<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 2.7.0) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bryant-arch-fwd-layer-ps-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="FWD PS">Forwarding Layer Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-bryant-arch-fwd-layer-ps-05"/>
    <author initials="S." surname="Bryant" fullname="Stewart Bryant">
      <organization>University of Surrey 5/6GIC</organization>
      <address>
        <email>sb@stewartbryant.com</email>
      </address>
    </author>
    <author initials="U." surname="Chunduri" fullname="Uma Chunduri">
      <organization>Intel</organization>
      <address>
        <email>umac.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization>Futurewei Technologies Inc.</organization>
      <address>
        <email>tte@cs.fau.de</email>
      </address>
    </author>
    <author initials="A." surname="Clemm" fullname="Alexander Clemm">
      <organization>Futurewei Technologies Inc.</organization>
      <address>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <date year="2022" month="August" day="05"/>
    <workgroup>INTAREA Working Group</workgroup>
    <abstract>
      <t>This document considers the problems that need to addressed
in IP in order to address the use cases and new network services described in
draft-bryant-arch-fwd-layer-uc-00.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>There is an emerging set of new requirements that exceed the 
network and transport services of the current Internet, which only
delivers "best effort" service. While many controlled or private networks 
include further services, such as other DiffServ QoS in addition to best effort and
traffic engineering with bandwidth guarantees, the solutions used
today only support walled gardens and are thus not available to
application service providers and consumers across the Internet.</t>
      <t>The uses cases and service needs that are foreseen as necessary for
deployment in the medium future are described in <xref target="I-D.bryant-arch-fwd-layer-uc"/>.</t>
      <t>The purpose of this document is to examine the shortcomings that
the existing network and transport layer protocols a well as their
associated control plane need to overcome to meet these needs.</t>
      <t>The IETF is the body responsible for the long term evolution of the IP
protocol suit, but is missing a work track to discuss the long-term
Internet network architecture evolution. In particular it lacks a programme
for the long term evolution of IP itself.</t>
      <t>Approximately 30 years ago, the IETF started a process to revolutionize
the IPv4 <xref target="RFC0791"/> Internet Protocol. In this process, researchers, industry,
and service providers got together, and brought up a number  of new proposals,
and worked toward a successor to IPv4, which became IPv6 <xref target="RFC2460"/> and later
<xref target="RFC8200"/>.</t>
      <t>30 years later, there is heavy resistance to anything more than minor incremental
evolutions to IPv6. There are a number of reasons for this ranging
from opinions that all future IP needs can be met through
minor incremental evolutions to fears that major proposals for innovation at the IP
would be an unwelcome disrupter to the current business of the vendors or
the service providers.</t>
      <t>The authors take no position on the scale of the problem or the
difficulties of deploying any solutions at scale in the Internet. What
we seek to do is to establish the scope and nature of the problem. A decision
on which aspects of the problem are economically tractable is out of scope
of this text, but technologies to support monetization are not.</t>
      <t>As a problem statement, this documents goal is to not propose or
promote specific solutions to the problems raised. Instead it uses
references to not Internet adopted, but proposed or existing solutions
only as example evidence that the described problem can actually be solved.</t>
      <t>Because the document does not propose specific solutions, it also
does not attempt to structure the problem description in a way
that would identify sub-set of problems to be resolved by specific
solution components.</t>
      <t>The purpose of this text is thus to stimulate discussion on the emerging needs of
the forwarding layer and to start the process of determining how they are best
satisfied within the IETF protocol suite.</t>
    </section>
    <section anchor="forwarding-layer">
      <name>Forwarding Layer</name>
      <t>The term "forwarding layer" is used in this work because none of the standard
terms encompass the parts of the network stack that need attention to address the
needs of the applications that are foreseen.</t>
      <t>It is possible that development work will need to reach down to layer 2.5 in order
to ensure that packets are handled correctly down to the physical layer. The MAC
layer is quite sophisticated and includes its own switching function so we need to
be sure that the good work done in the network layer is not undone lower down the
stack. Equally it is possible that development work will need to reach into the
transport layer to address new approaches to congestion, and to ensure that the network layer
understands the requirements placed on it by the application. An open mind is
needed on the boundaries of the layers as they exist today when analyzing the
consequential network changes needed to support the evolving application space.</t>
      <t>In the network layer itself, this document is only concerned with the
forwarding component, not path selection or the other components of routing.</t>
      <t>Thus, we use the term forwarding layer to describe the scope of the stack that
this document addresses.</t>
    </section>
    <section anchor="underlying-new-requirements">
      <name>Underlying New Requirements</name>
      <section anchor="better-than-best-effort">
        <name>Better than Best Effort</name>
        <t>The current Internet is essentially of best-effort system, but future applications
require high-precision KPIs on throughput,  latency and packet loss for
industrial manufacturing, control, automation, and machine-to-machine communications.</t>
        <t>The emerging use cases for networks require deployment of capabilities
that are beyond best effort. Best effort networks can do remarkably well
by simply throwing bandwidth at the problem and lightly loading the
network. For the case where  a greater capability is needed the IETF
has invested effort in deterministic networking (DN) <xref target="RFC8655"/>. Whilst
DN is an improvement over best effort it is still fundamentally
a best effort service with enhancement to improved the probability of
a packet not being delayed or lost due to congestion. It is
an after the fact enhancement to the method of operation of what
is a largely unmodified data plane. I the case of MPLS <xref target="RFC8964"/>
there is some assistance from the PREOF function, but IP runs the
standard data plane and relies entirely on special case packet selection
queue management. It is thus an after-the-fact enhancement to a minimally
changed data plane restricted to a single network domain.</t>
        <t>With upcoming Cellular technologies (5G/B5G) there is a need for Service Providers
to expand the type of customers for metropolitan size networks to address their
better than best-effort traffic needs.</t>
        <t>DetNet has been proposed to support this, however:</t>
        <ul spacing="normal">
          <li>Only some aspects of DetNet currently only run on top of current IP/IPv6.</li>
          <li>DetNet service is constrained: It only supports constant bit rate (CBR),
reserved bandwidth. It does not support flexible bandwidth. The
notion of contracts in a future development of the forwarding layer will support
more flexible managed bandwidth and managed latency contracts for traffic.</li>
        </ul>
      </section>
      <section anchor="efficient-packet-design">
        <name>Efficient Packet Design</name>
        <t>The ratio of useful data in the payload to overhead has a direct financial impact on
communication links; these links are of finite capacity and hence have a finite
cost-per-unit-data that can be calculated.
The capacity used to transport information as compared to the overhead which is
unavailable for use by a customer, but
required to transmit is often expresses as a good-put efficiency and can be related
to cost to transmit payload data.</t>
        <ul spacing="normal">
          <li>There is a need to support large number of low power user equipment (UE) devices (low-power IoTs)
connecting through various radio networks (LTE/5G/B5G) where spectral efficiency is
needed. This needs to be achieved without header compression 
techniques like as  <xref target="RFC6282"/> since, compression can result in additional processing
and energy consumption overhead.</li>
          <li>The handling network protocol headers, requires that portions of each packet
be held in memory or buffer structures; the more levels of information which
need to be held for processing by network nodes, the more memory space will
be required, and this directly effects the cost of operation and cost of
manufacture/provision of such equipment.</li>
        </ul>
        <t>On the other hand, in various non-constrained environments where
various network layer functionalities are desired, there are different
set of requirements. For example:</t>
        <ul spacing="normal">
          <li>Segment Routing over IPv6 (SRv6) parameter encoding
<xref target="RFC8986"/> in the SRv6 SID
<xref target="RFC8754"/> is limited by
the prefix portion of the IPv6 address.</li>
          <li>In Identifier Locator Addressing (ILA), the identifier (ID)
portion of the address length is limited because of 128 bits limit.</li>
        </ul>
      </section>
      <section anchor="forwarding-identifiers">
        <name>Forwarding Identifiers</name>
        <t>Developments in IPv6 <xref target="RFC8986"/>
formalize a trend that has been happening for a long time: the
morphing of network layer addresses into forwarding identifiers (FI).
However, constraining FIs to a fixed size ill serves the development
of the forwarding layer. There are clear cases as illustrated
above where it would be useful to have shorter network layer
addresses. Equally we can see that there will be future cases
where 128 bits may be insufficient to specify a forwarding
operation. The requirement is thus to formally introduce the
concept of forwarding identifiers in place of network layer
addresses, and use a forwarding identifier construct that
supports multiple semantics and multiple, possibly fully
variable, lengths.</t>
        <t>There is further discussion on this point in <xref target="FA"/>.</t>
      </section>
      <section anchor="operational-visibility">
        <name>Operational visibility</name>
        <t>Network operators require facilities that let them better understand
and fine tune detailed network behavior. These features are hard
to retrofit with current IP/IPv6.</t>
        <t>The rise of machine learning has led to the expectation of being
able to better optimize networks This in turn leads to the increase
of network telemetry as a source of data to base these systems on.
In-Situ OAM (IOAM) <xref target="RFC9197"/> represents one of
the latest developments in that space, allowing the data
plane to piggy-back telemetry data onto individual packets
in order to diagnose and fine-tune service levels such as
latency or jitter.  However, there are several issues with
this approach:</t>
        <ul spacing="normal">
          <li>MTU issues limit amount of data that can be obtained. With IOAM packet size increases with
number of data items and number of hops.</li>
          <li>The data that can be obtained is very limited.</li>
          <li>The OAM data volume can easily exceeds that of production traffic which is wasteful</li>
          <li>There is no ability to aggregate OAM data, or make context dependent OAM collection.</li>
          <li>Integration with other solutions such as DetNet is unclear.</li>
        </ul>
        <t>While useful, IOAM exposes the limits of what add-on solutions can provide.  Solutions
that provide visibility at the level of flows or that provide automatic
verification of Service Level Objectives are missing entirely.</t>
      </section>
      <section anchor="holistic-solution">
        <name>Holistic Solution</name>
        <t>It needs to be recognized that it will not be sufficient
for solutions to support new services and  capabilities one
at a time and independently from one another. For example,
better-than-best-effort, operational visibility, and
efficient packet design should go together, without leading
to additional integration problems ore requiring users to
make a choice.</t>
        <t>A piecemeal approach, in which solutions for any one
particular problem are developed and emerge one at a time,
results in a fragmented solution which gets progressively
more difficult to integrate with components previously
designed. Thus it is better if solutions are holistic
and be able to support new services and capabilities
in integrated fashion and simultaneously with each other.</t>
        <t>We therefore need to identify an elegant approach that
is simple and naturally extensible to address problems that
we do not yet conceive as requiring addressing.</t>
        <t>Any such solution needs to be intrinsically secure and yet 
be able to support security without privacy and privacy
without security.</t>
      </section>
    </section>
    <section anchor="existing-protocol-layering-challenges-and-gaps">
      <name>Existing Protocol, Layering Challenges and Gaps</name>
      <t>Despite IPv4 still having a large user base, and having a number of useful properties
the IETF has abandoned future development of IPv4 as a way to force the deployment
of IPv6. For example, in terms of traffic steering the segment routing could have
usefully been applied to IPv4 to support network operators that wished to retain IPv4
as their preferred internal protocol.</t>
      <t>Given the gaps in each of the existing network layer protocols the IETF may wish
to look at the design of a protocol that both fills the gaps and unifies its three
existing network layer protocols: IPv4, IPv6 and MPLS.</t>
      <t>Additionally there is a clear need for a more sophisticated approach to
indicating the required quality of service that a packet, or flow, needs
in an IP network.</t>
      <section anchor="challenges-with-ipv6">
        <name>Challenges with IPv6</name>
        <section anchor="the-end-to-end-model">
          <name>The End-to-End Model</name>
          <t>IPv6 and specifically <xref target="RFC8200"/> was designed to fit within an Internet architecture
centered around the end-to-end model with "Internet Paths" potentially passing through
one or more networks without any relationship to the endpoints of a communication
such as most so-called transit-AS. As history already from IPv4 had shown, anything more
than the most simple per-hop processing options can cause interoperability
issues. In result, <xref target="RFC8200"/> has drastically limited such per-hop processing options.</t>
          <t>Two core restrictions of RFC8200 are the following:</t>
          <ul spacing="normal">
            <li>Restrictions on extension headers (EH): EHs must never be deleted or
changed in size by any node on the path the packet takes. Intermediate
nodes are only expected to examine these headers (if they are configured
to do so). Implementations cannot expect intermediate nodes to examine,
or act on, except for hop-by-hop header (section 4.8 of <xref target="RFC8200"/>).</li>
          </ul>
          <t>At the time of writing this is an area of considerable active discussion
in the IETF 6MAN and SPRING working groups. The issues that arise from allowing
unrestricted insertion, deletion or modification of EHs are for example:</t>
          <ul spacing="normal">
            <li>Breakage of path MTU discovery</li>
            <li>Impact on the Authentication Header protocol</li>
            <li>Inability to return ICMP error messages to the correct node.</li>
          </ul>
          <t>See <xref target="IPv6CN"/> for further discussion.</t>
          <ul spacing="normal">
            <li>No new hop-by-hop headers (HBH) in IPV6: No new EHs that require
hop-by-hop behavior should be defined (section 4 of <xref target="RFC8200"/>) - the only
EH that has hop-by-hop behavior is the Hop-by-Hop Options header. The
only alternative available to the designer is instead to use destination
headers (section 6.8 of <xref target="RFC8200"/>).</li>
          </ul>
          <section anchor="IPv6CN">
            <name>IPv6 For Controlled Networks</name>
            <t>While <xref target="RFC8200"/> is a conservative set of requirements to enable proliferation of the
target use case of "Internet Paths", the same set of requirements limit the
flexibility of IPv6 unnecessarily when it is used in controlled networks where the
constraints and interoperability issues for "Internet Paths" do not equally apply,
for example the deployment scenarios described in Sections "Embedded Service" and
"Embedded Global Service" of <xref target="I-D.bryant-arch-fwd-layer-uc"/>.</t>
            <t>One typical type of controlled networks are service providers (SP) where SRv6 is used as
the architecture within the SP network.</t>
            <ul spacing="normal">
              <li>IPv6 extension headers can not be added on a midpoint. Any addition/change
requires an encapsulation where another IPv6 header with optional SRH extension
header is prepended to the carried IPv6 packet. This is expensive in terms of packet
MTU, and in terms of packet buffer requirements at the ends of the provider path
which can be an economic issue in cost sensitive network segments.</li>
              <li>The requirement to encapsulate instead of being allowed to add an EH along the path
stems from the desire to isolate any header changes from Path MTU Discovery (PMTUD).
This is a necessary complexity when traversing uncontrolled hops across the Internet,
but it is unnecessary overhead when only passing through controlled hops.
In MPLS and SR-MPLS, the MPLS header size is not included in the MTU available
to the MPLS payload, instead the network is managed such that the maximum MPLS
header size plus the available payload MTU is always smaller that the
encapsulating L2 frame MTU. In IPv6 instead, the encapsulating and decapsulating
would logically have to perform signaling for PMTUD (unnecessarily).</li>
              <li>Because of the authorization header (AH) <xref target="RFC4302"/> and OAM concerns,
<xref target="RFC8200"/> likewise prohibits removing extension
headers or fields thereof on hops along the path, requiring for example more complex
packet parsers. In SR-MPLS it is possible to simply remove the top SID on a node
that has processed it, in SRv6 it is instead necessary to look up an offset field
 in the SRH and, read the appropriate SID (which may be deep in the packet), and
 then increment the offset field.</li>
              <li>Even though the number of identifiers required within a controlled network is often
less than 16 bit, and almost always 32 bits, carrying the overhead of 128 bits
per SID in SRv6 can be seen as a significant unnecessary overhead, and workarounds
such a proposed micro programs <xref target="I-D.bonica-6man-comp-rtg-hdr"/>,
<xref target="I-D.bonica-spring-srv6-plus"/>, <xref target="I-D.filsfils-spring-net-pgm-extension-srv6-usid"/>
require complex forwarding plane processing and
SRv6 programmability in the lower 64 bit is not required in the majority of use-cases
for SIDs on midpoints.</li>
            </ul>
            <t>For use-cases like this, it would be a lot easier to innovate IPv6 by
clone &amp; modify: E.g.: defining (say) IPv7 to be similar to IPv6, but without the constraints
that are not useful for the controlled network use-case. A better alternative
would be to create different profiles of IPv6 with <xref target="RFC8200"/> being one.
However, there is, as yet, no concept of "profiles" in IPv6.</t>
            <t>The issue of IP protocol operation in limited domains is discussed in
<xref target="RFC8799"/>.</t>
            <t>Some possible solutions are described in <xref target="I-D.herbert-6man-eh-attrib"/>. This will
be considered further in a future version of this text.</t>
          </section>
          <section anchor="ipv6-for-edge-compute">
            <name>IPv6 for Edge-Compute</name>
            <t>Today, the majority of end-to-end connections already do not pass via the 
traditional "Internet-Path" but instead toward a server in data center
co-located with the access service provider Edge-2-Edge-EP <xref target="DOT"/>. In
this case, there is no transit service provider, but there is a
well-established commercial relationship between either end of the communications
and the access service provider.</t>
            <t>Today, the majority of traffic consists of video-streaming/TV services,
but in the future, Edge-Compute will enable ever more applications to
operate in such a controlled environment.</t>
            <t>The difference between the aforementioned use-case of IPv6 within an
service provider, and this use-case is that enhanced services in this
would naturally operate end-to-end between a Data Center application
server and the subscriber endpoints.</t>
            <t>In the case of SRv6, it is not necessary to incur the overhead of an
IPv6 in IPv6 encapsulation, the SRH can be inserted by the endpoint and
removed by the endpoint on the other side. Nevertheless, the <xref target="RFC8200"/> limitations
of not being able to add/remove or freely change the content of the SRH payload
or any other EH on a midpoint router still exists.  This seriously limits the
usage and evolution of IPv6 to the edge-to-edge model.</t>
          </section>
          <section anchor="hop-by-hop-extension-header-processing">
            <name>Hop-by-Hop Extension Header processing</name>
            <t>Hop-by-hop IPv6 extension headers caused interoperability and performance
issues and as a result caused resistance to further leverage and extend
them except for SRv6-SRH RPL-SRH <xref target="RFC6554"/>. In the authors opinions,
this regression on hop-by-hop extension headers is because of a
combination of insufficient specifications and resulting implementation issues.
Both could be solved in future work with new hop-by-hop processing specifications.</t>
            <t>For example, router alert (RA) was (and still maybe) implemented in routers
so that all router alert packets are punted from the fast-path to the slow-path even
when the "value" field identifies a protocol that the router can not process.
As a result, protocols that rely on RA such as RSVP <xref target="RFC2205"/> or even more so
Pragmatic General Multicast (PGM) <xref target="RFC3208"/> where filtered in networks because
they caused high control plane
load on routers that did not support either protocols but still unnecessarily punted
their packets with RA.</t>
            <t>There are no normative statements about the need that fast-path forwarding planes
"MUST" be able to ignore unsupported/not-enabled EH features at a speed such that
such a packet can be forward at the same speed as the same packet without the EH.
For example, for RA, there is only a "SHOULD" requirement to do this in <xref target="RFC6398"/>,
a BCP published a decade after IPv6 router alert <xref target="RFC2711"/>. With such a gap
in time between the specification and the BCP, it is impossible to rely on the existing
RA and expect safe deployment across the Internet without still running into 
performance issues.</t>
          </section>
          <section anchor="segment-routing-header-constraints">
            <name>Segment Routing Header Constraints</name>
            <t>The same design paradigm could have been used for the Segment Routing Header (SRH)
<xref target="RFC8754"/>, but there is no distinction
possible for IPv6 instances running in such a controlled network or running
as an Internetwork instance to form the Internet. This is particularly unfortunate
as we are evolving to a model where, as noted earlier in this document, in most cases
the packet will only travel through two well-known networks: the hosts network
and the service provider network hosting the server to which the client is interacting.</t>
          </section>
        </section>
        <section anchor="FA">
          <name>Fixed Address Length</name>
          <t>When IPv6 was designed, the key focus was on solving the problem of growth of the
Internet and resulting growth of global Internet address space. Variable length and
a heterogeneous address approach were proposed <xref target="RFC1347"/> however, these were
rejected partially for political reasons and partially out of a concern over
the difficulty of parsing the packet and doing a fast address lookup.</t>
          <t>There was seemingly no focus on better supporting the now millions of
often network-layer isolated TCP/IP networks in industrial, defense, research,
embedded, industrial or other commercial environments.</t>
          <t>One key problems with with 128 bit addresses is the overhead on low-speed
radio/IoT-wire networks. This is especially the case when using
source-routing, where multiple of these addresses have to be included in the header.
Current solutions are only able to resolve these issues with CPU expensive IETF
standardized header compression techniques <xref target="RFC2507"/>, <xref target="RFC3095"/>, <xref target="RFC5795"/>.
Even though these approaches are feasible in many of todays IoT networks, there
is a strong desire to reduce power consumption in such devices. This is particularly
the case where they are powered by a single-for-life-battery, or are self-powering
through automatic replenished energy sources. As a result of this CPU performance
in future IoT network should not be expected to increase but whenever feasible
is more likely to  decrease.</t>
          <t>Another, often overlooked, problem of the 128 bit IPv6 addresses is that global
address prefix allocation is a a big up-front burden on many  IoT networks,
but also isolated networks (industrial, defense,
research, industrial). Often, this leads to the use of Unique Local
Addresses (ULA) <xref target="RFC4193"/>, which have the risk of conflicts when those
previously isolated networks need to interconnect with other networks.</t>
          <t>A further insight into the issues of IPv6 address lengths of 128 bits can
be seen in the tussle over how to compress the address lengths in Segment Routing and
network programming (in no particular order):</t>
          <t><xref target="I-D.bonica-6man-comp-rtg-hdr"/>,
<xref target="I-D.bonica-6man-crh-helper-opt"/>,
<xref target="I-D.bonica-spring-sr-mapped-six"/>,
<xref target="I-D.cheng-spring-shorter-srv6-sid-requirement"/>,
<xref target="I-D.decraene-spring-srv6-vlsid"/>,
<xref target="I-D.filsfilscheng-spring-srv6-srh-comp-sl-enc"/>,
<xref target="I-D.lc-6man-generalized-srh"/>,
<xref target="I-D.li-spring-compressed-srv6-np"/>,
<xref target="I-D.mirsky-spring-unified-id-network-programming"/>,
<xref target="I-D.steinberg-6man-crh-vs-sr-mpls"/>,
<xref target="I-D.templin-6man-crh-variable"/>.</t>
          <t>The root cause of this debate is the inflexibility of IPv6 in terms of its
address length and semantics.</t>
          <t>While solutions to these problems may look easier enough, it should be noted
that in the time when IPv6 was designed, variable length addresses in the fastest
forwarding planes were not seen as feasible, and there was also a lack of experience
with the impact of interconnecting heterogeneous address spaces other than as
ships-in-the-night parallel operation of protocols. A lot of that
experience came later through 14++ IPv4/IPv6 transition solutions designed in
the past 20 years and respective work on address discovery in IETF frameworks
such as SIP/STUN/ICE.</t>
          <t>Another issue with the fixed length homogeneous address approach is the
constraints this places on the current practice of overloading addresses with
other functionality for example <xref target="RFC8986"/>.</t>
          <t>Since the original decision to only support fixed length packet addresses
was taken there has been a significant improvement in the packet lookup capability
of hardware. This is has been driven by the need to perform complex ACL
lookup for security reasons and the interest in flow based techniques such
as OpenFlow. It is thus worth revisiting the decision to only allow a
single fixed address length and format.</t>
        </section>
      </section>
      <section anchor="BBE-E2E-NS">
        <name>Better Than Best Effort E2E Network Services</name>
        <t>Some of the fastest growing network segments where new services are being
introduced in an End-2-End manner belong to deployment models as described
in <xref target="I-D.bryant-arch-fwd-layer-uc"/>. The requirements here for service delivery involves stringent
E2E latency with no retransmission and no packet loss. Not all scenarios
need "lower" latency but bounded to a particular value/range. Example use
cases involving an user equipment  (UE) consuming service from the
provider cloud network or another UE (e.g. Vehicular device, IIoT)
in the same network. Here the service endpoints could be connected over
wire or wireless (LTE/NR) and the service termination happens in the 
provider network either close to the access network or provider core
network. 
The existing network layer and best-effort model simply cannot guarantee
needed service level objectives in these scenarios.</t>
        <t>Some specific needs and requirements from cellular fixed transport networks are:</t>
        <ul spacing="normal">
          <li>Need for determinism on E2E throughput and latency. The current TCP/IP is hence not-suitable
for Mission-critical and real-time E2E applications.</li>
          <li>Need for E2E QoS for ultra-reliable-low-latency communications (uRLLC).</li>
          <li>Efficient use of protocols in the network by minimizing tunnels over tunnels and
duplicate header fields.</li>
          <li>Efficient deployment of network slicing</li>
        </ul>
      </section>
      <section anchor="adaptive-bit-rate-video-streaming">
        <name>Adaptive Bit-rate Video streaming</name>
        <t>Even without going to future application requirements as described elsewhere in this
document, even the majority of existing Internet traffic is lacking competitively
usable and standardized service to support quality of service.</t>
        <t>The majority of traffic today is Adaptive Bit-rate (ABR) based audio/video streaming.
The primary benefit of this approach is that it can adjust itself to much
lower bandwidth than the bandwidth to offer the ideal/target experience
quality to the user. It therefore enabled Over The Top (OTT) services to offer
streaming media. Nevertheless, ABR itself does not provide any actual quality guarantees.</t>
        <t>Service providers that use ABR streaming to their subscribers do therefore combine
ABR with IP developments, some non-published, which are often out-of-band
bandwidth reservation schemes. These allow ABR video streams to have their
ideal/target experience bandwidth within
the SP's network and only need to degrade if there was bandwidth contention
in the subscribers (home) network.</t>
        <t>If a subscriber, or a content provider which is not the access service provider wanted
to get the same type of bandwidth guarantees for other content across the 
access providers network, they could do so with existing IETF standards via
RSVP <xref target="RFC2205"/> which is widely implemented, or NSIS <xref target="RFC4080"/>, which
was to the  knowledge of the authors never implemented in widely used router
products (because it does not offer sufficient benefits over RSVP). In
either case, the per-flow control-plane based signaling architecture
including the aforementioned router-alert issues make these protocols
a difficult, likely not future-proof solution.</t>
        <t>Even more fundamentally, ABR has shown that media streaming can easily support 
elastic adjustment between a range of bandwidth limits in which the quality is
between acceptable and ideal, but there is as of today no standardized mechanisms
by which to express relative bandwidth allocations when streams compete against
each other that goes beyond the very loosely defined "internet fairness". For example,
more intelligent congestion management could defend bandwidth the more the bandwidth
approaches the minimum acceptable bandwidth, or admission control of bandwidth
could be elastic. Some work in these direction exists in <xref target="RFC8698"/>
with its ability for weighted congestion control or <xref target="I-D.ietf-tsvwg-intserv-multiple-tspec"/>
for (limited) elastic admission control management.</t>
      </section>
      <section anchor="limited-domain-opportunities">
        <name>Limited Domain Opportunities</name>
        <t>Strictly of course this refers to the opportunities that the acceptance
of limited domains <xref target="RFC8799"/> provides to the
network operator in terms of the flexibility to  enhance packet delivery
in cases of high value traffic.</t>
        <t>The removal of the constraint of a globally uniform protocol, such as
unenhanced IPv6 would allow a best in class, domain specific forwarding
layer to be deployed without the constant of the requirement that the
protocol needed to serve all purposed, for all applications in all
parts of the global network.</t>
        <t>These opportunities are are further enhanced by noting that the delivery
protocol to the application server, which as noted elsewhere in this text
is moving closer to the edge, does not need to be the same as the host
to application protocol since this is increasingly being opaquely
tunneled over the delivery protocol. Furthermore, any distributed
set of application servers maybe in their own domain, and this is not
constrained to the same protocol that is used between the client
and the server.</t>
        <t>Clearly their are costs and complexities associated with moving from
a globally heterogeneous protocol to a domain specific protocol, but the
deciding factors are  whether the application is deliverable over
a globally general purpose forwarding layer, and whether there
application and delivery system are economically attractive.</t>
      </section>
      <section anchor="HPN">
        <name>DetNet and Higher Precision Networking Service</name>
        <t>Time Critical (TC), Ultra-Reliable, Low Latency (URLLC), Internet-of-Things
is another important use case scenario-set that highlights
requirements that are difficult to satisfy with existing Internet
connectivity paths where a part of that path includes a radio access link.
These kind of close-loop control systems borne over heterogeneous
communications networks have very precision and bounded latency
requirements for the E2E network connecting the sensor and actuator.</t>
        <t>Deterministic networking within the IETF is focused on only one dimension
of the URLLC problem.</t>
        <t>DetNet is also far from attempting to identify currently if/how the services it
plans to introduce could be made to operate over the Internet in general,
instead, it focuses mostly on the shorter term goal to enable them in
controlled networks within a limited domains.</t>
        <t>Currently, the requirements for a DetNet forwarding plane have been reasonably
mapped out for an MPLS based forwarding layer. Nevertheless,
in addressing these needs within an IP network <xref target="RFC8939"/>
the solution has of necessity been limited to the capabilities of the IP as it exists
today. It has not, for example, been possible to add the packet replication elimination
and reordering function (PREOF)which allows multiple concurrent packet delivery
attempts in an MPLS network <xref target="RFC8964"/>. The DETNET body of requirements
needs to be revisited in the light of any development to
network forwarding capabilities.</t>
      </section>
      <section anchor="forwarding-plane-vs-control-plane">
        <name>Forwarding Plane vs. Control Plane</name>
        <t>High-end hardware with accelerated forwarding plane devices, can support
a significant number of forwarding states including destination entries
(IP destination/mask, MPLS label, SR SID) as well as 2, 3 or 5 tuple
IP/IPv6 "flow" entries. Nevertheless, the control plane that builds
and changes these entries often limits their usability because the
control plane does not even scale to the number of hardware accelerated
forwarding entries possible, or because the supported rate of changes is slow.</t>
        <t>The root of this problem is that with the increase of speed and scale
of hardware accelerated forwarding hardware, control plane had challenges
to keep up in performance. The performance of appropriately priced control
plane CPUs (relative to the cost of the forwarding plane) has not grown
at the same speed as that of hardware accelerated forwarding plane chips.</t>
        <t>One of the directions to overcome these challenges is invisible
outside these forwarder devices and it is to optimize the
control-plane to forwarding plane interactions, such as programming
the building of forwarding state directly on the accelerated
forwarding infrastructure (e.g. NPU), but using otherwise existing
control plane protocols.</t>
        <t>A more fundamental approach is to redesign control plane protocols
such that they are  lighter weight in their signaling and state
machinery, and can therefore be completely implemented in the hardware
accelerated forwarding plane. Effectively turning a control plane
protocol into an advanced forwarding plane protocol function.</t>
        <t>This approach is logically most easily applicable to on-path per-flow
signaling mechanisms such as RSVP or RSVP-TE, both of which are quite
complex with their signaling messaging and state keeping and therefore
directly infeasible to become hardware accelerated forwarding
implementations. An example approach to provide similar functionality
to RSVP with signaling light-weight enough to allow hardware
accelerated implementation are the in-band signaling mechanisms
(e.g. for TCP or UDP) described in <xref target="DIP1"/> <xref target="I-D.han-tsvwg-ip-transport-qos"/>
          <xref target="I-D.han-tsvwg-enhanced-diffserv"/>.</t>
        <t>Signaling that is feasible to become part of a complete
in-forwarding-plane signaling solution is not limited to in-band
on-path flow signaling, but would likely also be applied to other
signaling options. Of the aforementioned existing signaling protocols,
IGPs are likely the ones whose signaling could most easily be processed
in an NPU compute elements except that the SPF calculation itself
introduces a complexity that would make this very complex. One
example of a solution that solves this problem by signaling the
actual per-hop adjacencies in IGP and therefore eases NPU
implementation can be found in
<xref target="I-D.chunduri-isis-preferred-path-routing"/>.</t>
        <t>In summary: The scope of what should be considered forwarding
plane today is defined by decade historic architectures, but should
for the future be scoped by the realities of the new, different
"layers" of hardware and their capabilities. Hence also the
use of the term forwarding plane, because it can span not
only across classical bridging (L2), label/tag/SIG switching
(L2.5), network/internetwork (L3) and transport (L4) layers,
but also across the classical "data plane" and "control plane"
components of each such layer.</t>
      </section>
      <section anchor="user-networknetwork-user-interface-signaling">
        <name>User-Network/Network-User Interface Signaling</name>
        <t>Some of the deployment models as described in <xref target="I-D.bryant-arch-fwd-layer-uc"/>, needs
specific signaling mechanism from user/applications. These are
needed for E2E service offering for better than best effort
<xref target="BBE-E2E-NS"/>  or high-precision networking <xref target="HPN"/>.  These may
involve new transport mechanisms at hosts, middle-boxes and
routers to meet the E2E service requirements in these limited domain
deployments.</t>
        <t>Here one of the functional requirements is to signal the service level
objectives (SLOs) dynamically for a particular service from the network.
This signaling includes the service description, the service negotiation
with the network, the service setup or modification, or the need to
execute some functions at network device and send the results back to
the sender. However, the current IP was not designed for this.
For example, the result of SLO negotiation at any hop needs
to be updated in the IP packet at the router and returned back to the sender
(originating host or gateway device for a Service Provider).</t>
        <t>There are some attempts to achieve the above as described
in <xref target="I-D.han-tsvwg-ip-transport-qos"/>, which describes general in-band
signaling for QoS control with IPv6 protocol and
<xref target="I-D.han-tsvwg-enhanced-diffserv"/>, which proposes a backward
compatible class-based queuing and scheduling schema for hybrid service
to support guaranteed service from the network (e.g. for latency and bandwidth).</t>
        <t>In summary, it is difficult to do better than best effort or High Precision
Services described in Section <xref target="HPN"/>, in closed domains with current IP given the best effort
congestion control (TCP/QUIC) and explicit congestion notification (ECN)
framework. A comprehensive mechanism needs to be explored as the limitations
in silicon technologies or deployment models 30 years ago are not relevant
with respect to security, scalability, packet size change,
MSS or FCS recalculation, etc.</t>
      </section>
    </section>
    <section anchor="candidate-solution-directions">
      <name>Candidate Solution Directions</name>
      <t>This section is an incomplete list of solution considerations, but is not prescriptive
about any specific approach or technical solution, and is provided to stimulate
thought on the subject.</t>
      <section anchor="variable-length-addresses">
        <name>Variable Length Addresses</name>
        <t>When private networks are set up, they only need to use an address length
that allows the construction of networks sufficiently large to meet the
expected service requirements. If a future network layer protocol could
support address length of e.g.: 16, 24, 32, 48, 64 and 128 bits (or maybe more),
it would be easy for such networks to pick a right size. This would
allow them to have as efficient packets without compression as possible,
and it would also avoid for them to have to think about allocation procedures
for "global" addresses.</t>
        <t>Whenever networks with a smaller address size would later on have to interconnect
to other networks, the shorter length address would have to be interpreted as the
suffix of a sufficiently larger address space through which those connecting networks
could achieve unique, non-overlapping addresses. At the border between these networks,
high speed forwarding planes could easily perform per-packet stateless prefix
addition/deletion transformations of addresses in the packet header when the
interconnection should be free of further policy. When such an interconnection is
desired to employ specific traffic control policies, mapping of addresses in a
stateful manner is a convenient way to enforce and support such policies through
the forwarding plane.</t>
      </section>
      <section anchor="address-semantics">
        <name>Address Semantics</name>
        <t>Classically IP unicast addresses identify an interface. There is the special case
of a loop-back address, but this is normally modeled as an internal interface.
Addresses are often silently mapped to include other semantics and this is
most developed in the IP network programming concept
<xref target="RFC8986"/>.</t>
        <t>MPLS is more general. It defines the concept of a Forwarding Equivalence Class in
which a Label which can be visualized as an offset into a specific table with up to
2^20 entries, with the table containing the instruction to be executed. Thus a single
identifier is able to specify: forward towards an egress, forward along a specific
path, decapsulate and sent to an interface, decapsulate and forward via an IP lookup
in a label specific address table etc.</t>
        <t>The semantics of the MPLS label and the size of the label are such that it is
not possible to include any instruction parameters in the label and very inefficient to
include those parameters in one or more further labels. The only example of doing
this is the Entropy Label indicator <xref target="RFC6790"/> which uses two
Label Stack Entries (LSEs). Any future development along these lines will need at least three LSEs.</t>
        <t>Whilst an IPv6 is larger there is still limited space to add parameters within the
address. In the current work on this the size is limited to 16 bits, and there is a
fundamental limit of 64 bits.</t>
        <t>It is clear that move is towards a multiplicity of semantic for the network layer
address, and indeed a formal recognition that the address is in reality an
instruction with a specific scope.</t>
      </section>
      <section anchor="multiple-instructions">
        <name>Multiple Instructions</name>
        <t>What we have learned from MPLS and then from SRv6 is that it is often desirable
for a node (be that the originating host or a router) to impose on a packet a
set of instructions to be executed in sequence by one or more entities in the
network. An development of IP or any successor needs to recognize this and provide
a simple and efficient way to incorporate a list (or stack) of instructions within
the packet header.</t>
      </section>
      <section anchor="node-and-path-specific-processing-instructions">
        <name>Node and Path Specific Processing Instructions</name>
        <t>There is an established need to do node specific instructions as is indicated by the
design of MPLS and Segment Routing (SR). Any development of the forwarding system
needs to retain this feature and ideally develop a method that is simultaneously
both general and efficient.</t>
        <t>References to efficiency include efficiency in packet size and efficiency decoding and
and executing the instruction. The efficiency of encoding is not simply a matter of
on the wire bandwidth, but is also a matter of the size of the forwarder packet header cache.
This cache has to operate at wire speed can be an expensive silicon element.</t>
        <t>There is also a need to do path specific operations as are done in RSVP-TE. However
RSVP has a significant path set-up and path maintenance cost.
Clearly a per path instruction can be specified as a set of N per node instructions
where N is the number of hops along the path, for example by using SR, but that
is not an efficient encoding where N is large. It is thus
a useful optimization to include the ability to include per path instructions, and
this is the subject of further study.</t>
      </section>
      <section anchor="integrated-assurance-and-verification">
        <name>Integrated Assurance and Verification</name>
        <t>Being best effort in nature, assurance for services provided using IP is left to
add-on solutions built after the fact. How to perform tasks such as verifying of
service levels is left as an exercise for network providers, often approached
using statistical approaches that are themselves "best effort" in nature.  This
will be no longer sufficient for mission-critical services such as tele-driving
or tele-operations that demand guarantees, where failure to meet those guarantees
may expose providers and users exposed to liability demands and call the
feasibility of applications relying on those services into question.</t>
        <t>Moving forward, network protocols suitable to deliver high-precision services
for mission critical applications need to address assurance as an intrinsic
property, not left to afterthoughts.</t>
      </section>
      <section anchor="for-consideration-in-a-future-version">
        <name>For Consideration in a Future Version</name>
        <t>A future version of this document will consider E2E communication beyond-best-effort,
high precision services, high precision telemetry, E2E Volumetric data transfer and
high precision congestion control beyond that provided by the diffserv QoS bits.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not request any allocations from IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security is likely to be more significant with the applications being considered
in this work. With interest in tightly controlled access and latency, and
contractual terms of business it is going to be necessary to have provable
right of access to network resources. However heavyweight security is a
contra-requirement to the light-weight process needed for power efficiency,
fast forwarding and low latency. Addressing this will require new
insights into network security.</t>
      <t>Further information on the issue of providing security in latency sensitive
environments can be found in <xref target="RFC9055"/> which are a sub-set
of the considerations applicable to the new use cases considered in this text.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.bonica-6man-comp-rtg-hdr" target="https://www.ietf.org/archive/id/draft-bonica-6man-comp-rtg-hdr-28.txt">
          <front>
            <title>The IPv6 Compact Routing Header (CRH)</title>
            <author fullname="Ron Bonica">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yuji Kamite">
              <organization>NTT Communications Corporation</organization>
            </author>
            <author fullname="Andrew Alston">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Daniam Henriques">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Luay Jalil">
              <organization>Verizon</organization>
            </author>
            <date day="18" month="May" year="2022"/>
            <abstract>
              <t>   This document defines two new Routing header types.  Collectively,
   they are called the Compact Routing Headers (CRH).  Individually,
   they are called CRH-16 and CRH-32.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonica-6man-comp-rtg-hdr-28"/>
        </reference>
        <reference anchor="I-D.bonica-6man-crh-helper-opt" target="https://www.ietf.org/archive/id/draft-bonica-6man-crh-helper-opt-04.txt">
          <front>
            <title>Compressed Routing Header (CRH) Helper Option</title>
            <author fullname="Xing Li">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Congxiao Bao">
              <organization>CERNET Center/Tsinghua University</organization>
            </author>
            <author fullname="Eddie Ruan">
              <organization>Fungible Inc.</organization>
            </author>
            <author fullname="Ron Bonica">
              <organization>Juniper Networks</organization>
            </author>
            <date day="11" month="October" year="2021"/>
            <abstract>
              <t>   This document defines the IPv6 Compressed Routing Header (CRH) Helper
   option.  When a source node sends a packet with a CRH, it can use the
   CRH Helper option to provide additional information to downstream
   nodes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonica-6man-crh-helper-opt-04"/>
        </reference>
        <reference anchor="I-D.bonica-spring-sr-mapped-six" target="https://www.ietf.org/archive/id/draft-bonica-spring-sr-mapped-six-04.txt">
          <front>
            <title>Segment Routing Mapped To IPv6 (SRm6)</title>
            <author fullname="Ron Bonica">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Shraddha Hegde">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yuji Kamite">
              <organization>NTT Communications Corporation</organization>
            </author>
            <author fullname="Andrew Alston">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Daniam Henriques">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Luay Jalil">
              <organization>Verizon</organization>
            </author>
            <author fullname="Joel Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Jen Linkova">
              <organization>Google</organization>
            </author>
            <author fullname="Gang Chen">
              <organization>Baidu</organization>
            </author>
            <date day="27" month="September" year="2021"/>
            <abstract>
              <t>   This document describes Segment Routing Mapped to IPv6 (SRm6).  SRm6
   is a Segment Routing (SR) solution that supports a wide variety of
   use-cases while complying with IPv6 specifications.  SRm6 is
   optimized for ASIC-based routers that operate at high data rates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonica-spring-sr-mapped-six-04"/>
        </reference>
        <reference anchor="I-D.bonica-spring-srv6-plus" target="https://www.ietf.org/archive/id/draft-bonica-spring-srv6-plus-06.txt">
          <front>
            <title>Segment Routing Mapped To IPv6 (SRm6)</title>
            <author fullname="Ron Bonica">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Shraddha Hegde">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Yuji Kamite">
              <organization>NTT Communications Corporation</organization>
            </author>
            <author fullname="Andrew Alston">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Daniam Henriques">
              <organization>Liquid Telecom</organization>
            </author>
            <author fullname="Luay Jalil">
              <organization>Verizon</organization>
            </author>
            <author fullname="Joel Halpern">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Jen Linkova">
              <organization>Google</organization>
            </author>
            <author fullname="Gang Chen">
              <organization>Baidu</organization>
            </author>
            <date day="15" month="October" year="2019"/>
            <abstract>
              <t>   This document describes Segment Routing mapped to IPv6 (SRm6).  SRm6
   is a Segment Routing (SR) solution that leverages IPv6.  It supports
   a wide variety of use-cases while remaining in strict compliance with
   IPv6 specifications.  SRm6 is optimized for ASIC-based forwarding
   devices that operate at high data rates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bonica-spring-srv6-plus-06"/>
        </reference>
        <reference anchor="RFC8799" target="https://www.rfc-editor.org/info/rfc8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter">
              <organization/>
            </author>
            <author fullname="B. Liu" initials="B." surname="Liu">
              <organization/>
            </author>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes. </t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="I-D.cheng-spring-shorter-srv6-sid-requirement" target="https://www.ietf.org/archive/id/draft-cheng-spring-shorter-srv6-sid-requirement-02.txt">
          <front>
            <title>Shorter SRv6 SID Requirements</title>
            <author fullname="Weiqiang Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chongfeng">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Ran Pang">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Zhenbin Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Ran Chen">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Lijun">
              <organization>Unionpay</organization>
            </author>
            <author fullname="Xiaodong Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Greg Mirsk">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Darren Dukes">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Shay Zadok">
              <organization>Broadcom</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   This document describes a list of requirements for the use of a
   shortened identifier in a segment routing network with the IPv6 data
   plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cheng-spring-shorter-srv6-sid-requirement-02"/>
        </reference>
        <reference anchor="I-D.chunduri-isis-preferred-path-routing" target="https://www.ietf.org/archive/id/draft-chunduri-isis-preferred-path-routing-00.txt">
          <front>
            <title>Preferred Path Routing (PPR) in IS-IS</title>
            <author fullname="Uma Chunduri">
              <organization>Huawei USA</organization>
            </author>
            <author fullname="Richard Li">
              <organization>Huawei USA</organization>
            </author>
            <author fullname="Russ White">
              <organization>LinkedIn</organization>
            </author>
            <author fullname="Jeff Tantsura">
              <organization>Nuage Networks</organization>
            </author>
            <author fullname="Luis M. Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Yingzhen Qu">
              <organization>Huawei USA</organization>
            </author>
            <date day="18" month="June" year="2018"/>
            <abstract>
              <t>   This document specifies a Preferred Path Routing (PPR) mechanism to
   simplify the path description of data plane traffic in Segment
   Routing (SR) deployments.  PPR aims to mitigate the MTU and data
   plane processing issues that may result from SR packet overheads; and
   also supports traffic measurement, accounting statistics and further
   attribute extensions along the paths.  Preferred Path Routing is
   achieved through the addition of descriptions to IS-IS advertised
   prefixes, and mapping those to a PPR data-plane identifier.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-chunduri-isis-preferred-path-routing-00"/>
        </reference>
        <reference anchor="I-D.decraene-spring-srv6-vlsid" target="https://www.ietf.org/archive/id/draft-decraene-spring-srv6-vlsid-07.txt">
          <front>
            <title>SRv6 vSID: Network Programming extension for variable length SIDs</title>
            <author fullname="Bruno Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Robert Raszuk">
              <organization>NTT Network Innovations</organization>
            </author>
            <author fullname="Zhenbin Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document proposes an extension to Segment Routing IPv6 (SRv6)
   Network Programming to allow for SRv6 Segment Identifier (SID) of
   smaller variable length.  The use of smaller SRv6 SID reduces the
   size the SRv6 Header (SRH).  This reduces the overhead for both the
   traffic volume and the network processor.  It is a straightforward
   extension to the SRv6 Network Programming model and its SRH
   encapsulation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-decraene-spring-srv6-vlsid-07"/>
        </reference>
        <reference anchor="I-D.filsfils-spring-net-pgm-extension-srv6-usid" target="https://www.ietf.org/archive/id/draft-filsfils-spring-net-pgm-extension-srv6-usid-13.txt">
          <front>
            <title>Network Programming extension: SRv6 uSID instruction</title>
            <author fullname="Clarence Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Pablo Camarillo Garvia">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Dennis Cai">
              <organization>Alibaba</organization>
            </author>
            <author fullname="Daniel Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Israel Meilik">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Keyur Patel">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Wim Henderickx">
              <organization>Nokia</organization>
            </author>
            <author fullname="Prem Jonnalagadda">
              <organization>Barefoot Networks</organization>
            </author>
            <author fullname="David Melman">
              <organization>Marvell</organization>
            </author>
            <author fullname="Yisong Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="James Guichard">
              <organization>Futurewei</organization>
            </author>
            <date day="13" month="June" year="2022"/>
            <abstract>
              <t>   The SRv6 "micro segment" (SRv6 uSID or uSID for short) instruction is
   a straightforward extension of the SRv6 Network Programming model:

   *  The SRv6 Control Plane is leveraged without any change

   *  The SRH dataplane encapsulation is leveraged without any change

   *  Any SID in the SID list can carry micro segments

   *  Based on the Compressed SRv6 Segment List Encoding in SRH
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-filsfils-spring-net-pgm-extension-srv6-usid-13"/>
        </reference>
        <reference anchor="RFC8986" target="https://www.rfc-editor.org/info/rfc8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="Z. Li" initials="Z." surname="Li">
              <organization/>
            </author>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="I-D.filsfilscheng-spring-srv6-srh-comp-sl-enc" target="https://www.ietf.org/archive/id/draft-filsfilscheng-spring-srv6-srh-comp-sl-enc-03.txt">
          <front>
            <title>Compressed SRv6 Segment List Encoding in SRH</title>
            <author fullname="Weiqiang Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Clarence Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Zhenbin Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dennis Cai">
              <organization>Alibaba</organization>
            </author>
            <author fullname="Daniel Voyer">
              <organization>Bell Canada</organization>
            </author>
            <author fullname="Francois Clad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Shay Zadok">
              <organization>Broadcom</organization>
            </author>
            <author fullname="James N Guichard">
              <organization>Futurewei Technologies Ltd.</organization>
            </author>
            <author fullname="Liu Aihua">
              <organization>ZTE Corporation</organization>
            </author>
            <date day="20" month="May" year="2021"/>
            <abstract>
              <t>   This document defines a compressed SRv6 Segment List Encoding in the
   SRH.  This solution does not require any SRH data plane change nor
   any SRv6 control plane change.  This solution leverages the SRv6
   Network Programming model.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-filsfilscheng-spring-srv6-srh-comp-sl-enc-03"/>
        </reference>
        <reference anchor="I-D.han-tsvwg-enhanced-diffserv" target="https://www.ietf.org/archive/id/draft-han-tsvwg-enhanced-diffserv-00.txt">
          <front>
            <title>Enhanced DiffServ by In-band Signaling</title>
            <author fullname="Lin Han">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Yingzhen Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Richard Li">
              <organization>Futurewei Technologies</organization>
            </author>
            <date day="4" month="November" year="2019"/>
            <abstract>
              <t>   There are real-time applications requiring deterministic services in
   terms of bandwidth and latency in various industries, such as network
   based AR/VR (Augmented Reality and Virtual Reality), industrial
   internet.  This document proposes a solution which enhances DiffServ
   in IPv6 to provide end to end bandwidth guaranteed service and
   latency guaranteed service.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-han-tsvwg-enhanced-diffserv-00"/>
        </reference>
        <reference anchor="I-D.han-tsvwg-ip-transport-qos" target="https://www.ietf.org/archive/id/draft-han-tsvwg-ip-transport-qos-03.txt">
          <front>
            <title>Resource Reservation Protocol for IP Transport QoS</title>
            <author fullname="Lin Han">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Yingzhen Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Lijun Dong">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Richard Li">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Thomas Nadeau">
              <organization>Lucid Vision</organization>
            </author>
            <author fullname="Kevin Smith">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Jeff Tantsura">
              <organization>Apstra</organization>
            </author>
            <date day="15" month="October" year="2019"/>
            <abstract>
              <t>   IP is designed for use in Best Effort Networks, which are networks
   that provide no guarantee that data is delivered, or that delivery
   meets any specified quality of service parameters.  However there are
   new applications requiring IP to provide deterministic services in
   terms of bandwidth and latency, such as network based AR/VR
   (Augmented Reality and Virtual Reality), industrial internet.  This
   document proposes a solution in IPv6 that can be used by transport
   layer protocols to guarantee certain level of service quality.  This
   new service is fined-grained and could apply to individual or
   aggregated TCP/UDP flow(s).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-han-tsvwg-ip-transport-qos-03"/>
        </reference>
        <reference anchor="I-D.herbert-6man-eh-attrib" target="https://www.ietf.org/archive/id/draft-herbert-6man-eh-attrib-03.txt">
          <front>
            <title>Attribution Option for Extension Header Insertion</title>
            <author fullname="Tom Herbert">
              <organization>Intel</organization>
            </author>
            <date day="29" month="October" year="2020"/>
            <abstract>
              <t>   This document defines an "Attribution Option" that provides
   attribution for IPv6 extension headers, Hop-by-Hop options, or
   Destination options that are inserted by intermediate nodes in the
   delivery path of a packet.  The purpose of this option is twofold:
   first it identifies the extension headers or options that have been
   inserted, secondly it attributes the inserted extension headers or
   options to the node responsible for inserting them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-herbert-6man-eh-attrib-03"/>
        </reference>
        <reference anchor="I-D.bryant-arch-fwd-layer-uc" target="https://www.ietf.org/archive/id/draft-bryant-arch-fwd-layer-uc-03.txt">
          <front>
            <title>Forwarding Layer Use Cases</title>
            <author fullname="Stewart Bryant">
	 </author>
            <author fullname="Uma Chunduri">
              <organization>Intel</organization>
            </author>
            <author fullname="Toerless Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Alexander Clemm">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <date day="24" month="January" year="2022"/>
            <abstract>
              <t>   This document considers the new and emerging use cases for IP.  These
   use cases are difficult to address with IP in its current format and
   demonstrate the need to evolve the protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bryant-arch-fwd-layer-uc-03"/>
        </reference>
        <reference anchor="RFC8754" target="https://www.rfc-editor.org/info/rfc8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." surname="Previdi">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8939" target="https://www.rfc-editor.org/info/rfc8939">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: IP</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga">
              <organization/>
            </author>
            <author fullname="J. Farkas" initials="J." surname="Farkas">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." surname="Berger">
              <organization/>
            </author>
            <author fullname="D. Fedyk" initials="D." surname="Fedyk">
              <organization/>
            </author>
            <author fullname="S. Bryant" initials="S." surname="Bryant">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8939"/>
          <seriesInfo name="DOI" value="10.17487/RFC8939"/>
        </reference>
        <reference anchor="RFC8964" target="https://www.rfc-editor.org/info/rfc8964">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: MPLS</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga">
              <organization/>
            </author>
            <author fullname="J. Farkas" initials="J." surname="Farkas">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." surname="Berger">
              <organization/>
            </author>
            <author fullname="A. Malis" initials="A." surname="Malis">
              <organization/>
            </author>
            <author fullname="S. Bryant" initials="S." surname="Bryant">
              <organization/>
            </author>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>This document specifies the Deterministic Networking (DetNet) data plane when operating over an MPLS Packet Switched Network.  It leverages existing pseudowire (PW) encapsulations and MPLS Traffic Engineering (MPLS-TE) encapsulations and mechanisms.  This document builds on the DetNet architecture and data plane framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8964"/>
          <seriesInfo name="DOI" value="10.17487/RFC8964"/>
        </reference>
        <reference anchor="RFC9055" target="https://www.rfc-editor.org/info/rfc9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman">
              <organization/>
            </author>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi">
              <organization/>
            </author>
            <author fullname="A. Hacker" initials="A." surname="Hacker">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
        <reference anchor="RFC9197" target="https://www.rfc-editor.org/info/rfc9197">
          <front>
            <title>Data Fields for In Situ Operations, Administration, and Maintenance (IOAM)</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners">
              <organization/>
            </author>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari">
              <organization/>
            </author>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi">
              <organization/>
            </author>
            <date month="May" year="2022"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document discusses the data fields and associated data types for IOAM. IOAM-Data-Fields can be encapsulated into a variety of protocols, such as Network Service Header (NSH), Segment Routing, Generic Network Virtualization Encapsulation (Geneve), or IPv6.  IOAM can be used to complement OAM mechanisms based on, e.g., ICMP or other types of probe packets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9197"/>
          <seriesInfo name="DOI" value="10.17487/RFC9197"/>
        </reference>
        <reference anchor="I-D.ietf-tsvwg-intserv-multiple-tspec" target="https://www.ietf.org/archive/id/draft-ietf-tsvwg-intserv-multiple-tspec-02.txt">
          <front>
            <title>Integrated Services (IntServ) Extension to Allow Signaling of Multiple Traffic Specifications and Multiple Flow Specifications in RSVPv1</title>
            <author fullname="James Polk">
	 </author>
            <author fullname="Subha Dhesikan">
	 </author>
            <date day="25" month="February" year="2013"/>
            <abstract>
              <t>   This document defines extensions to Integrated Services (IntServ)
   allowing  multiple traffic specifications and multiple flow
   specifications to be conveyed in the same Resource Reservation
   Protocol (RSVPv1) reservation message exchange. This ability helps
   optimize an agreeable bandwidth through a network between endpoints
   in a single round trip.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-intserv-multiple-tspec-02"/>
        </reference>
        <reference anchor="I-D.lc-6man-generalized-srh" target="https://www.ietf.org/archive/id/draft-lc-6man-generalized-srh-03.txt">
          <front>
            <title>Generalized Segment Routing Header</title>
            <author fullname="Zhenbin Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Weiqiang Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Chongfeng Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Cong Li">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Hui Tian">
              <organization>CAICT</organization>
            </author>
            <author fullname="Feng Zhao">
              <organization>CAICT</organization>
            </author>
            <date day="9" month="February" year="2021"/>
            <abstract>
              <t>   Generalized SRv6 network programming defines the enhanced mechanisms
   of SRv6 to encode SRv6 SIDs, Compressed SIDs and even the MPLS labels
   or IPv4 tunnel information in a single SRH.  This type of SRH is
   called Generalized SRH (G-SRH), which can reduce the overhead of SRv6
   and also provide more flexibility for network programming.  This
   document defines the encapsulation and packet processing of G-SRH.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lc-6man-generalized-srh-03"/>
        </reference>
        <reference anchor="I-D.li-spring-compressed-srv6-np" target="https://www.ietf.org/archive/id/draft-li-spring-compressed-srv6-np-02.txt">
          <front>
            <title>Compressed SRv6 Network Programming</title>
            <author fullname="Zhenbin Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Cheng Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Chongfeng Xie">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Kihoon LEE">
              <organization>LG U+</organization>
            </author>
            <author fullname="Hui Tian">
              <organization>CAICT</organization>
            </author>
            <author fullname="Feng Zhao">
              <organization>CAICT</organization>
            </author>
            <author fullname="James N Guichard">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Cong Li">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Shuping Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="25" month="February" year="2020"/>
            <abstract>
              <t>   Segment Routing can be applied to the IPv6 data plane by leveraging a
   new type of Routing Extension Header, called Segment Routing Header
   (SRH).  However, the overhead introduced by SRH may be a challenge
   for existing hardware, which may influence on the forwarding
   performance and the payload efficiency.

   This document defines a compressed SRv6 network programming mechanism
   in order to reduce the overhead of SRv6 by introducing the Compressed
   Segment Identifier (C-SID) and the Compressed SRH (C-SRH).  The C-SRH
   can be a new Routing Header or an enhancement of SRH.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-spring-compressed-srv6-np-02"/>
        </reference>
        <reference anchor="I-D.mirsky-spring-unified-id-network-programming" target="https://www.ietf.org/archive/id/draft-mirsky-spring-unified-id-network-programming-00.txt">
          <front>
            <title>SRv6 network programming using Unified Identifier</title>
            <author fullname="Cheng Weiqiang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Greg Mirsky">
              <organization>ZTE Corp.</organization>
            </author>
            <author fullname="Liu Aihua">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Peng Shaofu">
              <organization>ZTE Corporation</organization>
            </author>
            <date day="6" month="March" year="2020"/>
            <abstract>
              <t>   This draft describes how Unified Segment Identifier can be used to
   achieve the goals of SRv6 network programming.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mirsky-spring-unified-id-network-programming-00"/>
        </reference>
        <reference anchor="I-D.steinberg-6man-crh-vs-sr-mpls" target="https://www.ietf.org/archive/id/draft-steinberg-6man-crh-vs-sr-mpls-00.txt">
          <front>
            <title>SR-MPLS over IPv6 satisfies CRH requirements</title>
            <author fullname="Dirk Steinberg">
              <organization>Lapishills Consulting Limited</organization>
            </author>
            <author fullname="Wim Henderickx">
              <organization>Nokia</organization>
            </author>
            <author fullname="Zhenbin Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Weiqiang Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Daniel Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="29" month="June" year="2020"/>
            <abstract>
              <t>   SR-MPLS is a mature solution that provides highly scalable traffic
   engineering capabilities in MPLS networks.  This document analyzes
   how SR-MPLS over IP exceeds the capabilities of the CRH, making the
   latter redundant.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-steinberg-6man-crh-vs-sr-mpls-00"/>
        </reference>
        <reference anchor="I-D.templin-6man-crh-variable" target="https://www.ietf.org/archive/id/draft-templin-6man-crh-variable-00.txt">
          <front>
            <title>IPv6 Compressed Routing Header with Variable Length Addresses</title>
            <author fullname="Fred L. Templin">
              <organization>The Boeing Company</organization>
            </author>
            <date day="18" month="May" year="2020"/>
            <abstract>
              <t>   The IPv6 Routing Header can be used to direct a packet through
   multiple intermediate IPv6 waypoints toward a final destination.  In
   its simplest form, the routing header includes the full length of
   each intermediate IPv6 waypoint.  This document specifies a method
   for supporting variable-length compressed IPv6 addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-templin-6man-crh-variable-00"/>
        </reference>
        <reference anchor="RFC1347" target="https://www.rfc-editor.org/info/rfc1347">
          <front>
            <title>TCP and UDP with Bigger Addresses (TUBA), A Simple Proposal for Internet Addressing and Routing</title>
            <author fullname="R. Callon" initials="R." surname="Callon">
              <organization/>
            </author>
            <date month="June" year="1992"/>
            <abstract>
              <t>This paper describes a simple proposal which provides a long-term solution to Internet addressing, routing, and scaling.  This memo provides information for the Internet community. It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1347"/>
          <seriesInfo name="DOI" value="10.17487/RFC1347"/>
        </reference>
        <reference anchor="RFC2205" target="https://www.rfc-editor.org/info/rfc2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden">
              <organization/>
            </author>
            <author fullname="L. Zhang" initials="L." surname="Zhang">
              <organization/>
            </author>
            <author fullname="S. Berson" initials="S." surname="Berson">
              <organization/>
            </author>
            <author fullname="S. Herzog" initials="S." surname="Herzog">
              <organization/>
            </author>
            <author fullname="S. Jamin" initials="S." surname="Jamin">
              <organization/>
            </author>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet.  RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2460" target="https://www.rfc-editor.org/info/rfc2460">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2460"/>
          <seriesInfo name="DOI" value="10.17487/RFC2460"/>
        </reference>
        <reference anchor="RFC2507" target="https://www.rfc-editor.org/info/rfc2507">
          <front>
            <title>IP Header Compression</title>
            <author fullname="M. Degermark" initials="M." surname="Degermark">
              <organization/>
            </author>
            <author fullname="B. Nordgren" initials="B." surname="Nordgren">
              <organization/>
            </author>
            <author fullname="S. Pink" initials="S." surname="Pink">
              <organization/>
            </author>
            <date month="February" year="1999"/>
            <abstract>
              <t>This document describes how to compress multiple IP headers and TCP and UDP headers per hop over point to point links.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2507"/>
          <seriesInfo name="DOI" value="10.17487/RFC2507"/>
        </reference>
        <reference anchor="RFC2711" target="https://www.rfc-editor.org/info/rfc2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge">
              <organization/>
            </author>
            <author fullname="A. Jackson" initials="A." surname="Jackson">
              <organization/>
            </author>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC3095" target="https://www.rfc-editor.org/info/rfc3095">
          <front>
            <title>RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="C. Burmeister" initials="C." surname="Burmeister">
              <organization/>
            </author>
            <author fullname="M. Degermark" initials="M." surname="Degermark">
              <organization/>
            </author>
            <author fullname="H. Fukushima" initials="H." surname="Fukushima">
              <organization/>
            </author>
            <author fullname="H. Hannu" initials="H." surname="Hannu">
              <organization/>
            </author>
            <author fullname="L-E. Jonsson" initials="L-E." surname="Jonsson">
              <organization/>
            </author>
            <author fullname="R. Hakenberg" initials="R." surname="Hakenberg">
              <organization/>
            </author>
            <author fullname="T. Koren" initials="T." surname="Koren">
              <organization/>
            </author>
            <author fullname="K. Le" initials="K." surname="Le">
              <organization/>
            </author>
            <author fullname="Z. Liu" initials="Z." surname="Liu">
              <organization/>
            </author>
            <author fullname="A. Martensson" initials="A." surname="Martensson">
              <organization/>
            </author>
            <author fullname="A. Miyazaki" initials="A." surname="Miyazaki">
              <organization/>
            </author>
            <author fullname="K. Svanbro" initials="K." surname="Svanbro">
              <organization/>
            </author>
            <author fullname="T. Wiebke" initials="T." surname="Wiebke">
              <organization/>
            </author>
            <author fullname="T. Yoshimura" initials="T." surname="Yoshimura">
              <organization/>
            </author>
            <author fullname="H. Zheng" initials="H." surname="Zheng">
              <organization/>
            </author>
            <date month="July" year="2001"/>
            <abstract>
              <t>This document specifies a highly robust and efficient header compression scheme for RTP/UDP/IP (Real-Time Transport Protocol, User Datagram Protocol, Internet Protocol), UDP/IP, and ESP/IP (Encapsulating Security Payload) headers.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3095"/>
          <seriesInfo name="DOI" value="10.17487/RFC3095"/>
        </reference>
        <reference anchor="RFC3208" target="https://www.rfc-editor.org/info/rfc3208">
          <front>
            <title>PGM Reliable Transport Protocol Specification</title>
            <author fullname="T. Speakman" initials="T." surname="Speakman">
              <organization/>
            </author>
            <author fullname="J. Crowcroft" initials="J." surname="Crowcroft">
              <organization/>
            </author>
            <author fullname="J. Gemmell" initials="J." surname="Gemmell">
              <organization/>
            </author>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci">
              <organization/>
            </author>
            <author fullname="S. Lin" initials="S." surname="Lin">
              <organization/>
            </author>
            <author fullname="D. Leshchiner" initials="D." surname="Leshchiner">
              <organization/>
            </author>
            <author fullname="M. Luby" initials="M." surname="Luby">
              <organization/>
            </author>
            <author fullname="T. Montgomery" initials="T." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="L. Rizzo" initials="L." surname="Rizzo">
              <organization/>
            </author>
            <author fullname="A. Tweedly" initials="A." surname="Tweedly">
              <organization/>
            </author>
            <author fullname="N. Bhaskar" initials="N." surname="Bhaskar">
              <organization/>
            </author>
            <author fullname="R. Edmonstone" initials="R." surname="Edmonstone">
              <organization/>
            </author>
            <author fullname="R. Sumanasekera" initials="R." surname="Sumanasekera">
              <organization/>
            </author>
            <author fullname="L. Vicisano" initials="L." surname="Vicisano">
              <organization/>
            </author>
            <date month="December" year="2001"/>
            <abstract>
              <t>Pragmatic General Multicast (PGM) is a reliable multicast transport protocol for applications that require ordered or unordered, duplicate- free, multicast data delivery from multiple sources to multiple receivers.  PGM guarantees that a receiver in the group either receives all data packets from transmissions and repairs, or is able to detect unrecoverable data packet loss.  PGM is specifically intended as a workable solution for multicast applications with basic reliability requirements.  Its central design goal is simplicity of operation with due regard for scalability and network efficiency.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3208"/>
          <seriesInfo name="DOI" value="10.17487/RFC3208"/>
        </reference>
        <reference anchor="RFC4080" target="https://www.rfc-editor.org/info/rfc4080">
          <front>
            <title>Next Steps in Signaling (NSIS): Framework</title>
            <author fullname="R. Hancock" initials="R." surname="Hancock">
              <organization/>
            </author>
            <author fullname="G. Karagiannis" initials="G." surname="Karagiannis">
              <organization/>
            </author>
            <author fullname="J. Loughney" initials="J." surname="Loughney">
              <organization/>
            </author>
            <author fullname="S. Van den Bosch" initials="S." surname="Van den Bosch">
              <organization/>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The Next Steps in Signaling (NSIS) working group is considering protocols for signaling information about a data flow along its path in the network.  The NSIS suite of protocols is envisioned to support various signaling applications that need to install and/or manipulate such state in the network.  Based on existing work on signaling requirements, this document proposes an architectural framework for these signaling protocols.</t>
              <t>This document provides a model for the network entities that take part in such signaling, and for the relationship between signaling and the rest of network operation.  We decompose the overall signaling protocol suite into a generic (lower) layer, with separate upper layers for each specific signaling application.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4080"/>
          <seriesInfo name="DOI" value="10.17487/RFC4080"/>
        </reference>
        <reference anchor="RFC4193" target="https://www.rfc-editor.org/info/rfc4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <author fullname="B. Haberman" initials="B." surname="Haberman">
              <organization/>
            </author>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC5795" target="https://www.rfc-editor.org/info/rfc5795">
          <front>
            <title>The RObust Header Compression (ROHC) Framework</title>
            <author fullname="K. Sandlund" initials="K." surname="Sandlund">
              <organization/>
            </author>
            <author fullname="G. Pelletier" initials="G." surname="Pelletier">
              <organization/>
            </author>
            <author fullname="L-E. Jonsson" initials="L-E." surname="Jonsson">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future-proof header compression concept.  It is designed to operate efficiently and robustly over various link technologies with different characteristics.</t>
              <t>The ROHC framework, along with a set of compression profiles, was initially defined in RFC 3095.  To improve and simplify the ROHC specifications, this document explicitly defines the ROHC framework and the profile for uncompressed separately.  More specifically, the definition of the framework does not modify or update the definition of the framework specified by RFC 3095.</t>
              <t>This specification obsoletes RFC 4995.  It fixes one interoperability issue that was erroneously introduced in RFC 4995, and adds some minor clarifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5795"/>
          <seriesInfo name="DOI" value="10.17487/RFC5795"/>
        </reference>
        <reference anchor="RFC6282" target="https://www.rfc-editor.org/info/rfc6282">
          <front>
            <title>Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks</title>
            <author fullname="J. Hui" initials="J." role="editor" surname="Hui">
              <organization/>
            </author>
            <author fullname="P. Thubert" initials="P." surname="Thubert">
              <organization/>
            </author>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document updates RFC 4944, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks".  This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs).  The compression format relies on shared context to allow compression of arbitrary prefixes.  How the information is maintained in that shared context is out of scope. This document specifies compression of multicast addresses and a framework for compressing next headers.  UDP header compression is specified within this framework.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6282"/>
          <seriesInfo name="DOI" value="10.17487/RFC6282"/>
        </reference>
        <reference anchor="RFC6398" target="https://www.rfc-editor.org/info/rfc6398">
          <front>
            <title>IP Router Alert Considerations and Usage</title>
            <author fullname="F. Le Faucheur" initials="F." role="editor" surname="Le Faucheur">
              <organization/>
            </author>
            <date month="October" year="2011"/>
            <abstract>
              <t>The IP Router Alert Option is an IP option that alerts transit routers to more closely examine the contents of an IP packet.  The Resource reSerVation Protocol (RSVP), Pragmatic General Multicast (PGM), the Internet Group Management Protocol (IGMP), Multicast Listener Discovery (MLD), Multicast Router Discovery (MRD), and General Internet Signaling Transport (GIST) are some of the protocols that make use of the IP Router Alert Option.  This document discusses security aspects and usage guidelines around the use of the current IP Router Alert Option, thereby updating RFC 2113 and RFC 2711. Specifically, it provides recommendations against using the Router Alert in the end-to-end open Internet and identifies controlled environments where protocols depending on Router Alert can be used safely.  It also provides recommendations about protection approaches for service providers.  Finally, it provides brief guidelines for Router Alert implementation on routers.  This memo documents an Internet  Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="168"/>
          <seriesInfo name="RFC" value="6398"/>
          <seriesInfo name="DOI" value="10.17487/RFC6398"/>
        </reference>
        <reference anchor="RFC6554" target="https://www.rfc-editor.org/info/rfc6554">
          <front>
            <title>An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL)</title>
            <author fullname="J. Hui" initials="J." surname="Hui">
              <organization/>
            </author>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur">
              <organization/>
            </author>
            <author fullname="D. Culler" initials="D." surname="Culler">
              <organization/>
            </author>
            <author fullname="V. Manral" initials="V." surname="Manral">
              <organization/>
            </author>
            <date month="March" year="2012"/>
            <abstract>
              <t>In Low-Power and Lossy Networks (LLNs), memory constraints on routers may limit them to maintaining, at most, a few routes.  In some configurations, it is necessary to use these memory-constrained routers to deliver datagrams to nodes within the LLN.  The Routing Protocol for Low-Power and Lossy Networks (RPL) can be used in some deployments to store most, if not all, routes on one (e.g., the Directed Acyclic Graph (DAG) root) or a few routers and forward the IPv6 datagram using a source routing technique to avoid large routing tables on memory-constrained routers.  This document specifies a new IPv6 Routing header type for delivering datagrams within a RPL routing domain.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6554"/>
          <seriesInfo name="DOI" value="10.17487/RFC6554"/>
        </reference>
        <reference anchor="RFC6790" target="https://www.rfc-editor.org/info/rfc6790">
          <front>
            <title>The Use of Entropy Labels in MPLS Forwarding</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella">
              <organization/>
            </author>
            <author fullname="J. Drake" initials="J." surname="Drake">
              <organization/>
            </author>
            <author fullname="S. Amante" initials="S." surname="Amante">
              <organization/>
            </author>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx">
              <organization/>
            </author>
            <author fullname="L. Yong" initials="L." surname="Yong">
              <organization/>
            </author>
            <date month="November" year="2012"/>
            <abstract>
              <t>Load balancing is a powerful tool for engineering traffic across a network.  This memo suggests ways of improving load balancing across MPLS networks using the concept of "entropy labels".  It defines the concept, describes why entropy labels are useful, enumerates properties of entropy labels that allow maximal benefit, and shows how they can be signaled and used for various applications.  This document updates RFCs 3031, 3107, 3209, and 5036.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6790"/>
          <seriesInfo name="DOI" value="10.17487/RFC6790"/>
        </reference>
        <reference anchor="RFC8655" target="https://www.rfc-editor.org/info/rfc8655">
          <front>
            <title>Deterministic Networking Architecture</title>
            <author fullname="N. Finn" initials="N." surname="Finn">
              <organization/>
            </author>
            <author fullname="P. Thubert" initials="P." surname="Thubert">
              <organization/>
            </author>
            <author fullname="B. Varga" initials="B." surname="Varga">
              <organization/>
            </author>
            <author fullname="J. Farkas" initials="J." surname="Farkas">
              <organization/>
            </author>
            <date month="October" year="2019"/>
            <abstract>
              <t>This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain.  Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path.  DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8655"/>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
        </reference>
        <reference anchor="RFC8698" target="https://www.rfc-editor.org/info/rfc8698">
          <front>
            <title>Network-Assisted Dynamic Adaptation (NADA): A Unified Congestion Control Scheme for Real-Time Media</title>
            <author fullname="X. Zhu" initials="X." surname="Zhu">
              <organization/>
            </author>
            <author fullname="R. Pan" initials="R." surname="Pan">
              <organization/>
            </author>
            <author fullname="M. Ramalho" initials="M." surname="Ramalho">
              <organization/>
            </author>
            <author fullname="S. Mena" initials="S." surname="Mena">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes Network-Assisted Dynamic Adaptation (NADA), a novel congestion control scheme for interactive real-time media applications such as video conferencing. In the proposed scheme, the sender regulates its sending rate, based on either implicit or explicit congestion signaling, in a unified approach. The scheme can benefit from Explicit Congestion Notification (ECN) markings from network nodes. It also maintains consistent sender behavior in the absence of such markings by reacting to queuing delays and packet losses instead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8698"/>
          <seriesInfo name="DOI" value="10.17487/RFC8698"/>
        </reference>
        <reference anchor="DIP1" target="https://www.etsi.org/deliver/etsi_gr/NGP/001_099/010/01.01.01_60/gr_NGP010v010101p.pdf">
          <front>
            <title>Recommendation for New Transport Technologies, GR NGP 010</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2018" month="September" day="13"/>
          </front>
        </reference>
        <reference anchor="DOT" target="https://hknog.net/wp-content/uploads/2018/03/01_GeoffHuston_TheDeath_of_Transit_and_Beyond.pdf">
          <front>
            <title>The Death of Transit and Beyond</title>
            <author initials="G." surname="Huston" fullname="Geoff Huston">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA519W3MbR5bme/6KCjpil4wGQOpqS/sylERJjJUljki5HyZ2
HQVUAqxWoQpdF1Joh/77nu9cMrOKkD2902MbBKryevJcv3NyPp+7VVOU9eZl
NvTr+S/O9WVf+ZfZ26a9z1v8kn3I977NrtpmWfltdt3nvd/6unf5ctn6O3r0
72+yq2tXNKs639KrRZuv+/my3ed1P8/b1e18fV/MK7Qy33Xzs2funrq7/Hhz
/vniPPt7035FL+/aZtg5t6LWN027f5mV9bpxXZ/Xxe951dTU8N53ble+zP6r
b1azrGvavvXrjj7tt/Jh1Wwxsu7/OEfjeuK6Ybktu65s6n6/owYuL27eOpcP
/W3TvnRZNqd/+P/KunuZXS+yVzxo+1amc917Wol+8lvT0hy+1OWdb7uy32fN
Orse2tbvs2enz99dvrbn/DYvq5dZt/yPTtqRdVnQUB8M4Msie3071MXQluMh
fNnmD37hAVzWva8mXQ3bfLUofb/+jw2+ONjTzSK7WH317WSqN41vK991kx+5
q7dDP7T+3pfZjV/d1k3VbErf0QhWi8kA+t7/x6pbrPNhUfgHXZ/TJImOtuOe
zyv/jXaa6Gz047/ZczUU9+XmP1ZoYkHvurppt3lPm4Td/vz29dnPLx7px18e
n529dM6BzJKHLudvFsumLlf5/Pk2r+e0ert522/mt0V78Pf2dn7rqx3RdrPr
J090u5ZIe961822+2/li3pXffvTI3fP5rho6G93PL17Yk6tbjyf0QSLdnjrj
F7qymLf+n0PZ8omMLwipzMuu7OY7OhueKLOY7/L+dk7HrMd512cLv2pzX/vR
QO4qatmeWJdVh3/sidr3891mO/ffel/jbMk7g76Cwb/45fn07fEkePC0cry6
XTX39cpeuKVF7bu7+w19SZ9XNO6iXK873949fKTczfs2r7sdLcr8n00XnvDt
kghYtsjfzvO+b8tlWPqDrGlYhbV/9jTM5MmL8PG5ffvi7Nkz+/joxc/WLM6c
jYuYEA14vh2qvtxVnr7e+TDFaiUD29C6t3lV/guU0d6Gn0tbJyxPS+eRf6cl
q3f2zLZsu697e26oy3VJDxE50O7cE0elXW82bb7dJltNDKisaVk2kXLvOibO
XRVWjnj7rirr5JG8LXPi/DrhR0+e/qwfHz8+s2V4/PT5mX18dhYe+PmRnbYn
Zy/s2SePz37Rj0/PfrHXnj568cQ+Pjl7rB+f/Rxee/74F/v2+ZMX1sLzZ2Gv
nv/8whr75XnYoF+ey7NvLq94LFnW5+3G9y+z277fdS9PT+/v7xe+70owjNPC
V2Dpp/ji9017+vHd1enZ2aPfz168OD17dEb/LPj/f39+drppf6ef6ds7+of+
t1vsirV0ITL0sxeBVBB3aeqM+Ez20d9nN0axI342y959zqi9jJriRqKYCpzw
4ub6kv+mFqn9x2ePfpmfvZg/eoIJfro5PL/br3WzWRBdnN7viKJIYtT96bCr
mrzoTtHE6dkTmtfv73yzXr8fur6pf7+59W88cYvfm/XvPNyy/x2C+JXfN3Ux
nSc9nfHjkIL6eEaPZ/L4gdkI0+ceM+nSufl8nuXLjs7zqnfu5rbsMlIpBjA2
EuzUJkmHLuupr52oIvgj77Pa+yLrmywvCjkrxNKzyyuSNrRokCjxN3576Hy2
yjuSIBhiTRuiZybDkS1X9EPhuxXxC2q3rN2fqTPDan52tpCxb8uiqLxzP0Eq
t00xrHjX//ipxJ/fMSXf+qxEvySw6BxC7el8j1XDMBJOrlPz31Y8ORq1s0Fi
0IHnxSFTG3hsBR2EFgyKQUuvzLL723JFG1NXe6fE3WVHS99R62uiyP7I2lhk
f78tK5/Rwd9jwWnQVUW9E9USl7kjirOF6jJa4hUJW5+th5a6bcM4SBkbqLuc
BsTfvyHWfU2/Zf/ZXGNHaCNKXhbalGQQmJWjWa3X5SojQVHSpoKzZfclUdWS
fr0vC/q0GXKaeu/REabbNdWA5jrsKrXQFPme50rD2PEC3ec8iQ3psiStePVy
2oX+duiyuqGO70hzAH+jETkS0hUJZR6gzgjEdiekh3dBiESS+GvVNkpRttgL
3mMMpUsozBoCneq+YgQ0bd95X2Otak9L1+XtHt/SNtHh3DPd04qhg60vymFL
iw1FiN9OKTT7rz8Tav9HR7Ub2l1DpM+Ekp4t+kybQeoXyQovqwodg1gXbYAM
2OFb/63soDlkhymR+8NqkXLeVDT17N5XFWZHL5ety7uuWZVERYURV7ar8tqH
89sQaVKn2AiaMB0Leq/TZdM5QH/n8dLnZVPs6chQ58QasH9gr/iBbIVNRhuy
zfydkoedjssrZwMkAinpdCwHXgC2Eug1GjRmBh70FeMoym416C6j3Tnadbbf
cSVo0cver3h7Qq8LIoxsRyp/uRqqvM1KLNLqK5bGpLN3fzFq8DFSJao1rcD5
jl77VpKu6onAn5yRPZSDEDeNHAZeHTKYWqwx97FintfQMlmbpGs4WYm7p9kf
f6hK/P17oGHYebxAPHqmFG1ohtX2mCqR/4zoriDG3e5nLiXyeFo2dLj6hiQR
PT5jWlmS6rm57bNhR6Orhy2pIpnxPnqPqDOvOmkOq8pUARuUniamgiE0zMwx
duNrS78iUYKvnst0oInQdNBIRQvVOv4Wyv7377SGYdX4R1434cm3Pr9jeiph
cq6YCokR0gLQvmwbZhnEt+lM0CCI+wmfzisXlrbTsT1fZMLpcU7DRGmerc87
PCZbTn3S2YEMcOu22WbNrqylFeYQdHT0uBMJCOtYUf9LMAMcDV5L92A42Xg4
a54rt7jN/8GcXNeZR1HWdXMn7C7v7YTcN0NVoCPqbqjpEPOhpJPQDrtexGkq
aZak+NegMz1jd6TvNNQpMTLmJVPC0KMs+gCNLf9KZ7zJaFQiGBphed0qr7y1
qQI/k7PiYA/gTPWlCD5hmHx+SXRFmUBzkmaUjQY+TZKOmNo9RuflnDfGBmn3
l1XZ3eogmp0XNSHnvRiPZ5GdU9+rEkaQo3ELSeZQ9ftuOnZQA+mDNbFVGhMd
YFZ0WPJQ12SU4QXu0BmL7snEEhbVp4YvDdOk27ah6ZT/0i1ssZKQQufKY7jj
zhw2szHjxxElgpF5QxQKbXjsHH3cNiTwMZUSMrlLqWqkg7V5SaIX3ILsi7wA
l4MAdGx1kl3nQ/uBxeQFmcq+kKlpr6xnBBETunMszEmIQD6RIUX0TVTE5/NW
STaKQpsxDgqt7cDLvGQt4Y6G6Nwr4hZQ//g1k39F47vR/B9OeoZZ0aFpXHiY
LEqylHrejL4dhPWn+y3D2vHOQPEhTWTveNBywDCNvlxDU1nOVQuMii20I3Aj
Hnm23IdBORsUnF0k+7CRP5DwIB+RloMQTV+SPQo9TsVactyCPiqsplnz4V1H
J6CIdxb5jQgZm+1KD3/hIb6IidHTt809ft4zTULPcx3RaAcjlVU6O5CQWCOJ
7GkupEFPvY8yQRaPR9NBHWGOUP/kmNMfLJOXutc1rZGdRfYm0rsOLRFN1VjD
XOU7JHU4tcEk6FkTCHYGtr02BTaxKpytG7+d6JEHND6a4iVvDO2WqC78SOHv
fNXsmCa57/uShIBpRyQ8iLcUzT33LLvxePEsWDkOzIt001Zb29G4yYjljklw
FRXrXcSyVz0dCmuH532778CSpFEWXtmv56+d9EHD/Cf2hQ7D7hanc8UqHAhB
bYAOGkqGBjva2hULzPVQi/XTNaQG2iQczmIYIfreNI0IexpRHfi0LX4YAQ7c
UPMjVXNP38n4adl5fxbZxT/lsJf/n+tKJhovhpvqs8kuQ03JoYLRC8LUiJtv
iLZpnjM7GekWPJiKG+DhZCIUkhtZfKQNr8AGa8yCTvyEkEjY0FbvPOsgtPgd
k5y8IPrwANouoy3IfXaqge+FuWZiIt3fwvCo82r/L2wXZg7LhoYD6s6rMO4V
0c4GLE/6SkQPcw1SNu5Y7qaGE5EejvHlwc1kZXYiiVgAgs/TGFYQEcIkeFjJ
aQ8MbybsGg4Has0LpakeLWZn5I2seInLk9nkQMz8XpwAvbGUB2wOGoFKlUQP
iExEWYIbz8IcEODHP2VfsNcVayVw+nxOtpp+/il75XvWpqBVvoIlfMGWsHC6
qRmPFULTvDkVRxvAVedqPXd7kr1bkadmJCYsyCmdZbfl5hb+YFFZsv99ddkJ
+bA2uRtoZVkxrld7JmhhInTmOtYXner8IJBtXg9rCFmY6TMz6WbQ65ptHs/E
NgdH8PO+metHjtIMtQ1OhVcQQNE9Aw01eBxsColxTIuwynf5sqxKaIIuMNol
u51S/8JClliXKzQKRaEAD9jm7VdSxfZsszqI25K0jT2vzD1GFV0QeRB8otbB
0KBlBVeFS82Ok/axgCgTfZnmhHNH4yNlYEN8B9sfJrBnPqenTEWju6WzW9Z3
NHT6VgdPPDJIWrBjmw06Pn7z8UTMIHhAyeBhlw5J3zcf1e9E0yJF3Mv6kcE9
csII96RG2fggbiI2RbV3+eg50+n5kKqXnlukc6MdFGGRbHqkUuRGUDi+S48R
Fx4njpU/ojJi1oMfc1ZSLDEqB5VuLQeGJCkR3rRj8ZOQUVGAMOi8trkZ0fc4
q5g/EXe7gfE81NumYJ85XKm5eCKoq7hT9NqvVx+udTVfPH/6/bsLxmIHi4j0
BrMV2YDDq1efLz69DdJPDiTZb+1QdyauWAFJemUKan0Fxo3z3WJ8zEbpmNJB
49HougVu54hRD+yqyze8ArpMouvZWs2py/mhtcohQ8otb61w+NGIiIvRIV/1
6lfN4BqpIicv6ICX0GL+jv0fduIpyl7T0WE/x8hYOX727vTVs3cn0dLORfbi
dF8rIV2ZcchazLcdC1Nw572w3RVcxOx1w1u0y9DUiapool35r8QvOVbKypY0
jshlU45pvkbzLr3x/UdaYBy4JZxywSoZSbyShAeptqRQtC+dm2ef2NMoxBCM
Pm1KWXil/kgiAWa1zU4mpPz96pQ9BmhM37PDRSsFkUwDJZ5ZvMT+po5N/TWH
BU7ntoVaf/z61eeTmYOW2bLZYEyLqSOYLjafdUUqAdSk5LkbsK7GDg5z9Rzz
YgtGRUuqUKlMfCBBWcfSjhy7T0JvQrRFylJZTsi3Jn5i1+wuke1asOS8wMcS
vV/JsXjju3JTixzhU49hkRxZD5WQteqVu3wPFm3OxluYq9jxnAwiKMbZuqzp
mODUERvDuaGTNpJWxOrrr93/Utck/8ESh/qjd6Emg6GvwO8wqVu2VG/zOziC
5AFqj6gQ4WJqtJ/z8FhwqXeHFPEVG2lkr7ImYO0NSo1RQw2R64adyGzLtPoQ
NCGborgliIcOdfR2Y1UhaknW5eF8McMybSH2thXB0BBPqXE8RcvJeOWgwc9J
c4Bs4F1R1UGnQ9wMc3HM07t+1KRtB9ZgkeEI3Ex4RHL4mHMnzjSyA0jPhy1A
s2gzDFko8vjLxQlIlKMix/TYXB67bG66E2i5NVgoS2nWejIEOJsBjoyCKCew
kuMPNxenxrxEbvMZb+Fki3MNejjOjopws9+h7/g71Wbh4cF2qHaKNcTGOeaW
JfHzjujpKzhJJkIHAc/v38F8V342egdrS5+Hqk9DKjQutcbhU8QeILy82WvM
QjwRRhRhvcU4TN36wR6X0bLflwlCTVlsBxu2tAtsPIlwgnF36yu2wreejvwe
Qn05rNcID5mLRM6OOFQr8BFuJqVkplZn22+NrsV3qbMD1dpw66awaBC3qn2z
FcJsyC2DoVWoncZqe6m2MG0ms24W/aDRkfogQR/+1kWd15+yP7NTPskxr0CC
xKU+1YkxghWGvzxQWt0AVxJ4O+3TXdk2tZiBTGouPDqynkyxyEXjtUiQzKwP
Tmf4R+F76536lVI7UzRSdaexFLv2Gz45n8VMEr2QPerH15/vnp/AM0KqIOQo
PCbg8upVf/HLc6JQ5a54Nru+fKO//fzsKX4DVdNhZyeWE53Qr8tvRkUxMkMv
q+hmaYjow6W4yErq+ENDDJjGfS6PsLJ7+eH8RDa+jA8eX745cZPGTSWofL3p
b0djUicRPfjo8S+QpPqbSJrEDRXH0kFbCBKQRWMMP/CSOKZm4DqIkfW0EYWc
nKBd3AINxI4y0HWuwZ8SMXFoiUTAO3ajcHAkJYBgYorHIhG7cQmIdb29PFm4
96KozKIagefeXoqWROLoGy0Aq08sq6EydOpQDbNzP5DvaYhjVfm8tXhnh8Zg
IzLXz5dES8o8S3N8Lr3JZhoHy0bFNE2cJdGcDu6de8+8r/PRw9LKIUerqp7w
SJx0GjZ1m7MnuCROGLQHSBf2qkIExhm6cPjFF5YcntSbKnsMn5NG+725UVZ+
x6fuB7tD9MKunge7G2csbAqEmR9uRfeUeKo4IoJSaIAjWiPiVmQeSgzavp6Z
b2xPqwXt39A9Mz0cao6LFLbg/tRdzC62UsLTf/zx9pwja3RcPtnCkSgCc1TL
z7mPOk1ZWYR9zJwndqrmu+xoJXHfbaaKe/SYsURbc4h6qEGkPakyvghLuPRE
S2UjpEkrt/YcsjEPaMs6SAvTYQ1ShOky1cKzTHXIUliCOSxA4OLWzsFEgoZF
qhBJjmBmskXrFEtgE2hI7m5HNgqrCeCZQ1uj6SLEVDiOR9TrEsroyeSDwbMX
datrhlZIRzRH6icXVxYCF+wGgktn4S7r+XXZD9mn81+JJ9K/1TEAwBrx5dZD
mxAHGfvHnXgMe5j5xYS98c6wQJ0hMCkeEeYUNAYnNiONZFduNvv5kr1jYdQ8
zAbMqqyLkqy8AXqKOKddCtEpynxTI3xh+zznfTZzSJUFRZc4MxOIff6jxELT
5gWGFyVhhy84yNVBwcKui9POHLkkAP+W/XrzxZ5g5p/l22YQ4+aBft4sexba
i4ytX6xssM6Zl+oeamdRYRVDhPeHA4rhh9tmR6fub8xrftgdjiNNZW+Sy15A
9/wSwr5bYY/UfQm9hsFDeq4kuGSYJLN+zTLI7nOiHLBkaVaOf01iQo8wJMZm
0/oNzEzrc4bV3yJ+y6iybyAcEmtgUvzMCvgh7hCjhStzo0oVnz5RjmJg0YBD
agcjqFOzbIGngZFJIjZmsuh0+JpOJRYvSmeuHkjJOccerGmsigagiU6uQ3BR
9Fn5IeVY6uNjmmNOTjTfiYc5ecFcnStHO4PYXOAE5tf4wA18Wv4Dy3CnvMiw
JubsYbZD3PN9U4lDz8bHYaLUniCFtdkAwqH6BPMxxDLYnZZF0caoklHI1swo
BDECZgx0OHKhghc4LCArIxrkCZsKocFIBXZa8faNlMmZelvm8LbME2/LLOrT
I8nAYs75IJD1HBVszkMrgLqwaRIYiRlSYJtgtuLvMfOnTEgshFJhE4i0Ue8y
QAeNY7oly/e2KTlacU7sy8NDRu0Yc2ClXc5IXEzW2Oo9L1UC7knD/Mo/NUzG
nm0vq2ZLy04aksnmWGlzVsGhkFl4V/rdIIbHaCFovdTsXrwpAQLBPledt3pk
k+AHMfk72BEM/sOqip06dOrrVSFVrlPUBOSl0iILXViyKtR+SEYjR3xZxyER
L8+7W7OkOkSgSZp7HpM6kGFDKjXRSfi7F/6NaGnwAoRgOdhbRWwI4RbdJdGA
4JUtGSEQ4BqsnSlKXcdvlsAIQQogSCEQhb3vJQhV3rElHgknD4YHiAUwkyEh
i9ExhUJIiqbCPDq/4ngMjQqtuwOryY+A7xh5M97SYjDy2dlv9jAHmS4MMGGo
rZnEy9kfewvoI0fv0M67fMeWS7eDm4rxX+Lph9rE0DdxsbA7BUqFKKHh1yiw
VHuHi9S3GnnRWD570+DYayCzDvsLuWtWZu7zvWrSK8VkhOCOkwefjxkMKyMc
uoddokKMJJdMWOBGYstqyI82EzwEVoaTYTMiBMFPxMeEuHhAI+KeaqsC2yi7
W4sZQyjze87wjVlIs2Dab9UdI1A6594RQYmZvKF9wDyE7NeqSE6glVMwZVhg
2DEYCDhf1TRfswiCAc+k9vLowOFhL+lokT5VaSvcPVsXnDMgwfv+tvXe/dUo
XiryTmx1agIBEpyGwIE5YhZceGIYBmd/Lv6ZCY4gHOIG0UWWobqVwQ0J409T
rEwblFCfCgzWQyCiZ3IMwX/yWnBzEoRj+ZqcB+Y7mAZ++IkVqYu6QIzyAtNq
Cl+R8LVpGvSG55fACaE1ZcZWmZDVsND+A9wpQYe6Fdg8ZpW3CNjL9kvf8BNs
0beM7yhCMnMyzI7I5upDABiolcSJ6ViJb2WFg6VhLAPiih2x4O+35S7YL3XB
dlwndDPydDtTx7ZwfnXNfCVA6l7g/fPz60V23mXYSrjb8oq03kIVBD5Qt3kB
EX7PceAER+k4FiPuOrQsTBsOcVKEUx9fs4vKm3hp+GDxqRT9wYnSzkhVkaez
0f6AGxVtzsSGRTOvD0/txz3CBL6Hv7qNoTBzeGrjiiGHY0TtIfakZZ9Hj9dZ
yJEyZ2p2fPH+5GV28R6megdeI0FYBEJ9z4HQEJErNboFFz3tIBydBvZg7IN8
YJUJKEpeB3BHXwBm7dgxKtGJmgUhjFUh1ATs3fk4tHIdQVskBdflhiiW7WYS
j11zQh1gszgqHPYGYlPalv3R7sUvm3Q2c+ABHFOZsW2y65kt0B7Ml3veCnWP
H3cK6Xi6+AVrnmzpCdiNcDzWUKHxkzCUkwCzWoKfRIsavuKsEZa3OavgiS/D
pSC057+ef+TDfn31+fLju8wi6htkpXbiCFITUWEG8BEwtZtF7IY6CZySAuBb
CQLz1ipERcLO0VIAISg2LPpkkSFDFtMrmsbXfMOz5A2HnYrxw0G7h0llQSqe
x/lA/657a/y9LKZxb7bAEnOOZBj8D5evf73KSGxxWLXr8o0P3ghFi/FG0rJf
e087Aab4+iOdLQz4oX9IXLcfG1YQH+wskdj7V+9PxGP62/OX9iAWgVdVWb5L
3jS3jpkDfFTWbBJHOplSSTYX9zuSXi7eR+froXY1neC9/ET/yT4p45FBS0xU
YKgVC3amozRvJJHAglcrFQtLP4FvFYAy1MJWw0rY4J8fJPKfIJdYAkH/eR2z
cT4ac//jJ90Ls45TzifyF4iu9k7GeyASIHg1ngNRSVWuE8gEY+E4kSwAcvD1
VCZpFg4g+Ic6EG8Kw7g4+mtIEJnZUFveC9wVDEkTq8TAnEkSUpRprF8YYI3d
2n2nlupYOth5BaU+kKWq73t1LEMb3M9ccgon+mjWkeBGTGacHEaWvjL7owtS
jwugd9T4P2LjNn79rmqWpBOGX2kV/jJv51PNGAhGZwYsxIFFEVfXNAPj+PrK
Ipccm7GVzUVhHyWtJKDc61RvQiAGe/VQkEEsq+MhLxSHCFyJqBRAK+6DbX4q
Is2FQCLMuJpsxm6oLOrHLjvxKkiXKg3EV7RTE//68/s4Fj1MDPlsxUsRfLOr
vG2h33NTIiU1QgsoHcmrGub0yKDQOCZx2ZkS1PQ3C2eOiFw1cF8XKeaf94DZ
thNLXh16mLlmAQiBCqFDE8KQ+KzGfMTNVvHdtA/TWASfXltDH3iOOaJFLoXU
SHRMrDCXUJOqEE78xQG+JLFENrjJskWrUDwsaq1QUH76yuTRG5NH2fEV/f3m
ZOFslfMkrw0+CbCAXg86HVyunACXTJ2QNJyhh1LrZo4ztdQtGNtNQA6+FkVn
ohpnk9bhGhdoF4v7z3N8Fj7G3+psxZkrgBkFOhcW6cS8A/93SnD8skIaZlEC
JAhY5JkpyoU10AAS3ubfyu2w5SZc2j8KAkgEM0gbA02Iz5r2k4zoLusQivJt
aNIlpwsY+sdwMW155Kwt86nQMc6UfNMXsDSFT77RrCCAukSX5sAdnP6+RSQs
g/DLKwtpMilkxyMOf8Jk/CpGXPuQBmQZLKYAnr/XaAVSwTWbSzzKjA/uZmlW
F8Mm7qGO0bG7LTncR0ekYb/FlFewF5fs3koQ2K1HsL9WshudjVni/EnlAptY
Ss5O2cIub+FX5KVVinoARW8MU8pjU/QxaRvXl2+EdULPckFVUbMERNez30NY
eJ+qF/EYmDcAqXWQ32tIY56mi+H59xkDEVqjS7a9dy1r6xjFsTAqDZUW3u8i
cArTPBF/Lb6pY86ZaFpJj7zNF+Lu4APIZyB4j9JQaDDxzWo+IN0C8shVAuuj
CT56jqiucOm8YjtSD8KTxxzvnTH/35srIXCJJM7viHJ52ra2yqAtJzdnkmZl
ve4P8hzpH2MUW75TmzmCB4nJt40le3ZQn/+kusj37yDrPykNQg9oE/9GSY7v
3wP6W4k2jShL7C4xgbHBvBqWoRqUKaEESb94/pRBh8oewy5atjIyDVXRo6M+
l4A84z0v37BZbFoCJNtbAaLJUwKBEqBlChgARKLnwJYECzVxUXEjy71boUJQ
9j/EvtqTgb3YLF6KpcBYkS7fn+Dhn9VHS2exZKyqpGwKUtf8JWL9BO0yAss5
D0W8n5a3e4BgbTZID1QHe2I5xPxKYOIYBh4BO1h22ljJ4eC5sfqTcjsR7jTb
BOFhTrcZCHfvOUEiS5AIR9bskaFVFHUvGojkGQe3YQQ/lXXwmQjol+W6mntS
HUHBPi9eMAjgGljYwPPGMYWR3ix0fLhMC3DrrEMYesvseHYpi8mZ4lFZkTCz
RfPeRiYU9uqi2Pj5azoBQ+9p7siCmT2g1sQRZ0BBHr06t9Ro4IyxuzLn15Ex
FAJQwcyYQz86kuzyYAtaLjOQNjwDDtyKQ5CsmXnViE/Ucl9ID+LcuqlmL3N5
POf/XFzRWr75dINFu6wluL1i732fxHHVa/egKc0uDT5bh/yHeUiC5Zyx7da3
jIkduRCJsO/BKX3J+4ElsxIUo/QOZ1juH0xm8cPNMP8+734nTkq80szpYHr4
lDanN7/FyhOiIQoLEsqYjXZdYqVq8LLbjUX5OFevUfQPq+XKzpMjniD19ATZ
0V35sCQ8W4SvtpIq6IvAEkbHmt3E7uGWBIhieKu0eiBaESnG3jTlUZlKDHvZ
LBKKtuHl2RvQ3Wumu3T6TinTdqwblnJi2+gpjnldNh1Ii1kWpcFIKSEtYWgf
iGCatSqgalympuAsaCsqkMWTJlmwqdeaZZUoUw9/a1IAZsdx/4/Yc/q74loG
+HWsRBKfU5IF/CZkqOQxdHiqqhtUyNYjT0NsoiAIEkQ8JqC6urOIMQ+GjLCR
pcyhKobIMnkiBkOKpDBAmrhEbw3hANV+gJdOIsvjShG0kubYB9lj2+m/ElIw
fpi4uS6CSR9dhYYedu+jp+yH9r+6aSZeF45ZilEAWlUfvahq0KoUuKyvjwsu
GHevGLZjs0TXhWNUWOI3Bt3Nscqfrz7wfwU0/QywU61dEasMWHGFmTDI1m8M
Sy3Kv8314TQ5SB5MlhzpAEv15QlyOQEUhkCRig1O7MFsGbw3cp2rc2rhXjUc
sVeVQPO96WCobNOEVXpm4lFNdLZxt6pShZCpkldO5mGfHX8+P+Gw1TEHtpjk
SN9f+pM4PulfXiOVtslCQYpRU2mC8W7g14IfYZ0jx4FjFEKQHePw8QXtbO3E
BUDfH93l1eCPxHCIpkH3IIrJAUHp3hxPugILqXZg8Z80ZsoeZcmm+nwe8EWf
r3+70lohj8+e0dHHasFc0fCkuwIaA7ie7J0UaMt+xR4Sw6MFvHpnSDrUMUMQ
kIUnaVcS1ivr6JZTwnEcVFGCRwrmuACOY3u+CUsuAy/KYpSso3I2Tg/STjZw
7EeVvXAalNZNYgr6fB7AnaLMZqE8YiwSgfi96cCCvsBo4oZOjYfOHf365frm
KEWJkN2EpRxqHbwvTmkqcxG9BThgBGcijEsEnPpEghklxrWKAe3Y3G3ic+YX
JQQv3+g7qSZ/8X4xPhHgHp/PEwVJnPvZ0fX7T18+vDmaetmKRoNLtfKYJy9+
gbGWZ69ek9o8mKqUs8sEwDBOVGS+OToyQnQ/P3rEmZnYEp3pJt9xNAohrVSL
GJ3sIJepVxO4dGgTB4MRewopcET5wkU5RNfl65Fb+4CrLSyeUFdL5MX8CxhO
l3D2wMJEskyzCFSovE7sKFaYeJsUroDEgqLcbBOYhqAz+KiYifWDlo+J6Z+k
yQYTZbbm8k30hmRMhoVCs8H/lXOBkjjHAzpfgIO09hxAH0mAX7wUdSLG4BBL
lzR6niNijLNQgY4bakRrqcl7OZchqV4SNQUQgEmxdUcHCXoovV+KETHKQWdP
EftDxOhOQsSs/TKls++1Cv5RGj+nPc+/1qiqYNyLUxFI4kDz1u+CLv/AIrFV
wOMRisPaJM1C/EqsJFWlwuhZb8hXmpcPAnrLCQma4JF9kFyNP356e84RLq+6
Yoq5EC3uq0fZNLJI+TfBfd7ZIELloDVCufe9QW5iDa+xlI4PbSRekxStkYFJ
eYPsNwXOW1IJI9RJa4A2hLqeSN6xVwLI5R6kGbxDTLqopwmoQmLKI08cOUCt
/4dE7JloWK3nNChkvnJIyApKSaq+PaOlhHLzlrLqzZQQQIN7CWm0XVgmoRF2
+zaC9wLLj5kzTfN12AXxgYXuvIcJVgGYoOvf1ObvUMZvzRNhkb5bVYqicJJJ
aKVKrcwHRxyK7OY14PhRijKa0OoOIJq+JhXNx2pkM+c1xjZLHsRxDbUgzIJN
E600vAbqCWhAFpP8L/USpgk33cSOqeEMm7MIcpw7eHrZ3MzvywSBk0ScNJ1b
EFKhGAA4HRiKwPqtNu9MlYqQzCE02/lkOOZ/ZwNpHJ7QuLV7rekNYzeMCLsg
MVjj1NYTlHz2+upLEibjagSWvM4A5AOpjEkmo0i6Z2c/i89SC8CGP1DWFf6i
iZe482mBFYZFwOW3lApeXJcSKwF3QYd8zrDOKsslx5/2v+HKAhbLIrUM2TmS
BpomQxq712zRw1zapfsloWdByHB7YnpaivyczuccgfT5EoWC2j1D0yQ6W60l
EZVhy8p6A4Ic+RjESESP0LRNoYmOYVbBbDIfF7ZnZGUFiyFZF8NMaJg2RQBZ
moL4PYkQ2SFiy42FlBTN8it0CnoBug2/wfBXPlkzzQjGkQCDwAFM+C3WzY5R
mt5nZ4kUOeGxLqJyOTUQgcuVWUk09Zya2GTDbk72BRecQylPdiODIsaEwE4g
VOqK/CRm9B5iIy6wkYR5nCyyT5ia1qkZJemoJfiFKZ3zEit3HmZ2/OXDucWu
Hr14AooX6SfnVZKLvmocf12VK8n45FNAlkLEax8YfwBDQySpfzJNpQhcB2j2
6CjtUJ0kVDiyQ24eg3FuZDfKhCTN21lERHlLP3RdJVxQinw1gQWIwT1pjiES
Y/UNkjLJNbYq1dgeLgQYMfWcG3Ty0rl/M3ByoDD7j4MrSWn2+NB/u+R6fOXH
hdTjM//tYujxlR/UCk8e+JNq4fGpf6deeHzrTyuGx8d+WDOcYwKMW2gadfnE
+rN+yW5WoZuyPoQQShEYCNlNEnml8KjmOYYsoWmpwi4pVojYJgdKNZTka/Bh
tqYivoxVbAn6GNXDMLv/gQ56N9UEkxzd4A1BCbwHprPog2zla9DRGLA5gU3Z
Yo6Wc/lYjlMQJ29Rf8C7ECywihXrEX/grMWDSinrsVammaOqeefg2u/mtJX0
7bxmxgEbjeygalxSJ/ghEORCbI63lWz3OLSMK7NyndVgazx6+re/MTz4VNyV
EpYoR8laAVFd1mq/kCL6OFS7FXV9JxlV4h9r6jCrAI9k5zKQnQx8YL4YIM3X
l1en1zdfPp5evr6I4kyDYWFBJUFaN/W22f5YrRcaHgHSJEm2kiVWh7mqYzs2
eySJU0SnVI2KdMOZgzKmNON/P8IhJBn4CLyVteZQNG25KRGMssqkXO4kLYk9
mphp/ta5A7kBTlwr+YWk9XFAPC0kNUIJqK2QVLaCPx0JuET8PupYod2i5dwI
9eCbkDNciQWtz19/cNoyJ7dZykxqAwkjgR+u40EhJ4BTWYpUNwUVwNz+RMrt
W3piVDqJCIUWBVK4K4P58mAlGVqV5U4LI8mCHmBOUtVikdZ7u5nUe8suHl8Y
qNPAgQB3vnp1Maef5h+vv2tY1VLxhZuwpZomaxhYTNXUcYYWF0WD5hmS1dla
ACasLhBKlAo8NWPRBQbTpG4i9kJwen+I4rq/Ljw+hawBUqtYZ/MgaEl6HFe4
PbA9SJ7aIAUIK2N5vuIClwRuLh8jJgfnejVpnbpF9rERb3VAbEoxkSOGLhyF
FqEocs1Eq3KVKB7slT5FeWYi2As9cPDkCkhBxiq6zLT8jNSfESuDnfM6UfON
u+AzWVXNMPIuGfrxy0V27BebRfabv9UBiYUyyy5J2T0x4Dp70kKdufdqnIQe
Y3ZHCC+oUABYEz4BtlUbQCxbjopJzZuPn0+yqaNH6s0pSIuLVwTp5h44gdRV
TfPrAjpao7/JbOM6ICkkTEOKAR7ORMq1qJ8V8RLfmMKqNBUh3BBg5TFHCeRZ
E3NxZfxImzdCQVEcPmqhArCk9YnMSciYN3Nl9c7k+Me6TCksl9NCPloKVCzc
hyxaPvqx9mKoWU7UKUfHJIZ6RLhKOdg8nOkolsvwQ7T7qxwH0r3UMyQjzqs5
ay7oJw1zL9Ix4UdczsAFoSqaxRzF6ND0HP6NWI8rjepnx8PnDx9en6ClWI5L
1bsYo5jUcyUWz3XnSik6irgF6v+wl1D/gHFQDDJU82QoXm/c17gOZGCC9CLH
L8Fxz4t8x0rCq7KfczT8N8AHsgAfcOKAMH/3plGv68MSmhPEbwoCp1F7rXCi
sfjojPWW9DcCmRhxB9eiIR1gahIns1qnvmc4cLVHyHepma0jJ0w4njF58WGy
nKrgh6AVUgyWun24VMfnr4gPiPDMB3i37saLJ+XJyJ7YIta/JN0I6W+m3Y91
I8lV57LcxT+Q9iRlYPmmB0hjQZXFgnAhRSz5CkXd1lr/kUaSV6ean5Aowzb5
aKq3LN37kFBsMahPdyyLfXbT7LLjTzc3J1FaWlcuzJUv4MinEAJaIZtIWkNc
agMA/c4lyMOOxLtLOJtmitbnVcIJQrOxZ5lK2SZojE4iUjYliUh7h/c0sXFU
wWMmFQpRdCrEqswrIbXr2Ikz9PNmPceCu7jqUkpQ6/qS1boVLxl76lgHQqcp
YXShqA+P2v1gp5KNFSQMa/rXV/8ziggQOytbphEWSCinpZUsNTWMYjuKv0gS
u9IVOyYF3p8kiQ2Xa75Wwp4QR10AcQThFCpkYHP/BMZEg6m1zt3GJxFKy9o4
dIUNs1zzUUu/STjOaU+RQnTwM3FBilDnxDzNow98Re8BYT7BSDX3IOYdK39Q
2/A2xeg/L8XH60utfYo7uoIbS6wDOV0Z4kUVQ0xGYO5OkxongALtSFAfHBV1
WpGEdscgFmVSplKOewKvUB6jEgNTOmHMm+kbhnrj1E7W/TWKNxeYqzCzCFQf
5eWKE900/gl8S8Y7lyiuOtC4gERwL4jAc3mMsczMeYq5iESBk6WJpRagblwE
4MGo4K4wF5hInEIrzIGZUMIaklovxv2drzjdVfnsVpbNcF+s0I6pUXFFoc4F
Jm8Mi0RZeHcF3E0QQnyqp9jBLjjnoZKP5NTWAyhFWk+H2sraU2OlJBVYeJdy
hegDVv+osRcRjDSMDeCovYvVI9SlDPLRAtCYjBTNaUgVRdl7zRw8Kk30rvOy
xe0lR5NKJrwleKqqyo3eQKYViZOqu3YI4UsuRvLL250xyaRcWj0eT0AXGrbp
4oZnhR8VZucYYCTdOxfUet30RcbKq4ajlTalzGHJuciMojQUAy7G+/5d/Ecl
wz7K4GO493D9MPozzDoMoVXw7l9ed/idC+FlxwohPskicU7nlRQyZtXtg6KO
3zDqmEz1HQfKpbyIu+YkWymDTovQdgIZz7gCQ+BPTfpSRBHpakNdQBnRCbw5
gTMb57UGg9Pa6kKMq1HcWonbkGJrcM1Y10ZsXcgnMSThGCm5BGmFutehyK3Y
zdvmLq8iqtacSxLcldAJgwhKdpTsQgUQq5E11AEvKm5Lphf1XUhBb4yENoV0
BFmAaPkk9fBCTfylQUeSkqZhbHnEPo7wM5aRFPBcyVUCQAiwra5XlxQCzsE3
I1guXBVV5UY3dGh8Pkp0UUvGu54r1smiIWFBlsyXhd2HEhq6PRF5prbr5FY4
LkSkV/0YHmNqBDAIXcJo7ChgYzjcnQShOYuSLil2GhQHBTUBUMFVjpIxxAtT
1OknDjUN6UlMXrMEdvk/BxgQYl6p3T+abSxSkr2VRQLj4poNDJ8h7WiAYqPp
vQ/XohMAoXIcUlQhr4SaEiizaFDRRRoTNQW2NQL7WaJqCoUS5MgIgcLg8dco
MiJR9bLVygVdb5f1adIhk0K8f455nm4MTHmXHKexszwlhfzBGYlHTiWhg6eQ
lQiUiYUqhAFBgKmAGhMTR0F4G5j5s08mGYqGfMK9PtMinJp/FBsnNSZtXpL4
dJulNuDDW6iQciGlEYTzavU1vPueWJPHxd/m/vwYbxow++WPn95fIQX9Bn6G
1+Z+OL55fTLLvrA34bN6E2bZB+I7H9SdcPyF/QezYATD+LhBkZCOo/jmkt/i
NOd1koVu3hq+M0nS5WicfAVDuOgiuULT6uGGYllyEdF+qjPrMEKB6DswcSAe
zaEqDkKLc0hBhnADTq7Vo1VnR2HwhTKkr6WkRjAHmJMmsgtSz+o1Lpu2tphq
Sn5u4nQJjiU2sPT02uawc0z9meq0GS+Hweng8AnXu6TlsD2nIDfiZ2PjlUhY
auMfvm5iepMTSoYCCCTJ4Gy8ISurINqQHExl3bz34RK1UHy/1DjXGj41rqwh
d2ypGRxqgMXK+uX6VG+aSjIieq5I2WmkXEuzBl1pCxMSFr4mSASGGK9aqe3k
zVxIkS17nZoUxIk4S6tdyxfJ8IVqsapCD8h6iRLyB+oYWMbjRAMBS7P5zabS
VKvP2SF9kMgXAZQSFsGVJk7i2wwLk9p1kqos1tDDwr4jH4cr66TymaqU4hRN
Ch0FsJYFpZ68kNsyYn20WzEPBKiMo8WjtLmHnP20FKEVhuaiwr2qr3LFKzt1
bkX6ztKo2Exvb0hAsch9T6JTANoYg/ToX+tyiMeUEQdleoHVMV/pcaLyvuJC
kAGXBYSdRfUmOp7SbqdhFl7yySo9fyqZbj57c3Hz8eJGrjSd1NBw4wKQHJeK
UC9me5JSsx/VWeuboK6mNyglC7xw0xLXV0xDd93C6o3IN85BEHAKkUXxhHmC
2VVei/xNSVExVTMp2KwXQYxDiDEnOHmbgehdFs3xpHgKSmbigit3zC6u8P3p
Nu++zmSNq3zpSSBff0ay6UnGsFq5hvbxLHsC6+VZ1g+0eU6r/mZHcBUcWduH
8oTG99VKVbWhrApJbrO6CHI4tBn1qsW0nRJZrmZjLeM9hG7ceNAJ2XUst1fq
6Ugqxto2JDuQogtsDHYM2JhM+swCLl/uDYF00kkg6Qgx0QS2YS5dg3aZRzci
DwxLBt+GIPLhqMbY3Q9Gm+64/T6brDMKiK1CzTYowV+Rkj5wVnqCfZMjlALT
RU+13HbkRJC96MO9w1qx+PXVly47Dr6HUPWoO3SrCb9yYjyHg6+1+0EqgpTb
/atpyyBWAFwoFFV7DRZ7ZxeVyK3ITF5xQUTl52KqWOehR5abPqXdeAscaoEc
u+s51KRO6G8eyjg/GGOAavNNmAaiSABDzOr5RJRStH56nuNlCyo1f0C4Zb1G
uTa7TlOioB+vvpyIhj1IlTZohlzvIeQ4jAknYlMAhJs618ahCUaHSjLCDxpx
o1odAv0UvuvNURJtn8S5KLGa3jutIt5KuVvmh9F5v7S0/H7ihQ1gXiUj92dk
tEBgTOKaMIUGqVaej6cU7VrGAnIw5k6s4UMVAeRRk4PMECZxnVgMhDMO1BWp
FohKXwQdoCmbS9bFFYpOwXFqViO+3fnNxUyKV3JZZ4tW8GWUzlAhxoNGSy+F
zEabwKzDvgmr7wJZEuEZ0pglLZ+4vzjBbpzR1/EFjYbOSepahpiQ1RwYYXrA
13jaPJU4CaawudKXwNRYm2HvzUGimCQYWoXCsuagTnZo4Z2cMChQN6955b+8
uTqZZuq/ubzCDeGasp/X5vTbzUPMe/7PpiOVb/qIuVvmsMCgoStWyUZi1v6B
xTdjKw/ng3TReVx95VdxVkHV1GBNolvqEjgjRo4NhDe19oPUtxGXPZshS58W
iWWuk1Cv1YrMPq0PRQziTcbhjcBRZu7y3ZW4Bgxffcv1oWFq8gXE4R0xW9Lj
tQzlOgSCQ8eYGCQvEnLcfaWGgmbKBu/W9dXbcLcUrxIHLiMeqAsrzUWakouK
NdBhBej1IZp4jZKxQu68UWEH5L4AgfOMVAe+WDFuPuiXQ6RWizMv/pGTeb8q
BZ5ByzQ+sJlU1qcJTw5fTBIcai1LITBe+nNoyzlJyW4eKvQyFViyBZPkJXTU
LSLZL1mbCBd+cj35CA1NK1FERmCiU4PpFmVY7i0hUKqkwvOdhJw6ITxp3Jl1
rtiDpY4hZLYDzTEyjGp/P0tu+jmS216PxqqHLF7ZjjX/7D3HYJnKe84oD8rH
9D5UntosS+JzrM/vJAdXyyJK0JIdyez+WbZlwfz3+MNjEt2skp/2+eb0+vJd
vCTY0a+LZyczM4tOyzSf7vjDE4UhBVzN8YenJ3qpbYLzT0KmcQRH8TZDrsOX
HY1E4ZEbXxDLQSQWQmIEs2X0hRjWXF1ep/rfOb4UV8EaV7gEVjbG6P05ci77
S+ScFTKON5E/ZN7iIgHE4XSE7bHwfBsQUIbysZg1B1atrNX0gkS945MOUIJA
/J5BNkxuj00cQX/8AS/gdy5bgM63OYIcDOhjIGLcw0Tow3MHV+0MpRCKys+X
zTfRVF3IhG7oBQ2npzMYuURCqGvsSXFxE0gRzBzj45K7wKMUnjQn9yXwgqee
JQGQuQRAdnz94VNH0nJf5+ZNFfdMgiScwv9ivEIKPIR9Da7EtMvkDvnZ6Ifa
b5q+FM9FsMNSfEB4svNk7U4rz87stmS7mNt/86uBL/nexpXhLQqXfrIhoZB7
dcLbHQZy5Uvj1IXIRVPT2kTJRTsM2oB4DihvYXxlN0nSju1zkZEPn9I5c9o4
KhOSzJCTIv6RYVfkie6MokYKbx5VEBBfD9Rk8FcZfBYH744VQy3oeTYI2wxX
n6BgvS6E7PT0AtMTUNpNvH6GrwY1TxDUN7kRUDQGvhxrCqn9ay3Lgk/2WhcC
BabnjGvxAdxn3C8UPo8aPl74b+ht1qtmr0JdwMpBTjAzpcWCAscseC6+RdxR
G7Tw1a0vBlHUgCPKpfbzHqLCaNUlMLaAkil+eISyqLymd1aH+PjJIkMl5US2
W9b8KB5QND/igdh1uL5iBMRgW4eLwBobnElYlXN8La48uW8q24T7AFKmeyDc
fgzw539+uXx9Ymn8gDiO8AgIZIYiAccXrz+euJD0gPQMyQu61VTOKEBSzyLa
bdpYTCEth8N1yKlXS/G0q30Z0DoVdE9CosamCTXTAC8mU7MXXqXpGxIBFhj/
jN1FuV0Lk16oJJ6pmfv1+ho9vn19jXtwoiY7y3zPF8Nmr2mByoKrGZom+ib4
UtR+tarLeht2bcZFhvtOsgScE4uHq9+Dq0sZyM/48p13Ui4D3ChI62D8NXoZ
Musk1rIWlw3ILgmF97gZBe4CSYcNFYy6gQWOqCQh6Vyz40PeoWbI810hfXID
gKSe9sQYFTU2QtTxBXP1JHHBWbkXeLoj8kBvjopY2y6BZqFAEV8ekghsF9JN
D0ntRcYAPNV2D184IdaP3W03za+A2sZF/h49n2WPn86yJ49n2dNfZihOiAUO
WYzHfEsVQtRwBZ3MXFpYkAwKkdqs/aX3SO9Kkgt51rIBDkq0onQ8KLHDOcBj
gEc6OdOrjOIVDGmedJ54Zp065gybAYX2rilD8YvYPIuosv6q9VmSJFm2BwtY
FGxFHEkA+Sjm9CyEPBiVNwpAwWjTyrEhLQxnTo1hTt3i4I30nyaWObOJx0nY
IR42TobTFkdJ6/QULUkfeI5jevqmtuQD2mrHmWuZpZQZbg2GcxLOtFEpSsoE
78BJQDNGw3LyFZ3VUfIVMUzRFZZyM12CQejiwZo5xu2I0/dhXp/0qRa7ZTLB
yDXGBp9UFVOeXSiUHe4KYKEfbsWVGzqmiYXamhXK1qJKbpT/19SJ+YqqZeyf
VTgMSkkg2YCZhzjh6mz6OhDtcscshza34PiR1yVV+sS+QpMljNutLu105Lnj
6aOIpqYcWbV6Eol8ePReIF/LzUCsP9hVSXx1h/ZhNOAOOesXmgMgNHNtaaJA
jKiVSHtDkpjj692o0kNy2VRppp7deKr5qlrOgSEJjikWkX25/FBbMlSIoV/0
ulCWk0L01r7dXSYdJdnkEZ5NlCRnQaO5ksIPi8Fq3I3u+9ReHXuO4nVkUS8+
lICtBUPdOLNQihlrPQDVNOU+eXZzBBlhtUbzNKR4QRz/Lq/Y3cDrDt+MOnOz
D/ALZKPq6HdlN0iSs66PFhYWj3VCdSwFmYUNuM7GPf6/j88s7jWLoSl5DrSp
19+KRzTKM9N+2Pyxu9GsnINLLlwFjVodZ7k09mUoSSWlPaWq/Ua2PlSr4mS6
OHInpaVjbe1gUrE+lFLcw6esUdQelbi7ZEQ6ARLwckYlRClflkB0JHZtBUJR
QziGTWPaF4SA/qy/QJEIgRBWox2rQkmk3QgSulC6xuH66MC4Ym+a++eTS3md
tSM8ffx2es9RqBaI1vSOFr3qJngluZqNs0PIfgTwqd1eqU/vnGJQK0p7/fzi
LKDjGe1Bx8TJo9c9DveFxlaPP1xfdCdyzcGBe85CLXH2S7Brl29q5CAh31/Y
gTeAH6MhTV4HG7Li7J2Jvd74jtTjCpcYiRQUgEOySBGUY+nyoRqi2R+WNC1A
Rdvv5FpsalVKbHdpIjoXiE0jaXK9B62y1IPm4qCsJMvNXwJah5HLPhU9I4ae
gBWjaUpCkAGgdPBSZLuSoeAV1NuX7UbM6HVmw1opX0q2ieMUzNylRGnqT/Cw
wduqmIhfDd9xGV9gFRs+cUXZ8J3AVvMwXCfQQ5DyV3bjRjwvyslZlobMPSn7
jgSIOP5D3odcfRcnfNC2jAfkMqLm4DCAZjLHbsLduN4N6eCSgLMfnSXwub4M
qkXMxzyvH97fl2lBU2IICEQ0bTQlwxWlQlxygSGbOQz+CBc0xgOvwh6mWEsi
nnmdWGNQ3DscupMHE0uShkZKkAj9j00hvfAtFde2xVexZOZ4Y4NkBwNPah+H
zKNGdikQy2gsuVJaoVfaicPexRv54mUTk0oox9eflYNMlniizwhO0CWLzPcP
8gprJcWYllGF1nDWPDFRuy22m1y/6Ti6as6j0a7QOn72WtdY7gnSX1b7wOZH
X41M9rSpFQdBmsIqv4gTAwR5QBwLD09e5Zrc+rYa35ruS3PL5YLttVNTmdOZ
kwwKtdi1dkZ4/IGEi2iJsUK9QqqGOmr5M8M/Euwgg2Baw34kF7yEulnmN9Gw
XHq5ug4roTGOTQYaC+U2mMIYxtowGMOi48HHKtldtw/uLJD2fD/nWyEK+Rvu
KGJDjJMB1mURENQ5LBTDtUZGadciyLhUMbPbnj7yO3w40jPhBDL70WTu+LLr
BxdtpGUtlnuFeVx/NgVabnfF3mNtA+MIhJF0xiIzLehAXEcL9ivoJTe1L2oZ
Pr3m2r4+tBYihEbahLpnUqOq64diL4zI7rxGXcOuG1pedWzFb+mF0c69YrR+
6npELaRcapjn4c2kcELiPZLlkvzwyq9ZhXpwAzbQOb0WJmWaz1c9E1Baa6PP
u68RjMGXWu/FgnOjIEgXuhIlnc5zuyoFd5RaFpK3aGXCQvZT4WTIMAPlJtAq
G6VGKWwb7o/OcxT5KFmbo7g4WifbsW7FlXsykNY4bRCD2k4T5MMy2mxhj89R
igT6Ivvt6O/kDEpRXqgqRZLCaZX61nlZDW3q/4KAjs85FB6SG8uThE6+hpUv
pJafmBEALS/UKL3Z/coVR6OcQCVCmaRRmgzqv/J+aTmxtEw8tYzqJ5Z3+Ktm
Pwjrm6W7prn7VmBAUm8Z1TqNAFrzLlniLNYgSIdmbC7UzonHwexguTPZ6bXC
+5mgOISghXLVNSolZ+1ivOikZedC9laU8d/kUggphXbwmghL0xfN3Ny9HGcc
4e41m3B0obm4fx6uxCyb/NAz5+8Re0DDv9GBxJ/E3zlCLV4eCUlN2zwQDAh5
jfEW+gAQsFANx3tUGycOdP7xfLxK5gkP0w+QU/hnfSe+7DT/Uu50pYa4xWur
vDNtNfxQdkndQHW7jgRTvOAiJRFJWYoIC2cqjiiiXC85re7TwzOLwh8RXa/p
F0khDeHY/IhiTULG3hJciO0Elhah+gP4SHqHAav7WG1W2tuAuJa++iacHRTT
1JKNKpmhSdztFcTVJeuT65Dmk1LTAdNtyC/F+mRJKF/qWEYlaea4VGuiL/L8
ibWHYiLnKYRfL1YxdzwC9E6rBCqjiCWFwlXjb0M5weCTtAhFuENGKFKK3thU
6xCbC9fbubQK6xS4I2b4i7NnMUmdgSwQtMj4sRSScXRmAjpUeEzIGepS3E6a
oLdw/w8Xm1gyAbEAAA==

-->

</rfc>
