Proceedings of the 2019 ACM Symposium on SDN" value="Research"/>
  <seriesInfo name="DOI" value="10.1145/3314148.3314355"/>
</reference>


<reference anchor="QUIC" quote-title="true">
   <front>
      <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
      <author fullname="Jana Iyengar">
	 <organization>Fastly</organization>
      </author>
      <author fullname="Martin Thomson">
	 <organization>Mozilla</organization>
      </author>
      <date month="January" day="14" year="2021"/>
      <abstract>
	 <t>   This document defines the core of the QUIC transport protocol.  QUIC
   provides applications with flow-controlled streams for structured
   communication, low-latency connection establishment, and network path
   migration.  QUIC includes security measures that ensure
   confidentiality, integrity, and availability in a range of deployment
   circumstances.  Accompanying documents describe the integration of
   TLS for key negotiation, loss detection, and an exemplary congestion
   control algorithm.

DO NOT DEPLOY THIS VERSION OF QUIC

   DO NOT DEPLOY THIS VERSION OF QUIC UNTIL IT IS IN AN RFC.  This
   version is still a work in progress.  For trial deployments, please
   use earlier versions.

Note to Readers

   Discussion of this draft takes place on the QUIC working group
   mailing list (quic@ietf.org (mailto:quic@ietf.org)), which is
   archived at https://mailarchive.ietf.org/arch/search/?email_list=quic

   Working Group information can be found at https://github.com/quicwg;
   source code and issues list for this draft can be found at
   https://github.com/quicwg/base-drafts/labels/-transport.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-quic-transport-34"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-quic-transport-34.txt"/>
</reference>


<reference anchor="ICN5G" quote-title="true">
   <front>
      <title>Enabling ICN in 3GPP's 5G NextGen Core Architecture</title>
      <author fullname="Ravi Ravindran">
	 <organization>Corning Incorporated</organization>
      </author>
      <author fullname="Prakash Suthar">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Dirk Trossen">
	 <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Chonggang Wang">
	 <organization>InterDigital Inc.</organization>
      </author>
      <author fullname="Greg White">
	 <organization>CableLabs</organization>
      </author>
      <date month="January" day="10" year="2021"/>
      <abstract>
	 <t>   The proposed 3GPP's 5G core nextgen architecture (5GC) allows the
   introduction of new user and control plane function, considering the
   support for network slicing functions, that offers greater
   flexibility to handle heterogeneous devices and applications.  In
   this draft, we provide a short description of the proposed 5GC
   architecture, including recent efforts to provide cellular Local Area
   Network (LAN) connectivity, followed by extensions to 5GC's control
   and user plane to support Packet Data Unit (PDU) sessions over
   Information-Centric Networks (ICN).  In addition, ICN over 5GLAN is
   also described.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-icnrg-5gc-icn-04"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-irtf-icnrg-5gc-icn-04.txt"/>
</reference>


<reference anchor="ICNIP" quote-title="true">
   <front>
      <title>Internet Services over ICN in 5G LAN Environments</title>
      <author fullname="Dirk Trossen">
	 <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Sebastian Robitzsch">
	 <organization>InterDigital Inc.</organization>
      </author>
      <author fullname="Martin Reed">
	 <organization>Essex University</organization>
      </author>
      <author fullname="Mays Al-Naday">
	 <organization>Essex University</organization>
      </author>
      <author fullname="Janne Riihijarvi">
	 <organization>RWTH Aachen</organization>
      </author>
      <date month="October" day="1" year="2020"/>
      <abstract>
	 <t>   In this draft, we provide architecture and operations for enabling
   Internet services over ICN over (5G-enabled) LAN environments.
   Operations include ICN API to upper layers, HTTP over ICN, Service
   Proxy Operations, ICN Flow Management, Name Resolution, Mobility
   Handling, and Dual Stack Device Support.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-trossen-icnrg-internet-icn-5glan-04"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-trossen-icnrg-internet-icn-5glan-04.txt"/>
</reference>


<reference anchor="BIER-MC" quote-title="true">
   <front>
      <title>Applicability of BIER Multicast Overlay for Adaptive Streaming Services</title>
      <author fullname="Dirk Trossen">
	 <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Akbar Rahman">
	 <organization>InterDigital Communications, LLC</organization>
      </author>
      <author fullname="Chonggang Wang">
	 <organization>InterDigital Communications, LLC</organization>
      </author>
      <author fullname="Toerless Eckert">
	 <organization>Futurewei Technologies Inc.</organization>
      </author>
      <date month="January" day="10" year="2021"/>
      <abstract>
	 <t>   HTTP Level Multicast, using BIER, is described as a use case in the
   BIER Use Cases document.  HTTP Level Multicast is used in today's
   video streaming and delivery services such as HLS, AR/VR, etc.,
   generally realized over IP Multicast as well as other use cases such
   as software update delivery.  A realization of "HTTP Multicast" over
   "IP Multicast" is described for the video delivery use case.  IP
   Multicast is commonly used for IPTV services.  DVB and BBF also
   develope a reference architecture for IP Multicast service.  A few
   problems with IP Multicast, such as waste of transmission bandwidth,
   increase in signaling when there are few users are described.
   Realization over BIER, through a BIER Multicast Overlay Layer, is
   described as an alternative.  How BIER Multicast Overlay operation
   improves over IP Multicast, such as reduction in signaling, dynamic
   creation of multicast groups to reduce signaling and bandwidth
   wastage is described.  We conclude with a few next steps.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-bier-multicast-http-response-05"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-bier-multicast-http-response-05.txt"/>
</reference>

<reference anchor="MANET1" quote-title="true">
  <front>
    <title>Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network</title>
    <author initials="A." surname="Abdallah" fullname="Alaa E. Abdallah">
      <organization/>
    </author>
    <author initials="E." surname="Abdallah" fullname="Emad E. Abdallah">
      <organization/>
    </author>
    <author initials="M." surname="Bsoul" fullname="Mohammad Bsoul">
      <organization/>
    </author>
    <author initials="A." surname="Otoom" fullname="Ahmed Fawzi Otoom">
      <organization/>
    </author>
    <date year="2016" month="October"/>
  </front>
  <seriesInfo name="International Journal of Distributed Sensor Networks" value="Vol. 12, pp. 155014771667125"/>
  <seriesInfo name="DOI" value="10.1177/1550147716671255"/>
</reference>

<reference anchor="CCN" quote-title="true">
  <front>
    <title>Networking named content</title>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization/>
    </author>
    <author initials="D." surname="Smetters" fullname="Diana K. Smetters">
      <organization/>
    </author>
    <author initials="J." surname="Thornton" fullname="James D. Thornton">
      <organization/>
    </author>
    <author initials="M." surname="Plass" fullname="Michael F. Plass">
      <organization/>
    </author>
    <author initials="N." surname="Briggs" fullname="Nicholas H. Briggs">
      <organization/>
    </author>
    <author initials="R." surname="Braynard" fullname="Rebecca L. Braynard">
      <organization/>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT" value="'09"/>
  <seriesInfo name="DOI" value="10.1145/1658939.1658941"/>
</reference>

<reference anchor="HANDLEY" quote-title="true">
  <front>
    <title>Delay is Not an Option: Low Latency Routing in Space</title>
    <author initials="M." surname="Handley" fullname="Mark Handley">
      <organization/>
    </author>
    <date year="2018" month="November"/>
  </front>
  <seriesInfo name="Proceedings of the 17th ACM Workshop on Hot Topics in" value="Networks"/>
  <seriesInfo name="DOI" value="10.1145/3286062.3286075"/>
</reference>

<reference anchor="TROSSEN" quote-title="true">
  <front>
    <title>Arguments for an information-centric internetworking architecture</title>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization/>
    </author>
    <author initials="M." surname="Sarela" fullname="Mikko Sarela">
      <organization/>
    </author>
    <author initials="K." surname="Sollins" fullname="Karen Sollins">
      <organization/>
    </author>
    <date year="2010" month="April"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 40, pp. 26-33"/>
  <seriesInfo name="DOI" value="10.1145/1764873.1764878"/>
</reference>

<reference anchor="SPHINX" quote-title="true">
  <front>
    <title>Sphinx: A Compact and Provably Secure Mix Format</title>
    <author initials="G." surname="Danezis" fullname="George Danezis">
      <organization/>
    </author>
    <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
      <organization/>
    </author>
    <date year="2009" month="May"/>
  </front>
  <seriesInfo name="2009 30th IEEE Symposium on Security and" value="Privacy"/>
  <seriesInfo name="DOI" value="10.1109/sp.2009.15"/>
</reference>

<reference anchor="ALOHA" quote-title="true">
  <front>
    <title>The ALOHA System</title>
    <author initials="F." surname="Kuo" fullname="F. F. Kuo">
      <organization/>
    </author>
    <date year="1995" month="January"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 25, pp. 41-44"/>
  <seriesInfo name="DOI" value="10.1145/205447.205451"/>
</reference>

<reference anchor="CARTISEAN" quote-title="true">
  <front>
    <title>Cartesian Ad Hoc Routing Protocols</title>
    <author initials="L." surname="Hughes" fullname="Larry Hughes">
      <organization/>
    </author>
    <author initials="K." surname="Shumon" fullname="Kafil Shumon">
      <organization/>
    </author>
    <author initials="Y." surname="Zhang" fullname="Ying Zhang">
      <organization/>
    </author>
    <date year="2003"/>
  </front>
  <seriesInfo name="Ad-Hoc, Mobile, and Wireless Networks" value="pp. 287-292"/>
  <seriesInfo name="DOI" value="10.1007/978-3-540-39611-6_27"/>
</reference>


<reference anchor="LR-WPAN" target="https://standards.ieee.org/standard/802_15_4-2020.html" quote-title="true">
  <front>
    <title>IEEE 802.15.4 - IEEE Standard for Low-Rate Wireless Networks</title>
    <author>
      <organization/>
    </author>
    <date year="2020" month="May"/>
  </front>
  <seriesInfo name="IEEE" value="802.15 WPAN Task Group 4"/>
</reference>
<reference anchor="DECT-ULE" target="https://www.etsi.org/deliver/etsi_en/300100_300199/30017501/02.06.01_60/en_30017501v020601p.pdf" quote-title="true">
  <front>
    <title>Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview</title>
    <author>
      <organization/>
    </author>
    <date year="2009" month="May"/>
  </front>
  <seriesInfo name="ETSI" value="European Standard, EN 300 175-1, V2.6.1"/>
</reference>
<reference anchor="BACnet" target="https://www.techstreet.com/ashrae/standards/ashrae-135-2016?product_id=1918140" quote-title="true">
  <front>
    <title>BACnet-A Data Communication Protocol for Building Automation and Control Networks</title>
    <author>
      <organization/>
    </author>
    <date year="2016" month="January"/>
  </front>
  <seriesInfo name="ANSI/ASHRAE" value="Standard 135-2016"/>
</reference>
<reference anchor="ECMA-340" quote-title="true">
  <front>
    <title>Near Field Communication - Interface and Protocol (NFCIP-1) 3rd Ed.</title>
    <author>
      <organization>EECMA-340</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="IEEE_1901.1" target="https://ieeexplore.ieee.org/document/8360785" quote-title="true">
  <front>
    <title>Standard for Medium Frequency (less than 15 MHz) Power Line Communications for Smart Grid Applications</title>
    <author>
      <organization/>
    </author>
    <date year="2018" month="May"/>
  </front>
  <seriesInfo name="IEEE 1901.1" value="IEEE-SA Standards Board"/>
</reference>
<reference anchor="BLE" target="https://www.bluetooth.com/specifications" quote-title="true">
  <front>
    <title>Bluetooth Specification</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="Bluetooth" value="SIG Working Groups"/>
</reference>
<reference anchor="OCADO" target="https://techmonitor.ai/tech-leaders/ocado-technology-robot-hive-innovation" quote-title="true">
  <front>
    <title>Ocado Technology&#8217;s robot warehouse a Hive of IoT innovation</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TERASTREAM" target="https://www.telekom.com/en/media/media-information/archive/deutsche-telekom-tests-terastream-the-network-of-the-future-in-croatia-358444" quote-title="true">
  <front>
    <title>Deutsche Telekom tests TeraStream, the network of the future, in Croatia</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PEARG" target="https://irtf.org/pearg" quote-title="true">
  <front>
    <title>Privacy Enhancements and Assessments Research Group - PEARG</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DETNET" target="https://datatracker.ietf.org/wg/detnet/about/" quote-title="true">
  <front>
    <title>Deterministic Networking (DetNet)</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ETSI-NIN" target="https://www.etsi.org/technologies/non-ip-networking" quote-title="true">
  <front>
    <title>Non-IP Networking - NIN</title>
    <author>
      <organization>ETSI - European Telecommunication Standards Institute</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TOR" target="https://www.torproject.org/" quote-title="true">
  <front>
    <title>The Tor Project</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="EIBP" quote-title="true">
  <front>
    <title>A Structured Approach to Routing in the Internet</title>
    <author initials="N." surname="Shenoy">
      <organization/>
    </author>
    <author initials="S." surname="Chandraiah">
      <organization/>
    </author>
    <author initials="P." surname="Willis">
      <organization/>
    </author>
    <date year="2021" month="June"/>
  </front>
  <seriesInfo name="First Intl Workshop on Semantic Addressing and Routing for Future Networks" value=""/>
</reference>
<reference anchor="GAP_ANALYSIS" target="https://datatracker.ietf.org/doc/draft-jia-intarea-internet-addressing-gap-analysis/" quote-title="true">
  <front>
    <title>Gap Analysis in Internet Addressing</title>
    <author initials="Y." surname="Jia">
      <organization/>
    </author>
    <author initials="D." surname="Trossen">
      <organization/>
    </author>
    <author initials="L." surname="Iannone">
      <organization/>
    </author>
    <author initials="N." surname="Shenoy">
      <organization/>
    </author>
    <author initials="P." surname="Mendes">
      <organization/>
    </author>
    <date year="2021" month="July"/>
  </front>
</reference>




<reference anchor="RFC8799" target="https://www.rfc-editor.org/info/rfc8799" quote-title="true">
<front>
<title>Limited Domains and Internet Protocols</title>
<author initials="B." surname="Carpenter" fullname="B. Carpenter"><organization/></author>
<author initials="B." surname="Liu" fullname="B. Liu"><organization/></author>
<date year="2020" month="July"/>
<abstract><t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes. </t><t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t></abstract>
</front>
<seriesInfo name="RFC" value="8799"/>
<seriesInfo name="DOI" value="10.17487/RFC8799"/>
</reference>



<reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791" quote-title="true">
<front>
<title>Internet Protocol</title>
<author initials="J." surname="Postel" fullname="J. Postel"><organization/></author>
<date year="1981" month="September"/>
</front>
<seriesInfo name="STD" value="5"/>
<seriesInfo name="RFC" value="791"/>
<seriesInfo name="DOI" value="10.17487/RFC0791"/>
</reference>



<reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quote-title="true">
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author initials="S." surname="Deering" fullname="S. Deering"><organization/></author>
<author initials="R." surname="Hinden" fullname="R. Hinden"><organization/></author>
<date year="2017" month="July"/>
<abstract><t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t></abstract>
</front>
<seriesInfo name="STD" value="86"/>
<seriesInfo name="RFC" value="8200"/>
<seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>



<reference anchor="RFC2775" target="https://www.rfc-editor.org/info/rfc2775" quote-title="true">
<front>
<title>Internet Transparency</title>
<author initials="B." surname="Carpenter" fullname="B. Carpenter"><organization/></author>
<date year="2000" month="February"/>
<abstract><t>This document describes the current state of the Internet from the architectural viewpoint, concentrating on issues of end-to-end connectivity and transparency.</t></abstract>
</front>
<seriesInfo name="RFC" value="2775"/>
<seriesInfo name="DOI" value="10.17487/RFC2775"/>
</reference>



<reference anchor="RFC4919" target="https://www.rfc-editor.org/info/rfc4919" quote-title="true">
<front>
<title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
<author initials="N." surname="Kushalnagar" fullname="N. Kushalnagar"><organization/></author>
<author initials="G." surname="Montenegro" fullname="G. Montenegro"><organization/></author>
<author initials="C." surname="Schumacher" fullname="C. Schumacher"><organization/></author>
<date year="2007" month="August"/>
<abstract><t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks.  The set of goals enumerated in this document form an initial set only.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="4919"/>
<seriesInfo name="DOI" value="10.17487/RFC4919"/>
</reference>



<reference anchor="RFC5177" target="https://www.rfc-editor.org/info/rfc5177" quote-title="true">
<front>
<title>Network Mobility (NEMO) Extensions for Mobile IPv4</title>
<author initials="K." surname="Leung" fullname="K. Leung"><organization/></author>
<author initials="G." surname="Dommety" fullname="G. Dommety"><organization/></author>
<author initials="V." surname="Narayanan" fullname="V. Narayanan"><organization/></author>
<author initials="A." surname="Petrescu" fullname="A. Petrescu"><organization/></author>
<date year="2008" month="April"/>
<abstract><t>This document describes a protocol for supporting Mobile Networks between a Mobile Router and a Home Agent by extending the Mobile IPv4 protocol.  A Mobile Router is responsible for the mobility of one or more network segments or subnets moving together.  The Mobile Router hides its mobility from the nodes on the Mobile Network.  The nodes on the Mobile Network may be fixed in relationship to the Mobile Router and may not have any mobility function.</t><t>Extensions to Mobile IPv4 are introduced to support Mobile Networks. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5177"/>
<seriesInfo name="DOI" value="10.17487/RFC5177"/>
</reference>



<reference anchor="RFC6626" target="https://www.rfc-editor.org/info/rfc6626" quote-title="true">
<front>
<title>Dynamic Prefix Allocation for Network Mobility for Mobile IPv4 (NEMOv4)</title>
<author initials="G." surname="Tsirtsis" fullname="G. Tsirtsis"><organization/></author>
<author initials="V." surname="Park" fullname="V. Park"><organization/></author>
<author initials="V." surname="Narayanan" fullname="V. Narayanan"><organization/></author>
<author initials="K." surname="Leung" fullname="K. Leung"><organization/></author>
<date year="2012" month="May"/>
<abstract><t>The base Network Mobility for Mobile IPv4 (NEMOv4) specification defines extensions to Mobile IPv4 for mobile networks.  This specification defines a dynamic prefix allocation mechanism for NEMOv4.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="6626"/>
<seriesInfo name="DOI" value="10.17487/RFC6626"/>
</reference>



<reference anchor="RFC5944" target="https://www.rfc-editor.org/info/rfc5944" quote-title="true">
<front>
<title>IP Mobility Support for IPv4, Revised</title>
<author initials="C." surname="Perkins" fullname="C. Perkins" role="editor"><organization/></author>
<date year="2010" month="November"/>
<abstract><t>This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet.  The protocol provides for registering the care-of address with a home agent.  The home agent sends datagrams destined for the mobile node through a tunnel to the care-of address.  After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5944"/>
<seriesInfo name="DOI" value="10.17487/RFC5944"/>
</reference>



<reference anchor="RFC5275" target="https://www.rfc-editor.org/info/rfc5275" quote-title="true">
<front>
<title>CMS Symmetric Key Management and Distribution</title>
<author initials="S." surname="Turner" fullname="S. Turner"><organization/></author>
<date year="2008" month="June"/>
<abstract><t>This document describes a mechanism to manage (i.e., set up, distribute, and rekey) keys used with symmetric cryptographic algorithms.  Also defined herein is a mechanism to organize users into groups to support distribution of encrypted content using symmetric cryptographic algorithms.  The mechanism uses the Cryptographic Message Syntax (CMS) protocol and Certificate Management over CMS (CMC) protocol to manage the symmetric keys.  Any member of the group can then later use this distributed shared key to decrypt other CMS encrypted objects with the symmetric key.  This mechanism has been developed to support Secure/Multipurpose Internet Mail Extensions (S/MIME) Mail List Agents  (MLAs).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5275"/>
<seriesInfo name="DOI" value="10.17487/RFC5275"/>
</reference>


<reference anchor="I-D.ietf-lisp-rfc6833bis" quote-title="true">
   <front>
      <title>Locator/ID Separation Protocol (LISP) Control-Plane</title>
      <author fullname="Dino Farinacci">
	 <organization>lispers.net</organization>
      </author>
      <author fullname="Fabio Maino">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Vince Fuller">
	 <organization>vaf.net Internet Consulting</organization>
      </author>
      <author fullname="Albert Cabellos">
	 <organization>UPC/BarcelonaTech</organization>
      </author>
      <date month="November" day="18" year="2020"/>
      <abstract>
	 <t>   This document describes the Control-Plane and Mapping Service for the
   Locator/ID Separation Protocol (LISP), implemented by two types of
   LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server --
   that provides a simplified "front end" for one or more Endpoint ID to
   Routing Locator mapping databases.

   By using this Control-Plane service interface and communicating with
   Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and
   Egress Tunnel Routers (ETRs) are not dependent on the details of
   mapping database systems, which facilitates modularity with different
   database designs.  Since these devices implement the "edge" of the
   LISP Control-Plane infrastructure, connecting EID addressable nodes
   of a LISP site, it the implementation and operational complexity of
   the overall cost and effort of deploying LISP.

   This document obsoletes RFC 6830 and RFC 6833.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6833bis-30"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-rfc6833bis-30.txt"/>
</reference>



<reference anchor="RFC8926" target="https://www.rfc-editor.org/info/rfc8926" quote-title="true">
<front>
<title>Geneve: Generic Network Virtualization Encapsulation</title>
<author initials="J." surname="Gross" fullname="J. Gross" role="editor"><organization/></author>
<author initials="I." surname="Ganga" fullname="I. Ganga" role="editor"><organization/></author>
<author initials="T." surname="Sridhar" fullname="T. Sridhar" role="editor"><organization/></author>
<date year="2020" month="November"/>
<abstract><t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters.  As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components.  Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t></abstract>
</front>
<seriesInfo name="RFC" value="8926"/>
<seriesInfo name="DOI" value="10.17487/RFC8926"/>
</reference>



<reference anchor="RFC7348" target="https://www.rfc-editor.org/info/rfc7348" quote-title="true">
<front>
<title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
<author initials="M." surname="Mahalingam" fullname="M. Mahalingam"><organization/></author>
<author initials="D." surname="Dutt" fullname="D. Dutt"><organization/></author>
<author initials="K." surname="Duda" fullname="K. Duda"><organization/></author>
<author initials="P." surname="Agarwal" fullname="P. Agarwal"><organization/></author>
<author initials="L." surname="Kreeger" fullname="L. Kreeger"><organization/></author>
<author initials="T." surname="Sridhar" fullname="T. Sridhar"><organization/></author>
<author initials="M." surname="Bursell" fullname="M. Bursell"><organization/></author>
<author initials="C." surname="Wright" fullname="C. Wright"><organization/></author>
<date year="2014" month="August"/>
<abstract><t>This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.  The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers.  This memo documents the deployed VXLAN protocol for the benefit of the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="7348"/>
<seriesInfo name="DOI" value="10.17487/RFC7348"/>
</reference>



<reference anchor="RFC7401" target="https://www.rfc-editor.org/info/rfc7401" quote-title="true">
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials="R." surname="Moskowitz" fullname="R. Moskowitz" role="editor"><organization/></author>
<author initials="T." surname="Heer" fullname="T. Heer"><organization/></author>
<author initials="P." surname="Jokela" fullname="P. Jokela"><organization/></author>
<author initials="T." surname="Henderson" fullname="T. Henderson"><organization/></author>
<date year="2015" month="April"/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name="RFC" value="7401"/>
<seriesInfo name="DOI" value="10.17487/RFC7401"/>
</reference>



<reference anchor="RFC7476" target="https://www.rfc-editor.org/info/rfc7476" quote-title="true">
<front>
<title>Information-Centric Networking: Baseline Scenarios</title>
<author initials="K." surname="Pentikousis" fullname="K. Pentikousis" role="editor"><organization/></author>
<author initials="B." surname="Ohlman" fullname="B. Ohlman"><organization/></author>
<author initials="D." surname="Corujo" fullname="D. Corujo"><organization/></author>
<author initials="G." surname="Boggia" fullname="G. Boggia"><organization/></author>
<author initials="G." surname="Tyson" fullname="G. Tyson"><organization/></author>
<author initials="E." surname="Davies" fullname="E. Davies"><organization/></author>
<author initials="A." surname="Molinaro" fullname="A. Molinaro"><organization/></author>
<author initials="S." surname="Eum" fullname="S. Eum"><organization/></author>
<date year="2015" month="March"/>
<abstract><t>This document aims at establishing a common understanding about a set of scenarios that can be used as a base for the evaluation of different information-centric networking (ICN) approaches so that they can be tested and compared against each other while showcasing their own advantages.  Towards this end, we review the ICN literature and document scenarios which have been considered in previous performance evaluation studies.  We discuss a variety of aspects that an ICN solution can address.  This includes general aspects, such as, network efficiency, reduced complexity, increased scalability and reliability, mobility support, multicast and caching performance, real-time communication efficiency, energy consumption frugality, and disruption and delay tolerance.  We detail ICN-specific aspects as well, such as information security and trust, persistence, availability, provenance, and location independence.</t><t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG).</t></abstract>
</front>
<seriesInfo name="RFC" value="7476"/>
<seriesInfo name="DOI" value="10.17487/RFC7476"/>
</reference>



<reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061" quote-title="true">
<front>
<title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
<author initials="R." surname="Stewart" fullname="R. Stewart"><organization/></author>
<author initials="Q." surname="Xie" fullname="Q. Xie"><organization/></author>
<author initials="M." surname="Tuexen" fullname="M. Tuexen"><organization/></author>
<author initials="S." surname="Maruyama" fullname="S. Maruyama"><organization/></author>
<author initials="M." surname="Kozuka" fullname="M. Kozuka"><organization/></author>
<date year="2007" month="September"/>
<abstract><t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5061"/>
<seriesInfo name="DOI" value="10.17487/RFC5061"/>
</reference>



<reference anchor="RFC6182" target="https://www.rfc-editor.org/info/rfc6182" quote-title="true">
<front>
<title>Architectural Guidelines for Multipath TCP Development</title>
<author initials="A." surname="Ford" fullname="A. Ford"><organization/></author>
<author initials="C." surname="Raiciu" fullname="C. Raiciu"><organization/></author>
<author initials="M." surname="Handley" fullname="M. Handley"><organization/></author>
<author initials="S." surname="Barre" fullname="S. Barre"><organization/></author>
<author initials="J." surname="Iyengar" fullname="J. Iyengar"><organization/></author>
<date year="2011" month="March"/>
<abstract><t>Hosts are often connected by multiple paths, but TCP restricts communications to a single path per transport connection.  Resource usage within the network would be more efficient were these multiple paths able to be used concurrently.  This should enhance user experience through improved resilience to network failure and higher throughput.</t><t>This document outlines architectural guidelines for the development of a Multipath Transport Protocol, with references to how these architectural components come together in the development of a Multipath TCP (MPTCP).  This document lists certain high-level design decisions that provide foundations for the design of the MPTCP protocol, based upon these architectural requirements.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name="RFC" value="6182"/>
<seriesInfo name="DOI" value="10.17487/RFC6182"/>
</reference>



<reference anchor="RFC7429" target="https://www.rfc-editor.org/info/rfc7429" quote-title="true">
<front>
<title>Distributed Mobility Management: Current Practices and Gap Analysis</title>
<author initials="D." surname="Liu" fullname="D. Liu" role="editor"><organization/></author>
<author initials="JC." surname="Zuniga" fullname="JC. Zuniga" role="editor"><organization/></author>
<author initials="P." surname="Seite" fullname="P. Seite"><organization/></author>
<author initials="H." surname="Chan" fullname="H. Chan"><organization/></author>
<author initials="CJ." surname="Bernardos" fullname="CJ. Bernardos"><organization/></author>
<date year="2015" month="January"/>
<abstract><t>This document analyzes deployment practices of existing IP mobility protocols in a distributed mobility management environment.  It then identifies existing limitations when compared to the requirements defined for a distributed mobility management solution.</t></abstract>
</front>
<seriesInfo name="RFC" value="7429"/>
<seriesInfo name="DOI" value="10.17487/RFC7429"/>
</reference>



<reference anchor="RFC8763" target="https://www.rfc-editor.org/info/rfc8763" quote-title="true">
<front>
<title>Deployment Considerations for Information-Centric Networking (ICN)</title>
<author initials="A." surname="Rahman" fullname="A. Rahman"><organization/></author>
<author initials="D." surname="Trossen" fullname="D. Trossen"><organization/></author>
<author initials="D." surname="Kutscher" fullname="D. Kutscher"><organization/></author>
<author initials="R." surname="Ravindran" fullname="R. Ravindran"><organization/></author>
<date year="2020" month="April"/>
<abstract><t>Information-Centric Networking (ICN) is now reaching technological maturity after many years of fundamental research and experimentation. This document provides a number of deployment considerations in the interest of helping the ICN community move forward to the next step of live deployments. First, the major deployment configurations for ICN are described, including the key overlay and underlay approaches. Then, proposed deployment migration paths are outlined to address major practical issues, such as network and application migration. Next, selected ICN trial experiences are summarized. Finally, protocol areas that require further standardization are identified to facilitate future interoperable ICN deployments. This document is a product of the Information-Centric Networking Research Group (ICNRG).</t></abstract>
</front>
<seriesInfo name="RFC" value="8763"/>
<seriesInfo name="DOI" value="10.17487/RFC8763"/>
</reference>



<reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665" quote-title="true">
<front>
<title>Service Function Chaining (SFC) Architecture</title>
<author initials="J." surname="Halpern" fullname="J. Halpern" role="editor"><organization/></author>
<author initials="C." surname="Pignataro" fullname="C. Pignataro" role="editor"><organization/></author>
<date year="2015" month="October"/>
<abstract><t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t></abstract>
</front>
<seriesInfo name="RFC" value="7665"/>
<seriesInfo name="DOI" value="10.17487/RFC7665"/>
</reference>



<reference anchor="RFC8754" target="https://www.rfc-editor.org/info/rfc8754" quote-title="true">
<front>
<title>IPv6 Segment Routing Header (SRH)</title>
<author initials="C." surname="Filsfils" fullname="C. Filsfils" role="editor"><organization/></author>
<author initials="D." surname="Dukes" fullname="D. Dukes" role="editor"><organization/></author>
<author initials="S." surname="Previdi" fullname="S. Previdi"><organization/></author>
<author initials="J." surname="Leddy" fullname="J. Leddy"><organization/></author>
<author initials="S." surname="Matsushima" fullname="S. Matsushima"><organization/></author>
<author initials="D." surname="Voyer" fullname="D. Voyer"><organization/></author>
<date year="2020" month="March"/>
<abstract><t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t></abstract>
</front>
<seriesInfo name="RFC" value="8754"/>
<seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>



<reference anchor="RFC8595" target="https://www.rfc-editor.org/info/rfc8595" quote-title="true">
<front>
<title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
<author initials="A." surname="Farrel" fullname="A. Farrel"><organization/></author>
<author initials="S." surname="Bryant" fullname="S. Bryant"><organization/></author>
<author initials="J." surname="Drake" fullname="J. Drake"><organization/></author>
<date year="2019" month="June"/>
<abstract><t>This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack.  That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack.  This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t></abstract>
</front>
<seriesInfo name="RFC" value="8595"/>
<seriesInfo name="DOI" value="10.17487/RFC8595"/>
</reference>



<reference anchor="RFC8677" target="https://www.rfc-editor.org/info/rfc8677" quote-title="true">
<front>
<title>Name-Based Service Function Forwarder (nSFF) Component within a Service Function Chaining (SFC) Framework</title>
<author initials="D." surname="Trossen" fullname="D. Trossen"><organization/></author>
<author initials="D." surname="Purkayastha" fullname="D. Purkayastha"><organization/></author>
<author initials="A." surname="Rahman" fullname="A. Rahman"><organization/></author>
<date year="2019" month="November"/>
<abstract><t>Adoption of cloud and fog technology allows operators to deploy a single "Service Function" (SF) to multiple "execution locations".  The decision to steer traffic to a specific location may change frequently based on load, proximity, etc. Under the current Service Function Chaining (SFC) framework, steering traffic dynamically to the different execution endpoints requires a specific "rechaining", i.e., a change in the service function path reflecting the different IP endpoints to be used for the new execution points.  This procedure may be complex and take time. In order to simplify rechaining and reduce the time to complete the procedure, we discuss separating the logical Service Function Path (SFP) from the specific execution endpoints. This can be done by identifying the SFs using a name rather than a routable IP endpoint (or Layer 2 address). This document describes the necessary extensions, additional functions, and protocol details in the Service Function Forwarder (SFF) to handle name-based relationships. </t><t>This document presents InterDigital's approach to name-based SFC. It does not represent IETF consensus and is presented here so that the SFC community may benefit from considering this mechanism and the possibility of its use in the edge data centers.</t></abstract>
</front>
<seriesInfo name="RFC" value="8677"/>
<seriesInfo name="DOI" value="10.17487/RFC8677"/>
</reference>



<reference anchor="RFC5517" target="https://www.rfc-editor.org/info/rfc5517" quote-title="true">
<front>
<title>Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment</title>
<author initials="S." surname="HomChaudhuri" fullname="S. HomChaudhuri"><organization/></author>
<author initials="M." surname="Foschiano" fullname="M. Foschiano"><organization/></author>
<date year="2010" month="February"/>
<abstract><t>This document describes a mechanism to achieve device isolation through the application of special Layer 2 forwarding constraints. Such a mechanism allows end devices to share the same IP subnet while being Layer 2 isolated, which in turn allows network designers to employ larger subnets and so reduce the address management overhead.</t><t>Some of the numerous deployment scenarios of the aforementioned mechanism (which range from data center designs to Ethernet-to-the-home-basement networks) are mentioned in the following text to exemplify the mechanism's possible usages; however, this document is not intended to cover all such deployment scenarios nor delve into their details.  This document is not an Internet Standards Track specification; it  is published for informational purposes.</t></abstract>
</front>
<seriesInfo name="RFC" value="5517"/>
<seriesInfo name="DOI" value="10.17487/RFC5517"/>
</reference>



<reference anchor="RFC8402" target="https://www.rfc-editor.org/info/rfc8402" quote-title="true">
<front>
<title>Segment Routing Architecture</title>
<author initials="C." surname="Filsfils" fullname="C. Filsfils" role="editor"><organization/></author>
<author initials="S." surname="Previdi" fullname="S. Previdi" role="editor"><organization/></author>
<author initials="L." surname="Ginsberg" fullname="L. Ginsberg"><organization/></author>
<author initials="B." surname="Decraene" fullname="B. Decraene"><organization/></author>
<author initials="S." surname="Litkowski" fullname="S. Litkowski"><organization/></author>
<author initials="R." surname="Shakir" fullname="R. Shakir"><organization/></author>
<date year="2018" month="July"/>
<abstract><t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t><t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t><t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t></abstract>
</front>
<seriesInfo name="RFC" value="8402"/>
<seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>



<reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972" quote-title="true">
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author initials="T." surname="Aura" fullname="T. Aura"><organization/></author>
<date year="2005" month="March"/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3972"/>
<seriesInfo name="DOI" value="10.17487/RFC3972"/>
</reference>



<reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" quote-title="true">
<front>
<title>Security Architecture for the Internet Protocol</title>
<author initials="S." surname="Kent" fullname="S. Kent"><organization/></author>
<author initials="K." surname="Seo" fullname="K. Seo"><organization/></author>
<date year="2005" month="December"/>
<abstract><t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4301"/>
<seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>



<reference anchor="RFC3031" target="https://www.rfc-editor.org/info/rfc3031" quote-title="true">
<front>
<title>Multiprotocol Label Switching Architecture</title>
<author initials="E." surname="Rosen" fullname="E. Rosen"><organization/></author>
<author initials="A." surname="Viswanathan" fullname="A. Viswanathan"><organization/></author>
<author initials="R." surname="Callon" fullname="R. Callon"><organization/></author>
<date year="2001" month="January"/>
<abstract><t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3031"/>
<seriesInfo name="DOI" value="10.17487/RFC3031"/>
</reference>



<reference anchor="RFC7426" target="https://www.rfc-editor.org/info/rfc7426" quote-title="true">
<front>
<title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
<author initials="E." surname="Haleplidis" fullname="E. Haleplidis" role="editor"><organization/></author>
<author initials="K." surname="Pentikousis" fullname="K. Pentikousis" role="editor"><organization/></author>
<author initials="S." surname="Denazis" fullname="S. Denazis"><organization/></author>
<author initials="J." surname="Hadi Salim" fullname="J. Hadi Salim"><organization/></author>
<author initials="D." surname="Meyer" fullname="D. Meyer"><organization/></author>
<author initials="O." surname="Koufopavlou" fullname="O. Koufopavlou"><organization/></author>
<date year="2015" month="January"/>
<abstract><t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces.  SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane.  This separation allows faster innovation cycles at both planes as experience has already shown.  However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other.  This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t></abstract>
</front>
<seriesInfo name="RFC" value="7426"/>
<seriesInfo name="DOI" value="10.17487/RFC7426"/>
</reference>




    </references>


<section anchor="change-log" title="Change Log" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">NOTES</spanx>: Please remove this section prior to publication of a final version of this document.</t>

<section anchor="since-draft-jia-intarea-scenarios-problems-addressing-00" title="Since draft-jia-intarea-scenarios-problems-addressing-00" numbered="true" toc="default">

<t><list style="symbols">
  <t>Simplify the &#8216;issues&#8217; section with simpler bullet list.</t>
  <t>Several editorial changes to create a clear link with the gap analysis.</t>
  <t>Added issues and scenarios mapping Table.</t>
</list></t>

</section>
</section>
<section numbered="false" anchor="acknowledgments" title="Acknowledgments" toc="default">

<t>Thanks to Stewart Bryant for useful conversations.
Ron Bonica, Toerless Eckert and Brian E. Carpenter made helpful suggestions.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAJ5D7GAAA81963IbSXbmfz5FDeeHyAkUeCcl2mMPRFISbYqiCap7OjY2
OgpAAqhWoQpTWUUKLSvC77C//Hp+kj3XvBRAtXrtidhxuEUShazMkyfP9Tsn
0zTdGleTvJydJ20zTV9ubTV5U5jzZPtinhWFKWfwWTIcmzKr88omWTlJ7upq
VJiFTfIyuS4bU5emSQaTSW2shae3t7LRqDaPMMbz3wsfn1TjMlvAOyd1Nm3S
X/Iszcsmq02WWh0gXcqX08x9M90/2BpnjZlV9eocBp1WW/ilczepraeq/jSr
q3Z5HkwUHkl+hA9wYW/xw61PZgVPTvxD6SXOZGsrX9bnSVO3tjnc33+1f7g1
gdedJ18uBw9XX7dsA6v6OSuqEv62MnZrmZ8n/6upxr3EVnVTm6mFn1YL/gFW
uciWS3jr/97a2sraZl7V51vpVgIzt+fJT/3kX/IMfmNS/JTPs0r+UtWwO+/a
7MnkyYMZz8uqqGa5sclF1e8lN80EnlGS82Pwhz8mdYX7aCZ5U9XwBwsTMs15
cnBymrw2+d9w+feTPnwyzhugH/ztF/gb/l61ZYMkvevf95OLeV5m9NcJDPfi
YB8ocfIC/mAWWV6cJ7BdK5zsX+b06v64WvhVXfaTh7qy1pRuZZd5/Sn447OL
u2xhl00xqepp8nYxeve7FnkPI8DP/eTw5MKt8H1b5uN5uMC3pl5k5cqv7uX+
q1eHweImMNl+w5PduMCbfnKdlSWwgFvgTZvP8uCvz67wTZ2VY5MM+4P+sP+x
//t28WUv+bc2y5NJm9xVcFzwh3+p2trvZ9XCe0qTvs6LAl4EnzXh2vntfumv
DmFrg6UXuIx+zsvYuPbbfjKcm7JauaXf5kDPIvN/prXfV+O5sXCy4HxZEC9t
Y5Jq6mmxClZ+f/3wrWW/eOHWd2ue0p/gGIdr+jgcBJx6fHp4FCyo/GwfP9m/
1HnTN5PWL+Oun7w35QTOry7jLgPS+T/SIgZ5PWptMFP3h2cn+yMQfpW+Rzau
7Xi+yJsmGTZ1Br8nB7+LKw9OT8OVLHF+/QXN7y8ZzWPt2F1ltimyTyY5qif+
7FVlVkySq7WPaYlv2qatTZdNgyW7B7616sOjl6dAwbKqs0U+Ti7yelwYt9rB
slp+ynrJm5to38q8MRMgDohXi7wxWJg6Hwdi5+jwbD8kweTIwP/9ZYa/xWuH
7bzJW7+XoMLkD7RIEmfJ+2qU06x0aZ0/P7u6o8Pkr21WPrVA/eRH4Opk8OhX
91fYSXhf7/cI05NwWUXeLmGA1S+rv4zx0QVNiBa4BRRdZE3+aM5pgvdvLj7D
/0DxTZMngxMwSWaTL1/+IJ98/Zrs1Fkzh3PXzLMSPnEf7PbgT7AA+N6kSsqq
SUoD9G+qZGLGBSjRJG8S+KJJzi9BC4Jm/b5X//P/9KuT5Dq97OcGTJMit8u0
NJ+zWVWer30AErCuJu24yTd9uoj/ptbFrJUFLYtsbOZVMYEJ07thwTjNZJYt
wXTJipXNLZsn9DyOFJop8Fiqj+Ef2Yjwlsr5Fn3t8qfbi8Hw4Zy+D1udTlbl
GA5iurRpaw38aFig7FwDccoXTfKprJ6Sp/kKiQIzQHJlNXDGo5nsgSQZfwLS
jVYJmCUZ/1rTCvvA6rsw0vDNxeD2J37n5Yfr/sF+/+Dg+GTv6Ojg+OD4ZR//
PTo5wXdGc5sBD6Z1M3uapeNpuWGa8I1/+3h9ce5p+rc2H6cwh9IuK1I01xe3
J2/lgRqJPi7rWXoyG+NP/Pn1HX8uClYecfSDX+F50F3w9Ovrq/v0ffjCUW7q
dNEWTU5zmzfNMgVyL6sSpof0fj+4vXo4CBZ+drZ3cHKyf3B8dgYC9ezgkFZ+
cXEbE+fg9OTlq6NXffr3GAX1u8Ht5c3VTx0aHr483T897NO/ZzjSw/2H4fCq
O9rZ6fHLs6M+//sSN+Xu3fXtX4On9l/tDe/6aGH2D3Ccwc2Hd4N4lMP9k+Pj
sz7+c4IzuhjcP1wPrwbBy/b3z/Zenb1Mj9KT4/306NXpwUF6+vPhGW7uZiY4
PILhjvr8Lz93eXl/czUc+gePzg72fgHTAZi7D6Q1/f1DUKuvjvDp+6ury3gZ
1xcXMMeD0/7ZCfx+dIrbcHOf/ngHE4Ufk0Sdi+urq6vk5f4hLLh/nKQJ/T5E
ezqrJ3T6bqqn9B7UAWjR2hRwjEDhN2jP220aiS3xw/3D/XT/hP4CWhbUFQor
fldCo57LaxKcRPKQ2U9s9CfHPKGsnqFcR/ax53t7VuZggcmMwXPk/rQHA/18
cPLzcYpv7c+bRQFDXF5dPKQfb67i9V2C7dRkRXJVztHKmoCpXk9oFQ+wGBDn
C9T6GUorm+zgGLv/AM8sFpW4VFMQSMnOxTX8+S6rmwT4+MOjqR9z8xSvf//V
8+u/ehhenydXbV0tDUhhpW8vubpNjvb3k4Ozk/Sgl/xw2D/tH2wkx9PTU980
NidCTEwBgqfewz/8bMo9GAK47mf859Ur+u0MTtcekHv/tL9/8PPp/p4pf9a/
PwLRTvcPlv3lZIoHenABZzymGv8tHSSXIM+IHI5K6DyCZ1UVxByv27xApzUZ
tE214AfQw7yoUA0Uz7DKwSl6jJtJNbgdXu8Nhu/uB8AxjhEPjk5S/N6ztGnA
UGLTAHX0XmbndWY8E8kfUh3nn5espH7OJ38+eHXw8uB4H4a+ung/SI+O92Ni
3JqsTt7k4AF1KJEGHCJuNVNm5/bNxfVderCLRl1yNel3ln+U7vNK1PnkpZNZ
dKWT2OJj8/PBq/2D/kE8peiAvgfbqF2AG2H+1ppyvEp2iL9J38Nxe//u113w
TJ5Ao97kpYnXYGmE4QI5+22dT8AsXBb6WWfWL799vhOZKP2SDgdu8yx4QBkZ
t+tbh2f787KoauOPOfjnaNQ1ey+PQJ6/xHe+7hzr10Vrmqpq5slwacb5VGb8
zOzc08BQ12/jkIN9lqNG+i1iKBu+B7/04WJw+SGa1IdxBoaUd6b+6z/+04L1
OgJT4QmMk3kFKjvJkndwdNGyvq4ewE4uq0c/9e40kKlBEKHl289y+jUtTAbG
kd2r8G1p496W0ptStEjSaNiHq3vQOPdXg/fRbC9N24AvZEgOfqoWCRj8DUrF
OgPXyGQLMg/BJqQDjBPGX6fkePQwcHRRV/CK7BsnksYl6oGMWgCXZvzf1Nmx
VbknVhTINJ5PKt9LaT7wX3DTaD4pvD+V6aTVlH7l6cB46Zhnkx6dvDw+Ro1y
dzW4fxut+K7OHzM4HqIKkMU4HDYAm8da/v3eWINTEt2U8jibebdm+24PZHo9
Iw30AIZOh8qwgEVe5uBuj1UaIvPtwCfw6+7GkTdZkXtPKPcbIMBeNqraZm+L
1Up6ex2r9NuqTK/vwnelCTzzrLyBMeAJp5vW1GJwjl3U4LdVVBM4rnslTClf
6uaxO/bw4T6a9gOyIsgiEKK/mHHzPFtV9ZIfofcgFa5f38XiEWVPDdIdeIMk
GvAG7Ch4NvdAOKQIsC9ys0YZt9eIkwqJ1sIrnY+G6EkCeeosz+brH4MLjLGH
3D4jmUCt1OC5wjwKEkt2Xi0TJDl4oSVyjI/OEqfq/FFocwzAadjYFjtgDfN2
cPfz4HZw89PwehiR6C24UwN1pzZHj79NExcl7fw9ijN2PotCdN9P4zAs9J1n
BVTI3noMe4M/GDmMe2s0PNvaYofxtSnA/0OneA5HuapXKBDHbV0bDPg9647+
RtQcDI2tNE2TbGRxCc3W1kPAlYE9cX23m8zBsR8Zw5y7yH5Bx9gdsjGYuLYd
j1Hxw3YGAtY/tFIhXoBEheEKWAFMv61XfRCB0YGAF4EMMDZZgqWbWZDPvQRk
iptCbdBRR06MRUXwLmRRDJ6B/7zIQECrAk1sVbSkRPvJO7BKwI7tyTM2ecpB
pbsn0aABn0MENXxqigL/jd85MvPsMa9qluVWTo5NQFTB4+Yz7Bd9AnMGwuN+
Pc2zRmIkL89evfr6FT4bV7My/9XQe7aLfEFhMJnWdh83BuMOYpkkwIzjOh8Z
nlPqvg7vd4mWBt8CB/oJ3fRkCWciHxVAjnw6NcQ2nhOilfZgfjmIK2S2cZD6
AfE1AvthjKuvkEknTozdhWPBh6boozyF1/rpzPPZvID/x/CFbWHm4MzRIDBu
tPXdoYh4wF9s8INFXZMIymAldtzCg7AHaPWDkbPCwUAfN/O8/LRnHqsCTB0c
fG1MW/F6GgxGB2sKyNPlm5BGfT4pspJ8An+DZ5Qi4U4RFavFsqAvwhO4mokx
S1NyxCaDE2+aLC/g1yjIlOOarFlmNc4Lx8hKXKsb+suXULx+/drnw7zIJ+Bg
gtz4I9LUxcKSL38cXl2cU3js67cOeg95Jcev4Gz5XAK30/KW+iCwFv59R4fY
dYZaka3wRMECLJ5UWCGdQhjok1npZnsDETbULBakU2owAl3ebQRMC68PvAE5
XuD5gpTpJ1ePMPoCDHfYyx4fXBxZhRCmFS7u9oA13ZyBdcafYjkyq7NJC6y1
CiQKnVj8ocsAOhCcEGItVuSyojHOxL1KBB2yBe9/IC/sCpcMIg9OQoPbPDZL
+gAMPjgiq+R4P1mBRQcLnlUiJvbPXh18/dp79qDwmD0vY/zhREGs8/EHlYiJ
ry/Ajgd9IvR20qvHNKIp8VaXFU0SRsqSF2MOUAQzwLOJZzRa64s+envAwXzM
gTxLsEDgBK8CSb1BMvdwG+ff/xp44pEyaKa0YJNY+HeSNlVqUHJExCcmI61g
kI/g07IEU26DGILfM1jzHNT61pZTFE6e9YCjbTXOSYQpV/aAShPjNUJPBH+g
RmAOSzQWUIZTEGUFlAYpZZEPmCltPivJ1QOrbAXs2KDxMREe9/MLE4gjQwwL
cyzAiqbFhEINVrFw/FBnC6MuVUBZVhfgcE70cI8MyP0SP1P2kXe/sPoqXBOK
ejjteCRo9/Do12ZaMFnlrUBnZHMdaftGNNwlnbHtXjIlQ1SD9/zFUEWC6dbg
sOB60uqQYLMCjtwchCVaHyJ/gOQNnPM5EwG4pW55DTkSvkZ1VnhpoSvq4ZMo
ts00d3LZGppvi0k72kjcXItqpwHd2+L0q0dUH8kCufUpx6QBml29BD5Fq+wJ
Fl+BtYjpDx6SJ/0Irlvr58zDhPPpJ//KwjJLYlsAJ0k7FWvsDsd5I2RctcUE
9TYe37HJwAakI09atcfyM19goJ64reeNHzkP8ev7yQ+GbE/gSZZGsNwi/zXz
smF9vgFR3egdkSinasfu8urM53k+ypkNu2I4trdAVxmZSHDKaBCMVOgywJeH
ted2TppT7dB4bVtbH0pDWopiAnDAwDZFSuGrGzSL4HAGEwemQkaCRXbstZ7b
pfiIEcmRGQyIMdMLLRNMK7LD2AstTdJo6ovRiLke9hbltWanavHL4H0sXSwZ
YLD6pTPPSdIjtdHohnXlDRnkoBNgzGkLLjbSBh6kdaJJWY7zgkWD4S0X64g0
jmMxnMMLv8oXPE+QXsh206otRQjgRnUIxZOEL7aFbEpnKph71d2SsxMbm0ro
zsAsU/H8TCqQOps0jOnP+rAFmKcqaDP3BJSzBwuH89iwd0FiCxWS14zIdpht
Av/G4JHpMqifXi+0DzikH82e9jAbo7+6RpquyQ8qDjcQBBCI1s9wOmgD80g7
wm9VjVKoI/87Z9KTwy8KbP4C42pT9RTgF9KmbGsL8edVwZGk0PYAYbsARkbR
QuY3ym8SqAZNNLaByMJaVI9Go3rCvMCGs1J5zJ0Fx1uw9d4gXztlZCTIKVFf
eCPHuyPUUWT95GOwjzTcphU6IToCox3olsPYtK3I0pslmRXBCNPdLCNQGoLg
rSsyI80Uh8XgeY/pJIcZ+A898xxlGoppy2IUyScuGbAzviaSZxH9Io4j5t1D
XQecQmoJnCbktWv3OzCQ7XWcmJpdKZC4NZ1ntiuLonrCWfwNfCDOtm/9U7I9
nBO1ustdtsIE8J/oHBiW404sgrrIAg3NvtNnEVbBcSUrzm3sIrewjWP6zsIa
nCyxoOXZhEeGvMh2iTqPGW+DYCJPl1TBFGjAMg4EGpNhsskE/+dtOLCVaC+W
87/XYd/AJCxKhf2Q9xq2YGfAXei5Pi8KkKbsSmIURfGWpiQUiiGDfE7WPWgO
JFrkq09a4/Q/qBM+NjCT4HUsumFXSQGr7F4A77JMbslMA75YtAX71aGzTip5
YWoKLCA3C4mD+cN5x0ib5wSWS7xWGDpQE8RX7PR3vf1OoBWouKqEgVViVCMM
5uaPRo7L46kanof7++RVX5PadWYSS7lFVn9iqiAjjudZOTP6uvDAgTLF9JzY
MpjOBEcT7IwCLegeGSlEKh6BD4OGXfDXRu1nymdG3837BlSY6H7eEKA18kVu
mV1B/s4z0gjCApyV+6W1TZdZFhSbIcFMVmGtiQiQTbBu4UUMZwQ0dLRzHKAc
r1EkOj+wDtC8cvRjOkgkBdeHm7EWP8ltHD4hM3pjwETf2LU8umGSnhzSIhtV
NcPMeFLPR3OYrUv2P2g/YcPIMbMUmYDfNnnl9B6yRHBXFktxM1XNseThtwIZ
/vEPaYrJ8H/9eLf1R0xgP+I8EKeHSbFFLnFNDuNgVucrUQ6FFAntZPv9x+ED
uFL0b3L7gX6+v/q3j9f3V5f48/Dd4ObG/aBPDN99+Hhz6X/y37z48P791e0l
fxn+mnT+9H7w0zabQ9sf7h6uPwCJtzdHwDh2SPHvZW0aDiypTCQ6v764Sw6O
EVB2eHDwCv99eXB2TLYov6IqgX34V9isFYaGMC+OUg/jAdkSYRbkllPQsyT4
Vn8rTf9pi2Jhcep8GErd2Bm1QmICYUmkzCs7245Sa8YckYKTV2BKO0vKdjGC
UwanIIwQFBQJYrYcgb/MKrvjD69Fezt+749omYl+t030imSRrcDKqT4lOHZX
5+jRi8wSEqfhfNm7keP9hEcaoxnmWZu9h7TmzJZIu4AknN4Bu/4Nmn+Y9NI3
93DsJeGT4T1qYwaSTo/vE4p8INwyB8XTLjGegGcYd0RkGB5h8lGEgTiqy1i9
BWkDUi8axkN2qBsQIvALbbcK/g1Hto+s0uUVzDWrHQarvirBfa9KdjSFVfzH
X8mWCgn8jIEYmq9I5lA1d7UWBjPnNP2d6+pht0cGOQpF0B/VUzqubNN5jUYW
KBZDjvGk5+0sOpO0rwEIQ7/CkTGmFEjelp8BKbREDEePhGG94tHAJqlBJmWP
II4zNQyuyRDJmR+qJEJ4qdJaB3XdmdrSa6gsQ7KKsPGCGsNNtxiDQ7u+YyVx
jkXsGbGIcecLNAgoHh1Hy5TwHsUB04F9pbXsvL652oX3wj/4Toff0vz0b+O3
khTdijqLRv3IoypIDId+nyEUPh0WoCH2HqpPpkzvMtYcO++Hew93NA1CQuHj
CANKCQaUxvyJaB98VIE7+DDBgZ7B3CQ7dzf0hQDeQ3bOW9xOPEDIYFQtoziR
Lm9QUDlLAr6X4Jg+KGaLmcwMTwZHYSgCSGkNu4o0tGbTC9hIIIsfrHtUtH12
iZvVkuwN+Y514wecG0JH5ADgjgODNoXZxNf4qfd8LcoR4fROqG2GEdINfO99
X3p5UyHX0MmEqYI+Avae50v1QGVuICjbGo/kohJUixp7YF3gs3k5aTHcCGPB
CnvkVaZgVHfiXRT0A5dX57JAQD/4WEE+lADWGUW0QELaNm/IY19LZwZf2fny
hVBGX7/uipkWxNWXdV6Oc5BByY4zx1zM9vDs7AS+pZO0XpS5JEqywxGYNYN7
lyjZkp9AJ7XLZW7jScOyWg63v+U8H4ZolkXXQY8EAbJfVnxSA9CHBT5wgFNH
pECCmYRcHXnnODHHjMDWQNQZfAETkjJED2bFiaalqfH04BTnBKUibiT9g0eT
KXH86uAVUj0Bl5JzGiD8QG/h3nJKochlr3t+pfJOMAvQvh+hK70sqpWZ9CP6
VPHxQHvZoiwDhivFkEeF5EajIGOdTSkHBgJKBe2IFW1n2J1YOrvEIMqX/NE4
Dl+La1T6UXg2JcTLqWuQHNWz3MqBpdZmvDcuZBVGqjRa0EmNZcnB4csU483A
2GyjOCegVo1FfCqD9cjwIs838yYMGyWgJWoOUBDzKl/A8gecTgJ1laHu5jeH
PGS8ZSEeXJbXYwR3qHGERsIC98BwCQAZxfQ7vL/uAhPAsyeScca1MbPaxem9
HCEpaz6LA9s4fiN7EE7r2MdowOUWw1cFFfBgScZEJvDbMfG4YAZxUzG73rR4
eoCZnypv+QkVLNsi5OqjBDPBcnT14p8Ct2PmUP8KFL359td2xODJnXFjd9kf
QzBCLEGp8EOZcEE8LycVE4u9KEKHw9IIk9wuKeoUnMc+QphyZl+KDrtYCkzD
Yqguk6ykqSmSKAxTqWPDkXaapjvZTj26BEM5LlqKAdJEwAwm2qN8GOjyFQPN
bk0gNd0T1wFMZyg5THk8SkPcOdqG37hCcQmSnxl2SClo9aE4GlGVI0TeJpyU
HhPLuzW5tRiKRxPj0AkiN9ElZqOJgImRz0pMvbZcMkmRECzIofhNRkm45DHD
LLMGDKfrUB6MjblN8pK1m6h1RrTGH9jM43DpE4fmYBI1YhMe4ROMuHoqU9VQ
lRUSPPSMGxrnAqqR2Lk15UTk+9jk5IR5cjOPFSvJ8GULtEIL4Lc3GBEk1w84
iby5XOPsC4Zmk9PHEoTNLUkSsYXhX5GRnmHpAx85a6m0DO1GrAW5mhJ1x+Qh
Up12gYL1Dm66wPXkTYCxcs+L/1WgTYLnSiJICwN6h2wIR29OsYmDQGyRMnAB
E1hpx/geAVUxfY6WG7ikDIkQRnSxRjcaLNMGTk9g9bDfo6czQqCo42AJr852
m20wb84vk+wrffqUWfh8b1Kj+wHTbIJkrFRHsdbDiFAo6KaFQZdPpYKsALET
lRVuwgQohe28+zRQBrwm2nRA9js/Dq7B5Odp4lhgURMES8FBuVe+PtpORkFN
qRSgGwmbDOwj688hTjcb1fKeXjygfOfJYGSRRBZoHVwzMNQ0n7Uq9VjHY/gP
CS66QxIgpDGfcoyTlRkhe0h5aIakTsCclHSA0nAJ1AeiDcEMAbXicB1gAEnQ
pZcgNXTPiL01sIKRgrQmTdjhLpIZqOiCqYLlNMkpwUbqwglJEwlGxxt2AT4e
HZFxQ6l6AtYZNAMLOJ+ycJQcOWGJjCVFHBAkYjM2Jj6Bh0CH1a0fpSrMkMSj
HoKtLRdFEu+f0YkEzapGiIwqxHECnraBd+WkY8/JUolFSzwBDw6xSBjKYVw8
0xntS5gObpu3OlR+dcnsDnF4IvSPM8k+wXdlQ9xTMOUlHyjZb8w3YKSRY06c
SURLp6AYwowenGScNdFR4rlwEAvNIGEYkJRUC8B5ek0tkYU16iCJqraxqInA
BWNglXMPOilaJAG6E3vjomrxMGHKvclDDxjhvmjUshFUUqg/FKoYqcdTiq8e
ZyDZ8fTusIfai9e0SwoYfVK3ZrXeyRsTqQhWklhO7DG6FLw44w2Z9zi3//qP
/4NKJ68miE8IXHU6TeREq6rBR53VbKtFGPtzOIa/n/melZEF30/eg31aEQ0X
4qRT5sZx1HPIQzo9HFqdROkMpiDG+VFyC9VmqCizklzMwsC46K3uCpqo0e9v
TFrLjJgHqrYeG0FaLUymqcHflfmOcq5SQxxktMlM+c3loxu3Ofm4EcCbYZCk
yieqWcKo4bwtZwgmcpquBxbHJ7PJLSZFA6fAGWE9OFF4eAhKWLm8cADB5FEs
50vRse2AIDy+T8APLKRibIsHH9AwMViys04BE0tq2YE+Al+VEEFj2C/ro+uB
z4e0XQs+C3rgclViEwUykrHgg4yZB9lxo3HoCT/1dWsrHgSnRy9mpJkTRhHW
ahK8YqyvaNwr+gmio8gCUgc2QDlZxFAUWP7vDWACN5CPMiuqEUawlENEVnLu
TKIJ6AovwJ10zM/2nh8YeUA0gG0EyRSuEktdHGgAETwzdTnASRsb3TRSIDXL
TA/BowANsgtpq88o09jeVT01qqtsMiKlQ1JbAUQ4i7pFAwXDe6j6COQuOlp2
b5yhWmfHbi2bGVnziYWvYMOHmdN6P+bpmxwEOZChBYOGYQ2OKh31Iulo1LES
slvbGT3Ksj+I+aB8S5GVoZDngwfu7VxBkM4A4Hd2w0gVK9Ze8MaqBsbiDLWE
gTkkD6QM2cNZVLB+dGfTv7Xsym5kGJRTvFcce8iC1DQcaKIPJr3Zt+rxxJjW
mzaezeu8FGiHZ3iHO1sjINFrZPwpoSAOw3VZlHASjaFTtZnhvgljIEVxUZxO
LjLNkrA1F3M7iD/QqxynxUXEI5DzKAeC6IEhJjAk6TQFDGKAMHWsvtBMGAmy
Ths1UBT17vGYo+mgKiPHOwA7+wiuukOgWN5r+4Vecnk7DN6GzqwrenOeJgKl
8WsaUeLtZpCFOxxVmXL4gHYBzzDrJhLkihmjpeQKZhTrTpHiOW3LOI4vedLQ
tsHPzq3/UDpThwucwjglubcYT6WCGVlT+Poy4elmwSvQKaf0Ao7ULpYsqC41
JoSoBVoZn5GaM7oYBWiXgvMkMUg2F/EXjWbo84mC88COZaO6LeGl5Ij0E402
+jSfq6ElqPWMkj36d9gLnQEBBHFKTwKtUwhQsFZGwFSIm0MfQs3TdokFFWje
TRssOZbTkJdeyYsNQ0dIAbpZGa3SP+yOYEAiEWtR9jITwDiwerEKsemyNClu
CDY+1I7LbIUSCbdiDtSdeIQi9aKhwYDKbO74YBxZCop55+w5OQQUk6XEBEL8
qSapgPWUXf9CzVitClOVp1RQmfdIQf/gKG6cgIaQJGgp1UOSbPZxY86VYysh
Z/l7qF10lKz4nGh/MkxJEIdZWKAQePx4/IDCFCHlWFNug6MEJxusS92UdXuh
49SAY6wR10AWr6fuPVJboGIgbkX4B5VugnFQgUUUiHxaZmIGLvG5bxi2F9Zo
gOSbkcX3iHxfeGcTY9pam7+OMSWMc1Wpj2HXFid0mmLqaM2sd0udU5Yfsds4
X6pim1SSB3DYR//4BAEPuEPkU7ktKQXJiZk81qIS++9IaI7cj53rpQUueTnB
2rUJSyP1UbiY5omiC7x7fqDc589gTJ6GmB4KcKfBvUsWr/9uHWxspRiGwZkM
J6WDFcPa6BmtnxHhHUgF1zKIbTB0SfFl5Yr+Jj2pGsykUnlRI64pTo6sQXrM
O8ibWNqtKDiyYGg1SB3r7aiMWpQlO+TrVU5Z7yZrjoaArVnSjASJz6gIH5cS
qCgjMNdmBU7eQo4yFsRxVCivVeMFUZxOkgFDkNmMN5Ulm2AVS4FxSiiVLaiV
TxIxQPTm6sO6xu3mxAKX4tEAq5DlFMnNnrCZMzHY9xJm9Xh6+nphApyNNcU0
xUwBK240yTXuEOBYwbIRZCDBGhngWJVaossACrb9pyQpsLyeJDD6uWht7KLF
m7GX0lp2RlZkhgTfA6mfgorU8ir8Qpqhz4rPc2rC7oaBPpmi7Sfrvh1vlEnu
8bVDDDx9pIDzzv3w4+6zCNox+fGJWSJL1YRWCNwyxbfDEHYTnXCvUW3Cz1P8
l8Cuv1D0JUjhssPpcj47blN3YdLwkN20RISmbGr2hmi4ePHECWQyiROb8btS
7GPAR7NHx5gQryz81HIUBnGhLlio1nNN8hrT4eisoPimEiPvF5Cj4ZAUm5yA
AD8tXnUnkObcjQ5qCzE0YuCAzBFR9aYgk3MwgVWNk9urBz7GO2+wrZnlwvyK
64lbhMNSKLRuMOcQ7nNpnlCSmEn6mBWtP0BgKqrXEGFxEEcp1ctYuTI1tAKx
F/zhBA7AaUV5r5UzalQ4wWT+1pLHhH0GwLu2XCMvR1MiQmGSVXU0iBpQupLP
6pgocIAWWtUgHK4yMLT49dFAMIsFTnLNvQlpjTTlfYj7zzippjhtRhxyz6OG
MIdkxgL3NKslBeGeo5Fk7DLnRHDMEkVebp4Q1CLbkfGOw/Zxhox9wkp+029n
0l/EWIU+Y2hS8224g3y6FDbl3ur8OI9TpvpTX0ZKbT6QIkMvReerEfZpWh9F
oBosIVlxrT3UC5SP5oOCXacSiGDjHCcSz+lRCmJSW1uvEb6nS/OT8aCMzWbj
elT5vKuvZKHB3GEygVGpi0MHsTFOMlBcGBxPlMIk2iQV4Mz25FfsniewXn2Q
/uhi5TgOeTsTMbi1YGuClTYSIvOGUc/FinAU+BV4sl49P1o7ktLWElNzIyql
tC53qyD7EeUp2D4qZuAMNPMFgTtDIv3GhkvF+gYTTgPQXAKHr4CHuQi6O2/n
d3jah/H9cVVzt0d1UCjxbsBUz5ZwANcD6gENNQ7PxtJ6/BwYzJlwUZrAh8f3
nCGiaCtkJJbNCZqemuOflZUNatCei/mL7FHnH8ylbOINXfLHg6c7FqMV93pC
2Oex2t/G9UrwRSwjM85aqj/wOkoDhHLUWRjW1QiV5wank22vOqjrQG+wRCNo
5SYXJg96lLtwpRGkKcR8c+UaNE0SpngixLOIEZ0MwKB9wIqxBddJ+DBoBPIL
gAex56rcRGX3fHxwSAb2MEWc3wlzMzWr4Y5CoDeMgyYHTIaCzUcKVEfKfz0C
6VQLBdxqgxukWErpN4qGz8AKWkygGKKegq4MIUe5bhzKK9pQR5OF+aOjKib9
BO/lMGV+FfRdJo8OylDfTOKOPuuGW8nqsReDz9ZG4qmzA4h1ZRixCLUtnEcw
1jXfhUUOQS23l+2YzcTgXEZpUQlBTTIXHAwpEqS+pEIlMNiedWKY1aR8x4YF
l66u1UuluCa66VSi0ZJ6gWRKI5npNSztvOvrimhu16+EUSCimd+zjNnhXtVd
+3DXZVaCPIyXiuMKxDuKQWNjL5NhsWBP5IYMAkpqObkeQuIKCmyibES/ReL7
9DeJA8EyuPUuocvf/Ha6kA7qk6TVMYA2rcLuPA5UGaxjvWbYlVxTQqIoNr1J
U37EoS7vh074noR+1nJ8vaCwYF3UEZCie+hsQHrvfxWc092U7MsWiK16z+CW
KzlWmtxTM/UrgjmMayPiE0YYr+220YCDiNFbOemn+3bvbB89e8InUbyRYiMU
zyUIJK8tn2HKNq/HbR69gYuHxp3ymAgWwZHQzLoqQpg0p6eTaZYX6EKQMMON
7KlCRjBRia4CQUTwQFZkGNVrLpJxVNE4npFeQBpORVXAPQqofTIwIf379avr
kgMvXGr8H18SAcNIX7mgCbqAHU/gKbPh9ETE7zgv23zWhj7AF7rkeFhX7DRF
/swFTMh6G6tkVfyHOV1Eg18hhchIwgqNgkOKWp8ZGfCVAlEeEUq5kMRtGDRH
LBTyAdoBCMYosJpOy5dFnqtjJAkvGigjkZvs5FPSFg/vrhLGece+HSUNR+D0
5U3VdmsMPCwJPd3rq4c3JOLotDO+kPIZSG4OkHmLIwi0s4jg+J4eMTA1ueCH
tsMtQJLy/eS1WD0bjLDnoBK9gOc0KyBoaS8yqdaNJk1GzWNuKRjhdYPz/VyU
Ww0w58cRMqIDYBm7GCqJqqCBE8knKflzRcTdswn8VLdLsWQfEDy/lDA5Kxtg
JgRnCwxvPHfYBtEpGCU1uNjcLkIOC/r0SMXCycHZGaoq/u309PAUDpx89Or4
2H90ckilIf3gFXkUClXjiaSAB42Ajnlc+dkwI2Cdi6V7AjTmTza4dLdSH4Mi
+OplNt2am8ZZyAwM1coYskFLtuNwkuVzWH3LsBVSOaXZeIjDAsGvnKcFlcRj
B/47LMBTheECileTsFHQzw2jGnggFQaFRx14v5/cXA/v1kJo4VdxM7AZD/eW
22QsubMwZWyx6TLk84cFWVVyUZ7b1kUK3lUQAE6k98omBJd4/3pMBIOzHiRc
UHzwgS27hS+dX9Y5w0CyUmkkxi71HUDXD8uFA0B4XGwPbBu/qJ6OT18eHY1y
S3spQNNCKlBuf/hwlOxo/eIP3OlJOyR94PeDcRY1gVZzhNw8igiX0vmcoKQR
s/XEaOGu1ZNgVdrDTVOC1AGToqEMB125AGtgnkcK2stLcsThJFbS6EjWkbxH
wxCZfOeH97AKpjWGB5co+ymLQwQIFGRXqmtI0PcAEKnucv+JJaBDZFtPi+wR
d90zulXR8/IVChuVL2dHxy/5t023fNC1I7h4TGpzkwSVC51tdw23qaAY1Hil
i7m8sJ0j7OgWpiNFXgo+NDTeQwzot86Iho4ixeZdIwO6BJv30kmBx30Xx3fX
VDtK5DjeB/M7FNgZRYLR1uW0ejgbOXUrr/J69KR4hPH74DW7yrkB8CKaLTlC
mwIryYdSJWYyp8ZYrJFKJw/lfJJp+phLly8sqYuwiZQyx8Sps786jSixAWUF
fLTSuSE+ZQdvU6kNbJM4jsm7axdsYVHhpRrDNaO3oh8oMwJaw5EjU9x1hPCr
o8grr4/BCdSQCoWau/OGYYw5fDZDwwodCe310pZsksYNDwMxaR3kQmYEs+kn
GKRjC1e6cvSculfZgD41e9prJafdFm5Bli7boLZI4NOiKG4YFAilF5KsDtuO
X1/cetY8O0WR/ZrqVSWFQmn3TPyYcZEhRBzk8q/Gxe9iCyc8cSyAt9GY3k7C
W4fkzyBJtl0ghH04wr1SbG3D4IGxhjkKkLis+100CggWND/o4U02FIPH6lWT
0/t9az89ElUtdk1jXN9RtMR9ij5BvtRgPnVRxcCQ9DGMkvyE1YKXYmkznzBn
NdHo2j52rR8T6i0gAwpkcW8cEEymOTPUnFTyVBSYU+UQNFHjRWIvKxEwxJ2f
8aigYVWmBJlE/y4rNI7rPPuYpwPbVnMski+Flw8vHu7UgNw/RYmG476/e7jQ
P58evDwk6V6tzScyk3ySM7m+FOQgzojdDxWADKzqOroh9IHb1YaQapmtHKfg
JZISoIuSYLb4D5dUfyzBikKOchV5QylK2fk4GO5SBNzVSRJ0nyIDitwJG0Hi
4Wa71e2Tx7RozJ3VOnkoQdVL2KzCz8hQjPIHyaLjhH7YRW7XsJEkE94yAFFr
DYeS9t15ezHcVWilx4IsVQlp7XAQO6PKA/aCqO4Iy5ncUqXSvqBOSuRswXzY
/Cik06hkxwQFwO02FYcmkFD6maPSY6CapC4wUaoB97DCoame6NYBnCgsR4EH
7DDAGVq69+5RhV9WrH7FMlfsa1/NwOstqP6CCRN1RA9e4gxseIMGOHFpXDFj
JaJgxq3a/Dqgh817GePLhTWW6IHcc0kCkXlTSvUU70EtrEoqRWmHUYE6CzGl
MC0OxpJdo/EvTpOTStRY7AagG5p/Ulgl0GJ3XlxUZDcuxXimMkhppSlfmhWh
dFiQEjFcNIdrfjiIw68LPc1sklf4qcH7PCyBa8OCckJeI5mO3u4dv/UpOxYo
QScXmgMFSXhX0Oqj0nnKGzDts9LDhyxFXATQTTNSSDsJO0chsmk4IVpzWN2/
CZspOqL4c+RGrQIqCEo4jtStJ2OI8ZzV1S4J3rExNUb8jmWqKfVjF0tuVrES
j0I9XMFhKXPI7Rwy8kB0q12fHu/5Bh4xVQwR1Ih6gcaY5Mhxtssi96vw7qNj
lA2L8OcE7aagzfOT67kkDTgInDxz/QvYPAFRvbROTGhzQJDcHT9AC74D0A7C
90TxIoumiuvrIFPJzSFcAeXKGXlcGCeKYpgdWuraYH4MbmWh8sU1+nb1lqE1
6zOYyr0qUBAMQmPSMQotKsTewAZiM5D5Wvchqwk6TrKgYclLJZ/2Uvsn577q
PNm5vBwykoVKdblBGC2cyZ9WWJBBGMIltsjW+6ckfcQKnF6oXMHKh10cYgFq
dsB0Ie2O32FhB+9G8lGYCE8Mgv0SMcU1N0pUDTo/ayyZVap6IWybN1zBJwUJ
aFeMWV3SJY6kvcSelqLS+Ck0+rBtIqzRkBZxaBrqOiexR8ohJA+dVVEzj6h/
ODWKQpeuISiuMwm6cGNiQ5GU3Cu7EfTKNBQlESpZxQ+wfHQypYwRWckV0OCp
9NEf+SIIcuuzuQoq4BgIt+/vRfAcEn/Ol+1mdF1isE8Nu3KVvTQun5iMdAd1
xcIKe5J+BqMOdMSD48SN4j3yAt6MaQvbLtYkJkpi17eR7FY8bw7Uw/3IF7J/
gYfKaRiU5dqtWAujjTjpgUmMJ7yxnWp4BL5HuOmcwMTSJw3zEj3tj7t5lble
U8LWDzHZyN3SsETHG6P34Tymum6JtXEjMg/gBPXDiBgrayUMMSPRJDq70UL1
Ef6KHGaSv0G3JxeptqGg/vZQDmIk9kTYSXZuQkQwFddm1JKXUdgmzHU6MMMk
kF1gSiD2KKyZdn7OHuMyJDW6QQFQXRWBaD2vqpnmm6TLefBAZSkIxuvIbHwy
1HUWC7tWrYNVJ1TVgdSYG2m8wAQm4ecH34DW8jfB+PbOGfftUl5H2H8ASJHi
Ak7uj1bcR5xtDleyEwF2gsUp2B6vUQSD4Ra3GL5QEMSp8YFdl4a0zWbys7SO
toCx1bjFzPBTdEJdJyNsJjLnxWTPzcjD2wVWV1bapwNj1M5i6JLRo/S1LHH3
mZBK3oQVHCSvN7A349w2bjLdCtx0EUri0DvDN4K+E605JNop6Ot8C0NigeTo
xHac2nVtHFF/F8AtE0zaKEBHoRcSMXm+mLhTWwtMsMQ/Y29ol4j2xMFMs4vj
otelnriUlsJ47UyqyuJ2+jj4tC2meRHTO2oFo+Gqw1cU8F9L2w8Yce466HC+
Xqyqr7DX9reS5mCmsE9GOAIU6410YJmazq0v2sgJ+xhGVXaGi8Sl4hl74KDo
7pa+cNlWiHJHSYb3vi0J5BDLEQ6xhf13+EAAheHTwJ6keeM+gJJ0VSMMIH9m
lux2UmCZd+nj/bXdgHRBEUWdYWynYaZeK4FYkovbKKao9rFWuLJ02DwPtJgQ
aw3mDikKvk9CWknKtUfdZBT2zA7yRd6jnkaPMiAmvOg0wJE5cFxD1RcYB8QT
2U8+ujpk6Q+hDTyfW8FoxReKBLYTqej7a8kIxbk7qZ3B1IdD/itAi1oUjtq8
aJyJRhAvia0QMUPvaKTX7yJ9W26E5QcSaF+YNqVX45BpyFaysM13bXknDWbw
GcOYq2QHtn7CeK0MEW1ucrs9qi72D0yxyWb8gCs48H1RtBcMJXKZmy4ubr9+
1a+RCAkktTZHf64fAGVFe2SxBUaG64YYZCJ3yNfCfA12I+LRg6/sZBg5kV4i
uywKpMc3Y6KxQpiica5dHzrwkqly7fIxlv2ReI9aEurw7KMICOqRylhMdPPO
6ZE/TEgWb1pxI3BcaytdVwKjv3tBHnNSECz1UE2fyYD5epbVGvUgD8V6m2lI
YDbpsOjnxCW/vnlYLv0TcOppt1Dec5/UvlLNffzQznjap0wi3mD/9Sv9cH3H
sVsXFnOSNsDhUyeDoHAuEgXr7BJBd3JF71Nrbw92VBRrTOos2ZZalG1tdSLV
K92qKZFbrOKFQRzTgC6Qq/Ii9R8aKqRI2NSMEjCs/JxsCiq4YO653L00AV8L
b1rzz/HlRhjbcuhlcGUMXYBThvGbJ+2axYxG11Rhh2rLxbDUUQAGo2wMlv2E
+G7pvyCo0ZxBEzk1lvGYZNRrmIaUB/lGJh+aeCM16th3g5ezM3xzsevaTVB6
LayuDxrIizHm+qPdkE11uHekueuz09MTn7t+eXYSIGVenryiJqoYbOuMg1GZ
zkkJFQ+JsY/3N2q6vDxFcI4vLGHUL3+P6bKONxpndZ27OMzt8J32ZenM3N1Q
qE4jwxKD6XAkBtgN42TOeov3ROkn6FobskwsZeNigh3k4psjx2q77EYrgxr/
Gg4dacjcdYVZ2+U3PE9YaLjOqF1MUAztGgBy2THJfnU5wPvEuhN30waTHWsu
RUXIBTIyu3ADQ69GCBo5k427LSUuniG/jk+cAoZgGLzzul656rLvM7l9mg7W
UdXLSqBCQRFG2M9BYvkq7oLLUvXUBJcNfQ9EV1qxDxsBc8Ym94PUbYupLQ+B
re2e18puEQFdA9yVxnP9JF8VypeGoVf0VKnl7AAQO/mubz0x5gZv7i0aBM7c
J1Jis6HAj3ZwJ4fhnGXkXH+BMrptt8HIHH4OxdsOQWvcKQo+slL2iSEfBEWv
wSb5bYVoSQYeU/vfmt0pj1UOBpUWGWEdKTKIb8gh1JCqprWbA3Qtzs7j8lqX
mwmaJZuaL/Bxbchhwgu+VrQdUSNpDFB6Fc996PAqImcu/nAzULfg5OSA0Ik/
fPZ/U6CQrljj9w4jQVLU30cPX/NX2dOdvZnAwemFbj7Iu8kQ/xRAJ7X7s3Ja
FLZcb4dIcETun+Ziir7+wlVeMDtxW0m5RS1nCKWnTtxBOQK5+bcqiNi3DaFr
8FjlS3sChRX4fiAYxymi2qoNBRcc5AbvEMlZiLOusiCtCfEQK5/o0iNnXlJL
cxg9H6MFO845Q+bFrvKeygLcA0JyIpgJX+PPWHA7VqCxXDGdgBrUitFzydAN
jfj06AphMkZwq3VGft4LROWwp4Rd+xa+ckB4QIM5WHBENRNoGniWYSQlNpei
7mzeDpxyMw25OSxoUxuoNwJdLNHKU8es2/2MqdWXWgLB33i6UjNa3xO8FaCA
CLWNwkGAfkzNXthKIbiOkjEtFJxC26IAF6IRP0JnGPtW63e3+Vi0QuHuDabP
HJ7pyxewzwa3P13AWUXUfzuD89PYTv2Gr5wKZuqu5uGWKVSZub1uYW0HHU66
KFYjPV3Xi0GivgWuN5GV+FPh+ZMfoNJi26gXLT00+sHVNRqQJGtt6Xv/0/Ni
SXGCSdzYyQbycD9d6h8gsFBJSPn9CK699RXbk5lJsaGMxWd+uN8b3Pc8higQ
ZRO5QKN50lsNTdepKXJ/aYPvD470F10YlaV5AgZ5DOIEmr7Ab6RtU4y7oDpn
UyxtR/0Ja22PgN7bazvEndx0v0WMZetBi+itUXMvljIuoabUZMM4KOFzRlji
SxZdOwig4U6lbQODxlS7dERDXgi+gW/V28CwPS3VxntXrokN82ysM8YmxSBw
S7p2VyABzuZUcK+GMiWZMs2lPQZ2h+CL0fxRpWQCF7lgVERPtTRTF4Nk7TLU
RO6fruSWI6B9n+KpcvOSw+K5VFWExwtsz8A/y9Y8Wts1GjNucu1NK6J33rQM
VVLP0Te8ES8quj1MzX7RJxnb/px4dc5NYPVHFYBDQwHr5F4iE+LIHe8fis0i
+XHvJ//3POPOy3/D9X3wYaiOSCfFoaGA/08d4U6rqf8Rh02O6lha+/39vLc3
3/TapNFyZGQltV4dMfH199bnPzS5sn4KGo+aY4o7u8LHk7RGZ4OxyyapLMgt
Th0brT5Gb0TbTEoPuo3XcJGZT7HplNwradrPHiD9HS/hNdj99AFbO2PEsK7o
8Ac3pyzr/DEbu+ZEPq0S2OhBD8IsCtZGjS+DK9ze5581EUZVCQ8f7pl7h3fv
rm//SuVOA3Kx8IsaMMTUtNpNfPgCSDVxeec+VxJEa22xfDWhQMrFwasknEx3
yC+lSFYo4Zq5UJAYy/vDwD24AVdSVEgH6KJeLRutuCUS8U1ROLeBh79evB0o
tPvo1RnJKQ2fM2Bu7e0jmNpiZCasfHAmJQezl+0IDH1yQmSjCjTPTs6ozXM1
7dzGQgcKBqNrUcngB24j6G/WwmdIO9/vwU1DIwMUmVZz7THPYNNXC3acwfx2
S19JZ0z4vqzy+AhrK1gadpoONr+rOsNmT3rgo/qucUj4SN5ogXlpngoPdgbK
rZdoxJhrJg21yaL75twtQrFgIqbglblyyYrqC4Dcc5Weub+2WgC9dMGJ7s/B
4UvqyaQsQtafdvv9zStsewnf8Mu7lRKDwouAJ3oUZGGHkW+aDtQgO2Bay0G3
TpJxO2HX2F98tWZruMxeGYNkCoxv70gbcZvmthc9Klybc88837syY2MZE07Y
GUzMe2dCLdwtDHFaMy+5iOOaV9BL4FgFV0dwM6eJ5PnAdcA2muUMRGNAEw6d
sFvl7haRvtQScn8XdwMv18o+WD/QBZJ54+rqcBYxvky1RwTzyJiBBI1Ie7hW
uKGpiKhaJw6tBk2iw5BAUFyG8nlEERujr9nJPErLxAfYlzOILDS7UjzOtaAo
ZdNshBwfqDMBeF9eVkMCdYjTEDwR1n8K5je47xiIc3c1uH+LmoF+QFvmXq/X
pQJA6XEhpZ6bD4dIlW92NcinztXrRYVdI+NQEnzdynM3XYZlbW+8ZzCIAK2s
c8EglOtRO1CpjVdRcm6f7GrKdGXB1drVssEAidQs++Zp+YKsn8YoLosCLN0r
9TqlJAQ6jjtcYwoivPeN9uv93c1Q1dX+EYrhjfXNWETP0zOuu8Wqe9eWA5f7
StaboyAciiJ4NsNgFdXiZCO8tAjbA3gK68OdVnv4mMOzyCN8bwhHuba2iH+n
XNLc87e4f5L6Q8XTkktKcZIVMF7Y9EtKkCadsIjaaWR38bBi8nj1Q0D2oCkg
x6VwqPWpPm/6zvjGKNdfHos1wzziUMs4LgXy4W2t4WVQTnYo0A+0hZDZMLJG
laSGXcyMe1zKYXIHyG2T1XYngeMCO4pQMZCoIfxZaNNPXqtFSBPntt8a/JCT
FHvY6wWiYd43cZ3M8aXi2NDdMs2cfwvSjgHmCgUCAUr4lmGRoG6HfGyUAtm5
A/Lg6Fo8wnsJLxJbQPmRoNWdvCZWj9MVHj7RLrMMVXFIsZGvS9vcENzFqF07
FoRueAdEnDztRUKpCCdzwwrSTVB7DYqxX6QmwLSqgytpdMEkHNbLIi/d1VaN
h72RtX959XB79UC1ZwrLnxgqtJUOHaTguMGFuzZkzib6thacbbvztnkL+SUM
WwwFO3Xc9F24OwGdwMvHLiu435NoHSMsDMHr0mxA0MYXreaNwmJrBQh0+rFE
HmwM9RGoctQqQSEVa10RdnsMF5WavdAxB4vTMMreVUGQqHJVa0BUsISSEeGu
CU+AMTD68d2vhNWwlfaaEURn1bn5TFAMcmkUM73DLyGag0QogRa4mynBu8Ph
3JU1XFdMY6jkJhfPxVDR0eXgrgbNUUshpLYtP3FqmvB0YyrMt2LICWaWVZJA
YOWNO1zmH8R3duX1WRwq+/Ll9fXVffr+AgO/HBVk3LZP/HSah+rOP7/rOj9Q
A7aV6nYpBcLOLnvX9w9vEmmqpQQD/yBFifHu4eEu5dCCsr/DBZJg8oIPHw+E
oi9XdV3rfFlq1Enr4f7DcHh1i/Adt3iH5HHYno1t0NFwagmKrt2l5Wx17Q1G
ZGuLePzizBA1SesSO5BwDFjHOdySLAxeixB+Fy1GSsiWcO3ZWiie2EbIwoxU
o/NqHvFyyTqqWgkvlIqiYHwpkwKp/A19Wl3qgEIos9xtO9ssb1AmdeGtERpE
tvgbdzktxUbwnrjt9Glpuq5oiMcLRF5glnMHFV0CDgAcmy1t65OWm7qQRWop
cEiegAGkBzhWNT/lk2YeIh2k+FTOKoMzQfjcuR5gHRAhgtdiG5C2Z57ZoGkE
o5LheSlLEcNLmz6pOyhkdLeUr11OjpW5VDJlybPMG/SYdq4ehtLDAZtRVTXV
j8EDUvM21B4YNAJ7KjvXw7e7UhZ2W5Up7FhY3397TQYZDpzCz64lC+fxLeGa
2ya6WYEv9KHJ0fWoLsvourkG3SU6NHzGtIowo5z5oqLWQID4rmaIX5rks4UG
csI28ZzadxMRjUA1+YjDQ5z+GsqBgYrAOK7VtLaNooCuFtk5gbMjh4Tn5Ve0
67jzH8JOTR1LKQhXf9NvDBi8Ddqk6yuC65FC+nYWB5+5FMw6JNYDKXvJ1fXr
O+Avbb7vztnrFV5D4aJhxCvwKAjgCnFFa0h5KwYcRwDgnXIDD6I676RQDZOJ
hfTPkqaMrB6yWmt7gtp9hnKtwkhN00E9ys1/GOmhdQgY3YZCaDlfWcY5cHjg
UTrkuHhSCNkQFASFgP3tWxVdm4x362D/OyRdGJnSED1ILGmsFzQWdX13fdCc
gzgODBBc8yXwJ72f0DX/1Y7dfPyD5tFU6EPF4l6G+wps7GmrbSSYPsLS1HJJ
Mjv9kxA0bjuSdwdTVSQh9ZrwnmcdLmBN178R5q/0dnG+eVO8MZoMrkPVNMXn
tDl0ZxluCQMS18UjG9Tgv7OlyFEw7BFR0cD/9R//yWlvIXh8mZ6C9LFKHAbH
Dsy50eZHvn+z3K3MeykvfWJcM1kJzVp9VPhGx1uTKKhKy9aSX+vcqy7c0e9b
dOcenTtRcZQ+5LpXmalGOtloiar0OqtS+pPuWp/N9SVlGzzR/JwI9bUnU/ML
Y8URNOcIOoFKr2RsaU9NX8cVRfyCPZXh+D436sPsNnETGb3JoisHhYHOFakW
vnXHBtFRjvKFiLlgo6x2IYmbEwZPxPOIe69y1YC0c05A1v52rDyA2HBLZoxd
sdiPOySrDYPaMOqrutkQkjQU5uBVGX6H9iWEJ8ffnTNPlGVgetB/8ZnBAguM
4pTJtbUtC9SBnx5HIaXYlSORUpkXdjTJ+asMgDTED67LlWu+sRkbKg4EuarY
tACjS1THV/gu9iMsfZ1nYC9JR2WQakAx25xvbR30kxuFRoZxVVlDMtRNO4cf
H+UKjs0TYecq1D8h6SJIm15MrkYeLPiFbOoL9lMlJw06EksXdXeUA1QfUGkc
BpamVVv4klmOwLlGzVqG/GxHQNjAQ3A1MrwWFV81lITOOZAEEwkhHtyNQeUS
nNaIepZOO/Bv7kaCQ8v3JbUn17Y8Skkn9eZ9CkAnzoQKzPsJOk10wWghYXJ3
pwEjknxoNaN+GpaUEony3AquwzcdwutKpZYwCIPpDLGC5IhuM5EyTfiGYpqv
fMz0PPnoQGvYLA8L4eqMIVFl6sA1dJOKl2BdKKRHJ5I7Glx+yDE5zhltjNlq
HijXXpvNeq7TxdMInZnr3RgCDIhaLQfkdmSVisOwUkgL/nyBEZDrOOSiKxeA
OE+unJCNmcP1v0bVldIl4kH9Ek6HWcdG947EpaNSTFWvmSM+kN2JSkmVROAM
euyH9xX5KWyfIbfPJaSPd/2bQ16i2AEGGRoM9pJtyg/5aqjwttwAC00V204Z
+LnRjY+VXNpWR61sn9B+EQOBOeC5vqewKSd4mYkw+rm0e4pz2B3DoSf9L6Zq
dfqKbncosR0n3VrGp1c7D6ihl0xzU0wITi5RFn/RF67fI/JCM0d7Adgoi+ZP
qQg4j1nRDh/UpXfSiy6U9Nu0gXsF3uAn5LQPIisFDYasY40J4HPcBBs3VwyN
1nUEcIgUcQDnsA4g/mmfeV/B+OdYexvodJR5USGzQ6TxlWRP4RQ1HBiM5wEp
6KX4g4W8xgJQq4t9y9sRHQotRXPk7YUhQ2BjwhWGwicUOkEGkNpSY3g751f7
eHWSUdqocXyk+xBlrIIFBshsDJVP1qbggxCifam1i2cr9pBjCrmSzsDBlApT
ad+LSoywSPHg2qmMIPdgwQLPLbAR1qq3Vp/p5zhR0mBTd41DgnBwl3oZbqXk
KobJahbt5xYSXCw6qyV6pLavXmHCzC9wXZbumJd4oisyrQdsUtlgkBgSa2sC
/FLnctH7XFIWeP20xqK/1+Dqb5ETgMcVL0dyV+9OjOEbr/TGENDeWV7oaZpl
S27IZjHXVY1b0lVfvrwd3P08uB3c/DS8HlIt/9a/J9/1v39nEzQ5cD8dup+O
3E/H7qcT99Np8u/wkvQ7/pe4x/5ffoKXXARy+ipMusQr+fZPn7/1E7zkt24i
X/vydw4dvWTtCoTNe/Lfe0m3bcPf5SVq1Lm6tL/HS14rKlKN6996ye9+HZLr
e5Ahm4f+znVufTlP/qj4CfBeCvPnbfH8roNGpBdSPUDehEqO7a/kKN6xN0h9
KEnpbbEAcTLAYQJEKQdITozegcJaGA6gTdeCnxp002tty1Wk46uO/bnWos57
3GZdN8PCCKohCnaTdOzaTr4Gn5WNk96S9l3v+fqjdG7IXSibHDiwHBXs6gqO
2G4TvdCJJ6/HCIL2JD43Ha6XczZkeAQGs3fTn13yk2GYRAgmX3fvd6g5iR3X
+ShoM6O7vst77YKmFIzRvoMbL4VzkRmpLCHS+NsF56ju64yT0mjckrj6RBcf
EgNywMoNHQGSbFQk6L6gl3gKUE8MuE5lreuDF9bkrPe/IQvIgXEiALTvd77B
34u6uIU38WljHOChezM1NYkyuloG8VFt7c3+ql4llNsm+7/8RswKq1fDLIlQ
gqo9YihiFHbEHkC0wF1iDgpfMpqQuplhdKustBwFwx/2iUola7RKnowG88mf
qCvqhuMchuhFwZykIAf3pc5WZDsqPDNiNLzekKLgsPwF+YpoznoooPKeHnSu
rJn6uGgUDunc1zpF05cDFJSZTfGQf+omd7oHcmRWlXTAVOx4HB1BqC5s6z/+
AayIm+tzkO0YcdXEGCEnZZ6+jzr5iG8Hbt3Sk5TOFJgk/8R3jbh+/sggurtW
JfPaKdXWyWDRlkis7zPixBRkmSzSIDRI1aDUOOFXKe6Rw7pE1KxcMI5VAy/s
JoGAXZ+8cr0I6598u6exoiGlW+PCLCrf/MtBCp1B7lvNag7J325C6SJJ8T8z
hDvV4NWZzIlqbpvou49hdAadxbibGjcxBkXXkHPHwDWqImMQSE0vfCadGJ5h
miQVWDKxfSGWYHd347LzKlgFopddNUAgpnJ/zdNa7yIng7EGT6DNBvO3rtuD
XVbVlNiXd5xBMKXxUJfu/S9aMWk1S8uCOGyhpviHFxHMOtJ2WuuwiNGNKsAZ
sP1kRvEIFIeSMxs3EMJH/bWO2nvYqU6lVs+VtITYZGrgQBgCpwaIh6/h4Gzm
3xyO2teutRSwntCk5CEEv4QeFHofqAlw+AvuTXpTzba2/vSn2w8PV8M//ek8
uSuoCyP2HnsU88Nqz2nQYEw+KvlwqR28AqCkS3Rr60o0g6lxH7YhuegT7Hmd
/pJn7qYPpxtTFeCpJ266vw+zg+8GjVFfsOR44ebFlyRR4KVORsCopqGwfh+/
KcF6M8lB3Ul1NhXp+9uWM7lRi4rwnEQPRRqONJhMvNNMQAiv1MUOfkAuRzoD
eQdj7CBbmAnVBlqwl9kQMpM/b09hv8027WAm/biHyLN1k7yuV9hngBqQMVKO
OxFa7epwDwt+jf3Wsx64cqYm2N7V+BMwKs3qNSyyTK76yUVWL/lKGipvR+w/
DicSgAf7v1PLZvtK0gAA

-->

</rfc>
